Modeling and Negotiating Service Quality

  • Salima Benbernou
  • Ivona Brandic
  • Cinzia Cappiello
  • Manuel Carro
  • Marco Comuzzi
  • Attila Kertész
  • Kyriakos Kritikos
  • Michael Parkin
  • Barbara Pernici
  • Pierluigi Plebani

Abstract

In this chapter the research problems of specifying and negotiating QoS and its corresponding quality documents are analyzed. For this reason, this chapter is separated into two main sections, Section 6.1 and 6.2, with each dedicated to one of the two problems, i.e., QoS specification and negotiation, respectively. Each section has a similar structure: they first introduce the problem and then, in the remaining subsections, review related work. Finally, the chapter ends with Section 6.3, which identifies research gaps and presents potential research challenges in QoS modelling, specification and negotiation.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    The GEMSS project: Grid-enabled medical simulation services, EU IST project, ist-2001-37153, http://www.gemss.de/
  2. 2.
    OGF grid resource allocation agreement protocol working group website: https://forge.gridforum.org/sf/projects/graap-wg
  3. 3.
    OGF grid scheduling architecture research group website: https://forge.gridforum.org/sf/projects/gsa-rg
  4. 4.
    Interactive Access Control for Web Services. Kluwer (2004)Google Scholar
  5. 5.
    Ajayi, O., Sinnott, R., Stell, A.: Dynamic trust negotiation for flexible e-health collaborations. In: Proceedings of the 15th ACM Mardi Gras conference (MG), pp. 1–7. ACM Press, New York (2008)Google Scholar
  6. 6.
    Arenas, A., Wilson, M., Matthews, B.: On trust management in grids. In: Proceedings of the 1st international conference on Autonomic computing and communication systems (Autonomics’07), pp. 1–7. ICST, Brussels, Belgium, Belgium, 2007. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2007)Google Scholar
  7. 7.
    Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. Web Semant. 5(2), 58–71 (2007)CrossRefGoogle Scholar
  8. 8.
    S. Bajaj, D. Box, D. Chappell, F. Curbera, G. Daniels, P. Hallam-Baker, M. Hondo, C. Kaler, D. Langworthy, A. Nadalin, N. Nagaratnam, H. Prafullchandra, C. von Riegen, D. Roth, J. Schlimmer, C. Sharp, J. Shewchuk, A. Vedamuthu, C.Ü. Yal D. Orchard. Web Services Policy Framework (WS-Policy). IBM (March 2006)Google Scholar
  9. 9.
    Becker, M., Sewell, P.: Cassandra: Distributed access control policies with tunable expressiveness. In: POLICY ’04: Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, Washington, DC, USA, p. 159. IEEE Computer Society (2004)Google Scholar
  10. 10.
    Benbernou, S., Brandic, I., Cappiello, C., Carro, M., Comuzzi, M., Kertész, A., Kritikos, K., Parkin, M., Pernici, B., Plebani, P.: A Survey on Service Quality Description. ACM Computing Surveys, submitted (2009)Google Scholar
  11. 11.
    Benbernou, S., Meziane, H., Li, Y.H., Hacid, M.-S.: A privacy agreement model for web services. In: IEEE SCC, pp. 196–203. IEEE Computer Society Press (2007)Google Scholar
  12. 12.
    Benkner, S., Engelbrecht, G., Middleton, S.E., Brandic, I., Schmidt, R.: End-to-End QoS support for a medical grid service infrastructure. New Generation Computing, Special Issue on Life Science Grid Computing (2007)Google Scholar
  13. 13.
    Bertino, E., Ferrari, E., Squicciarini, A.: X-TNL: An XML-based language for trust negotiations. In: POLICY ’03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, page 81, Washington, DC, USA, IEEE Computer Society (2003)Google Scholar
  14. 14.
    Bertino, E., Ferrari, E., Squicciarini, A.: Trust negotiations: concepts, systems, and languages. Computing in Science and Engineering 6(4), 27–34 (2004)CrossRefGoogle Scholar
  15. 15.
