Aggregation and Optimisation of Trustworthiness of Composite Services

  • Hisain Elshaafi
  • Jimmy McGibney
  • Dmitri Botvich
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8900)


The chapter presents the Aniketos approach to aggregating and predicting the trustworthiness of services that are assembled from component services. Some of the important characteristics of service environments are that they are dynamic, distributed and loosely coupled. These characteristics result in the existence of different levels of functional and non-functional attributes of the services operating in such environments. Consequently, it creates challenges for interacting service consumers that require to only deal with services that are trustworthy. In service compositions, the component services may be mandatory or optional and vary in their contribution to the trustworthiness of the composite service. Composition techniques must be able to select trustworthy components and to dynamically adapt to subsequent changes in the services and the environment. The availability of multiple services providing the same or similar functionality but with different trustworthiness levels helps composite service providers to establish and maintain trustworthy compositions.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Sabater, J.: Trust and reputation for agent societies, PhD dissertation, Universitat Autònoma de Barcelona (2002)Google Scholar
  2. 2.
    Huynh, T.D.: Trust and Reputation in Open Multi-Agent Systems, PhD dissertation, University of Sourthampton (2006)Google Scholar
  3. 3.
    Noorian, Z., Ulieru, M.: The State of the Art in Trust and Reputation Systems A Framework for Comparison. J. Theoretical and Applied Electronic Commerce Research (2010)Google Scholar
  4. 4.
    Khalid, O., Khan, S.U., Madani, S.A., Hayat, K., Khan, M.I.: Comparative study of trust and reputation systems for wireless sensor networks. J. Security and Communication Networks 6(6), 669–688 (2013)CrossRefGoogle Scholar
  5. 5.
    Hoffman, K., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Computing Surveys 42(1), 1–31 (2009)CrossRefGoogle Scholar
  6. 6.
    WS-Trust specification document, (February 2009)
  7. 7.
    Singhal, A., Winograd, T., Scarfone, K.: Guide to Secure Web Services, National Institute of Standards and Technology, Technical Report (August 2007)Google Scholar
  8. 8.
    Malik, Z., Bouguettaya, A.: Trust Management for Service Oriented Environments. Springer (2009)Google Scholar
  9. 9.
    Takabi, H., Joshi, J., Ahn, G.: Security and Privacy Challenges in Cloud Computing Environments. IEEE Security and Privacy 8(6), 24–31 (2010)CrossRefGoogle Scholar
  10. 10.
    Paradesi, S., Doshi, P., Swaika, S.: Integrating Behavioral Trust in Web Service Compositions. In: 2009 IEEE Int. Conf. Web Services, pp. 453–460 (2009)Google Scholar
  11. 11.
    Hang, C.-W., Singh, M.P.: Trustworthy Service Selection and Composition. ACM Trans. Autonomous and Adaptive Systems 6(1), 1–18 (2011)CrossRefGoogle Scholar
  12. 12.
    Lee, G.-G., Lin, H.-F.: Customer perceptions of e-service quality in online shopping. Int. J. Retail & Distribution Management 33(2), 161–176 (2005)CrossRefGoogle Scholar
  13. 13.
    Li, H., Suomi, R.: A Proposed Scale for Measuring E-service Quality. Int. J. u-and e-Service 2(1), 1–10 (2009)Google Scholar
  14. 14.
    Parasuraman, A., Zeithaml, V., Berry, L.: SERVQUAL: A multiple-item scale for measuring consumer perceptions of service quality. J. Retailing 64(1), 12–40 (1988)Google Scholar
  15. 15.
    Udo, G.J., Bagchi, K.K., Kirs, P.J.: An assessment of customers’ e-service quality perception, satisfaction and intention. Int. J. Information Management 30(6), 481–492 (2010)CrossRefGoogle Scholar
  16. 16.
    Ciszkowski, T., Mazurczyk, W., Kotulski, Z., Hoßfeld, T., Fiedler, M., Collange, D.: Towards Quality of Experience-based reputation models for future web service provisioning. Telecommunication Systems 51(4), 283–295 (2012)CrossRefGoogle Scholar
  17. 17.
    Moser, O., Rosenberg, F., Dustdar, S.: Non-Intrusive Monitoring and Service Adaptation for WS-BPEL. In: Proc. 17th Int. Conf. World Wide Web, pp. 815–824 (2008)Google Scholar
  18. 18.
    Hwang, S., Wang, H., Tang, J., Srivastava, J.: A probabilistic approach to modeling and estimating the QoS of web-services-based workflows. Information Science J. 177(23), 5484–5503 (2007)zbMATHCrossRefGoogle Scholar
  19. 19.
    Grassi, V., Patella, S.: Reliability prediction for service-oriented computing environments. Internet Computing 10(3), 43–49 (2006)CrossRefGoogle Scholar
  20. 20.
    Elshaafi, H., Mcgibney, J., Botvich, D.: Trustworthiness Monitoring and Prediction of Composite Services. In: Proc. 17th IEEE Symposium on Computers and Communications, pp. 580–587 (July 2012)Google Scholar
  21. 21.
    Elshaafi, H., Botvich, D.: Aggregation of Trustworthiness Properties of BPMN-based Composite Services. In: Proc. 17th IEEE Int. Workshop on Computer-Aided Modeling Analysis and Design of Communication Links and Networks (September 2012)Google Scholar
  22. 22.
    Bianco, V., Lavazza, L., Morasca, S., Taibi, D.: A Survey on Open Source Software Trustworthiness. In: IEEE Software (2011)Google Scholar
  23. 23.
    Object Management Group, Business Process Model and Notation (BPMN) 2.0,
  24. 24.
    Weske, M.: Business Process Management. Concepts, Languages, Architectures, 2nd edn. Springer (2012)Google Scholar
  25. 25.
    Russell, N., ter Hofstede, A.H.M., van der Aalst, W.M.P., Mulyar, N.: Workflow Control-Flow Patterns: A Revised View, BPM Center Report BPM-06-22 (2006),
  26. 26.
    Workflow Patterns Initiative,
  27. 27.
    Steel, C., Nagappan, R., Lai, R.: Core Security Patterns: Best Practices and Strategies for J2EE, Web Services and Identity Management, Pearson Education (2006)Google Scholar
  28. 28.
    Rehman, Z.U., Hussain, F.K., Hussain, O.K.: Towards Multi-criteria Cloud Service Selection. In: Proc. 5th Int. Conf. Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 44–48 (June 2011)Google Scholar
  29. 29.
    OSGi Alliance Specifications,
  30. 30.
    Drools - The Business Logic integration Platform,

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Hisain Elshaafi
    • 1
  • Jimmy McGibney
    • 1
  • Dmitri Botvich
    • 1
  1. 1.Telecommunications Software and Systems GroupWaterford Institute of TechnologyWaterfordIreland

Personalised recommendations