Author:
Sun Po-Ling,Ku Cheng-Yuan
Abstract
Purpose
– As the number of available services increases on the web, it becomes greatly vital in service-oriented computing to discover a trustworthy service for a service composition so as to best-fit business requirements. However, some dishonest service providers may advertise more than what they can offer and cause a great loss to users. In the last few years, trust and reputation management over web service selection mechanism becomes an emerging way of dealing with security deficiencies which are inherent in web services environment. The purpose of this paper is to review the security threats carefully and expect that the results serve as a reference guide for designing the robust trust and reputation management mechanisms.
Design/methodology/approach
– Based on the published literature, the paper reviews and categorizes the most critical and important security threats that apply to trust and reputation models.
Findings
– A detailed review and a dedicated taxonomy table are derived. As emphasized earlier, they could serve as the most important guideline for design of trust and reputation mechanisms.
Originality/value
– The papers work contributes to: first, understand in details what kind of security threats may cause damage to trust and reputation management mechanisms for web services selection; and second, categorize these complex security threats and then assist in planning the defense mechanisms.
Subject
Industrial and Manufacturing Engineering,Strategy and Management,Computer Science Applications,Industrial relations,Management Information Systems
Reference24 articles.
1. Chang, E.
,
Dillon, T.
and
Hussain, F.K.
(2006), Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex.
2. Diamadopoulou, V.
,
Makris, C.
,
Panagis, Y.
and
Sakkopoulos, E.
(2008), “Techniques to support web service selection and consumption with QoS characteristics”, Journal of Network and Computer Applications, Vol. 31 No. 2, pp. 108-130.
3. Djordjevic, I.
,
Dimitrakos, T.
,
Romano, N.
,
Mac Randal, D.
and
Ritrovato, P.
(2007), “Dynamic security perimeters for inter-enterprise service integration”, Future Generation Computer Systems, Vol. 23 No. 4, pp. 633-657.
4. Hoffman, K.
,
Zage, D.
and
Nita-Rotaru, C.
(2009), “A survey of attack and defense techniques for reputation systems”, ACM Computing Surveys (CSUR), Vol. 42 No. 1, pp. 1-31.
5. Jøsang, A.
and
Golbeck, J.
(2009), “Challenges for robust trust and reputation systems”, Proceedings of the 5th International Workshop on Security and Trust Management (STM), Saint Malo, September 24-25.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献