Fine-Grained Recommendation Systems for Service Attribute Exchange

  • Christopher Staite
  • Rami Bahsoon
  • Stephen Wolak
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5900)


The effectiveness of service oriented computing relies on the trustworthiness of sharing of data between services. We advocate a semi-automated approach for information distribution and sharing, assisted by a reputation system. Unlike current recommendation systems which provide a user with a general trust value for a service, we propose a reputation model which calculates trust neighbourhoods through fine-grained multi-attribute analysis. Such a model allows a recommendation relevance to improve whilst maintaining a large user group, propagating and evolving trust perceptions between users. The approach is demonstrated on a small example.


Recommendation System Attribute Exchange Reputation System Oblivious Transfer Reputation Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Erdos, M., Cantor, S.: Shibboleth architecture draft v05 (2002),
  2. 2.
    Recordon, D., Reed, D.: Openid 2.0: a platform for user-centric identity management. In: DIM 2006: Proceedings of the second ACM workshop on Digital identity management, pp. 11–16. ACM, New York (2006)CrossRefGoogle Scholar
  3. 3.
    Cantor, S., Kemp, J., Philpott, R., Maler, E.: Assertions and protocols for the oasis security assertion markup language (saml) v2.0 (2005),
  4. 4.
    Atwood, M., Conlan, R.M., Cook, B., Culver, L., Elliott-McCrea, K., Halff, L., Hammer-Lahav, E., Laurie, B., Messina, C., Panzer, J., Quigley, S., Recordon, D., Sandler, E., Sergent, J., Sieling, T., Slesinsky, B., Smith, A.: OAuth Core 1.0. Technical report (2007)Google Scholar
  5. 5.
    Hardt, D., Bufu, J., Hoyt, J.: Openid atrribute exchange 1.0 - final (2007),
  6. 6.
    Cheng, W., Li, J., Moore, K., Karp, A.H.: A customer-centric privacy protection framework for mobile service-oriented architectures. In: IEEE International Conference on Services Computing, SCC 2008, Honolulu, HI, vol. 2, pp. 13–20 (2008)Google Scholar
  7. 7.
    Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: MobiSys 2004: Proceedings of the 2nd international conference on Mobile systems, applications, and services, pp. 177–189. ACM, New York (2004)CrossRefGoogle Scholar
  8. 8.
    Herlocker, J.L., Konstan, J.A., Borchers, A., Riedl, J.: An algorithmic framework for performing collaborative filtering. In: SIGIR 1999: Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, pp. 230–237. ACM, New York (1999)CrossRefGoogle Scholar
  9. 9.
    Kinateder, M., Rothermel, K.: Architecture and algorithms for a distributed reputation system. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 1–16. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  10. 10.
    Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities, vol. 1, p. 9 (2000)Google Scholar
  11. 11.
    Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Commun. ACM 43, 45–48 (2000)CrossRefGoogle Scholar
  12. 12.
    Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 618–644 (2007) Emerging Issues in Collaborative CommerceCrossRefGoogle Scholar
  13. 13.
    Pfitzmann, B., Waidner, M.: Privacy in browser-based attribute exchange. In: WPES 2002: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, pp. 52–62. ACM, New York (2002)CrossRefGoogle Scholar
  14. 14.
    Camenisch, J., Shelat, A., Sommer, D., Fischer-Hübner, S., Hansen, M., Krasemann, H., Lacoste, G., Leenes, R., Tseng, J.: Privacy and identity management for everyone. In: DIM 2005: Proceedings of the 2005 workshop on Digital identity management, pp. 20–27. ACM, New York (2005)CrossRefGoogle Scholar
  15. 15.
    Pettersson, J.S., Fischer-Hübner, S., Danielsson, N., Nilsson, J., Bergmann, M., Clauss, S., Kriegelstein, T., Krasemann, H.: Making PRIME usable. In: Proceedings of the 2005 symposium on Usable privacy and security, pp. 53–64. ACM, New York (2005)CrossRefGoogle Scholar
  16. 16.
    Fujiwara, S., Komura, T., Okabe, Y.: A privacy oriented extension of attribute exchange in shibboleth. In: IEEE/IPSJ International Symposium on Applications and the Internet Workshops, p. 28 (2007)Google Scholar
  17. 17.
    Takagi, T., Komura, T., Miyazaki, S., Okabe, Y.: Privacy oriented attribute exchange in shibboleth using magic protocols, pp. 293–296 (2008)Google Scholar
  18. 18.
    Rabin, M.: How to exchange secrets by oblivious transfer. Technical report, Technical Report TR-81, Harvard Aiken Computation Laboratory (1981)Google Scholar
  19. 19.
    Resnick, P., Iacovou, N., Suchak, M., Bergstrom, P., Riedl, J.: Grouplens: an open architecture for collaborative filtering of netnews. In: CSCW 1994: Proceedings of the 1994 ACM conference on Computer supported cooperative work, pp. 175–186. ACM, New York (1994)CrossRefGoogle Scholar
  20. 20.
    Sarwar, B., Karypis, G., Konstan, J., Reidl, J.: Item-based collaborative filtering recommendation algorithms. In: WWW 2001: Proceedings of the 10th international conference on World Wide Web, pp. 285–295. ACM, New York (2001)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Christopher Staite
    • 1
  • Rami Bahsoon
    • 1
  • Stephen Wolak
    • 2
  1. 1.School of Computer ScienceUniversity of BirminghamUnited Kingdom
  2. 2.Vodafone Group PlcNewburyUnited Kingdom

Personalised recommendations