    Bertino, E., Ferrari, E., Squicciarini, A.: Trust negotiations: Concepts, systems, and languages. Computing in Science and Engineering 06(4), 27–34 (2004)CrossRefGoogle Scholar
  16. 16.
    Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-X: A peer-to-peer framework for trust establishment. IEEE Transactions on Knowledge and Data Engineering, TKDE 16(7), 827–842 (2004)CrossRefGoogle Scholar
  17. 17.
    Bhargav-Spantzel, A., Squicciarini, A.C., Bertino, E.: Trust negotiation in identity management. IEEE Security and Privacy 5(2), 55–63 (2007)CrossRefGoogle Scholar
  18. 18.
    Blazic, A.J., Dolinar, K., Porekar, J.: Enabling privacy in pervasive computing using fusion of privacy negotiation, identity management and trust management techniques. In: First International Conference on the Digital Society (ICDS 2007), Guadeloupe, French Caribbean, 2-6 January 2007, Springer, Heidelberg (2007)Google Scholar
  19. 19.
    Bradshaw, R.W., Holt, J.E., Seamons, K.E.: Concealing complex policies with hidden credentials. In: Proceedings of the 11th ACM conference on Computer and communications security CCS ’04, Washingtion, DC, USA, pp. 146–157. ACM Press (2004)Google Scholar
  20. 20.
    Brandic, I., Pllana, S., Benkner, S.: An approach for the high-level specification of QoS-aware grid workflows considering location affinity. Scientific Programming Journal 14(3-4), 231–250 (2006)CrossRefGoogle Scholar
  21. 21.
    Brandic, I., Pllana, S., Benkner, S.: Specification, planning, and execution of QoS-aware grid workflows within the Amadeus environment. Concurrency and Computation: Practice and Experience 20(4), 331–345 (2008)CrossRefGoogle Scholar
  22. 22.
    Chhetri, M.B., Lin, J., Goh, S., Yan, J., Zhang, J.Y., Kowalczyk, R.: A coordinated architecture for the Agent-based Service Level agreement Negotiation of Web service composition. In: Proc. 2006 Australian Software Engineering Conference, ASWEC’06 (2006)Google Scholar
  23. 23.
    Chhetri, M.B., Lin, J., Goh, S., Zhang, J.Y., Kowalczyk, R., Yan, J.: A coordinated architecture for the agent-based service level agreement negotiation ofweb service composition. In: ASWEC ’06: Proceedings of the Australian Software Engineering Conference, Washington, DC, USA, pp. 90–99. IEEE Computer Society (2006)Google Scholar
  24. 24.
    Chiu, D.K.W., Cheung, S.C.: Patrick C.K. Hung, and Ho fung Leung. Facilitating e-negotiation processes with semantic web technologies. In: HICSS ’05: Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS’05) - Track 1, Washington, DC, USA, p. 36.1. IEEE Computer Society (2005)Google Scholar
  25. 25.
    Chung, L., Nixon, B., Yu, E., Mylopoulos, J.: Non-Functional Requirements in Software Engineering. Kluwer Academic Publishers, Dordrecht (2000)CrossRefMATHGoogle Scholar
  26. 26.
    Comuzzi, M., Pernici, B.: An architecture for flexible Web service QoS negotiation. In: Proceedings of the 9th IEEE Enterprise Computing Conference, Enschede, The Netherlands (2005)Google Scholar
  27. 27.
    Cortés, A.R., Martín-Díaz, O., Toro, A.D., Toro, M.: Improving the Automatic Procurement of Web Services Using Constraint Programming. Int. J. Cooperative Inf. Syst. 14(4), 439–468 (2005)CrossRefGoogle Scholar
  28. 28.
    Czajkowski, K., Foster, I., Kesselman, C., Sander, V., Tuecke, S.: SNAP: A protocol for negotiating service level agreements and coordinating resource management in distributed systems. In: Feitelson, D.G., Rudolph, L., Schwiegelshohn, U. (eds.) JSSPP 2002. LNCS, vol. 2537, pp. 153–183. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  29. 29.
