英文摘要
|
In recent years, Web Services (WS) are becoming more complex and popular, and their security issues are also important. However, WS-Security standards only support the WS transaction security during transmission and do not consider the WS content (e.g., reliability). In this paper, we propose a novel Web Service Trust Evaluation Mechanism (WSTEM) which uses the appropriate WS evaluation criteria and considers the security factors in subjective and objective. WSTEM which is based on the user's WS-Security requirement uses Modified Technique for Order Preference by Similarity to Ideal Solution Method (TOPSIS) and Analytic Hierarchy Process (AHP) to compute the trust values of WS according to users' feedback and trust value revision for trusted WS recommendation.In the simulation stage, we propose a system, Trusted Web Service Recommendation System (TWSRS), which is based on WSTEM. The results show that users can avoid invoking the insecure WS through WSTEM. The aim is to improve WS-Security for the evaluation of WS content security and providing more trusted WS to users.
|
参考文献
|
-
葉燉烟、鄭景俗、黃堃承(2008)。應用模糊階層TOPSIS方法評估入口網站之服務品質。管理與系統,15(3),439-466。
連結:
-
Minkowski, H. (1911), Gesammelte Abhandlungen von Hermann Minkowski, Leipzig: B.G. Teubner.
-
Minkowski, H. (1896), Geometrie der Zahlen, Leipzig: B.G. Teubner.
-
Bonderud, P.,Chung, S.,Endicott-Popovsky, B.(2008).Toward trustworthy service consumers and producers.Proceedings of the 2008 Third International Conference on Internet and Web Applications and Services,Washington, DC, USA:
-
Casella, G.,Berger, R. L.(2002).Statistical Inference.New Delhi:Wadsworth.
-
Dağdevirena, M.,Yavuzb, S.,Kılınç, N.(2009).Weapon selection using the AHP and TOPSIS methods under fuzzy environment.Expert Systems with Applications,36(4),8143-8151.
-
Dustdar, S.,Treiber, M.(2005).A view based analysis on web service registries.Distributed and Parallel Databases,18(2),147-171.
-
Hwang, C. L.,Yoon, K.(1981).Multiple Attribute Decision Making: Methods and Applications: A State-of-the-Art Survey.New York:Springer-Verlag.
-
O''Hara, K.,Alani, H.,Kalfoglou, Y.,Shadbolt, N.(2004).Trust strategies for the semantic web.Proceedings 3rd International Semantic Web Conferrence (ISWC), Workshop on Trust, Security, and Reputationon the Semantic Web,Hiroshima, Japan:
-
Pirzada, A. A.,Datta, A.,McDonald, C.(2004).Propagating trust in ad-hoc networks for reliable routing.Proceedings of the International Workshop on Wireless Ad-Hoc Networks
-
Ra, J. W.(1999).Chainwise paired comparisons.Decision Science,30(2),581-599.
-
Ramchurn, S. D.,Jennings, N. R.,Sierra, C.,Godo, L.(2003).A computational trust model for multi-agent interactions based on confidence and reputation.Proceedings of 6th International Workshop on Deception, Fraud and Trust in Agent Societies,Melbourne, Australia:
-
Saaty, T. L.(1994).Fundamentals of Decision Making with the Analytic Hierarchy Process.Pittsburgh:RWS Publications.
-
Saaty, T. L.(1990).Decision making for leaders-the analytic hierarchy process for decision in a complex world.Pittsburgh:RWS Publications.
-
Wang, Y.,Vassileva, J.(2003).Bayesian network-based trust model.Proceedings of IEEE/WIC International Conference on Web Intelligence
-
Yu, B.,Singh, M. P.(2000).Trust and reputation management in a small-world network.Proceedings of 4th International Conference on MultiAgent system
-
Zheng, X.,Wu, Z.,Chen , H.,Mao, Y.(2006).A scalable probabilistic approach to trust evaluation.Proceedings of the fourth International Conference on Trust Management
-
張欽森(2005)。碩士論文(碩士論文)。國立臺灣科技大學營建工程系。
-
畢威寧(2005)。結合AHP與TOPSIS法於供應商績效評估之研究。科學與工程技術期刊,1(1),75-83。
-
許雅婷(2008)。碩士論文(碩士論文)。國立臺灣科技大學建築系。
-
劉玉枚、楊壽保、陳萬明、郭磊濤、韋冬(2008)。P2P系統中基於信譽感知的超級節點選擇算法研究。中國科學院研究生院學報,25(2),197-203。
-
盧盈蓉(2009)。碩士論文(碩士論文)。國立交通大學資訊管理研究所。
|