2006 10th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW'06) 2006
DOI: 10.1109/edocw.2006.70
|View full text |Cite
|
Sign up to set email alerts
|

Trust Assessment Using Provenance in Service Oriented Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(17 citation statements)
references
References 11 publications
0
17
0
Order By: Relevance
“…In this case, the services can be considered as contexts [5]. A trust-aware provider analyzes service-based interactions from trust perspectives and makes decisions accordingly [6].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this case, the services can be considered as contexts [5]. A trust-aware provider analyzes service-based interactions from trust perspectives and makes decisions accordingly [6].…”
Section: Introductionmentioning
confidence: 99%
“…Although much research have been devoted to develop systems for trust-based access control and decision making [2,5,[7][8][9][10][11][12][13][14][15][16], secret key sharing [17], or appropriate service provider selection [6], to date, no mechanism has been proposed to automate service collaboration for analyzing the trustworthiness of service requestors at run-time. In this paper, we quantify service collaboration from trust perspectives using our trust model called CAT (Context-Aware Trust) [18], and dynamically decide on service requests at run-time based on our proposed trust-based service collaboration algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…One of the earliest approaches traversed a decision tree with respect to provenance records to measure reputation [12]. Within the domain of information provision, a richer assessment can be obtained by considering the provenance path of information, the trustworthiness of the information itself, and the reliability of the provider to assess reputation [5,21].…”
Section: Introductionmentioning
confidence: 99%
“…Rajbhandari et al [323,324,328] use provenance information to evaluate whether an abstract workflow description has been adhered to, and to enable a user executing a workflow-based application to establish trust in the outcome of a physical workflow. Their notion of trust is compositionally derived from the trust in processes (i.e.…”
Section: Data Quality and Trustmentioning
confidence: 99%