    Degwekar, S., Su, S.Y.W., Lam, H.: Constraint specification and processing in web services publication and discovery. In: ICWS, pp. 210–217. IEEE Computer Society (2004)Google Scholar
  30. 30.
    Di Nitto, E., Di Penta, M., Gambi, A., Ripa, G., Villani, M.L.: Negotiation of Service Level Agreements: An Architecture and a Search-Based Approach. In: Krämer, B.J., Lin, K.-J., Narasimhan, P. (eds.) ICSOC 2007. LNCS, vol. 4749, pp. 295–306. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  31. 31.
    Dobson, G., Lock, R., Sommerville, I.: QoSOnt: a QoS ontology for service-centric systems. In: EUROMICRO ’05: Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications, Porto, Portugal, pp. 80–87. IEEE Computer Society (2005)Google Scholar
  32. 32.
    Dragoni, N., Massacci, F.: Security-by-contract for web services. In: Proceedings of the 2007 ACM workshop on Secure web services (SWS ’07), New York, NY, USA, pp. 90–98. ACM (2007)Google Scholar
  33. 33.
    El-Khatib, K., von Bochmann, G.: Protecting the privacy of user’s qos preferences for multimedia applications. In: Proceedings of the 2nd ACM international workshop on Wireless multimedia networking and performance modeling (WMuNeP ’06), New York, NY, USA, pp. 35–42. ACM (2006)Google Scholar
  34. 34.
    Faratin, P., Sierra, C., Jennings, N.R.: Negotiation decision functions for autonomous agents. Int. Journal of Robotics and Autonomous Systems 23(3-4), 159–182 (1998)CrossRefGoogle Scholar
  35. 35.
    Faratin, P., Sierra, C., Jennings, N.R.: Negotiation decision functions for autonomous agents. Int. Journal of Robotics and Autonomous Systems 24(3-4), 159–182 (1998)CrossRefGoogle Scholar
  36. 36.
    Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)CrossRefGoogle Scholar
  37. 37.
    FIPA. FIPA standard status specifications, http://www.fipa.org/repository/standardspecs.html
  38. 38.
    Document Title Fipa. FIPA Communicative Act Library Specification (2003)Google Scholar
  39. 39.
    Frikken, K., Atallah, M., Li, J.: Hidden access control policies with hidden credentials. In: Proceedings of the 2004 ACM workshop on Privacy in the electronic society (WPES ’04), New York, NY, USA, pp. 27–28. ACM (2004)Google Scholar
  40. 40.
    Frølund, S., Koistinen, J.: Quality of services specification in distributed object systems design. In: COOTS’98: Proceedings of the 4th conference on USENIX Conference on Object-Oriented Technologies and Systems (COOTS), 5(4), pp. 179–202 (1998)Google Scholar
  41. 41.
    Garofalakis, J., Panagis, Y., Sakkopoulos, E., Tsakalidis, A.: Contemporary Web Service Discovery Mechanisms. Journal of Web Engineering 5(3), 265–290 (2006)Google Scholar
  42. 42.
    Gavriloaie, R., Nejdl, W., Olmedilla, D., Seamons, K., Winslett, M.: No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web (2004)Google Scholar
  43. 43.
    Giallonardo, E., Zimeo, E.: More semantics in QoS matching. In: International Conference on Service-Oriented Computing and Applications, Newport Beach, CA, USA, pp. 163–171. IEEE Computer Society (2007)Google Scholar
  44. 44.
    Gimpel, H., Ludwig, H., Dan, A., Kearney, B.: PANDA: Specifying policies for automated negotiations of service contracts. In: Orlowska, M.E., Weerawarana, S., Papazoglou, M.P., Yang, J. (eds.) ICSOC 2003. LNCS, vol. 2910, pp. 287–302. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  45. 45.
    Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys and Tutorials 3(4), http://www.comsoc.org/livepubs/surveys/public/2000/dec/index.html
  46. 46.
    He, Y., Zhu, M.: A complete and efficient strategy based on Petri Nets in automated trust negotiation. In: Proceedings of the 2nd international conference on Scalable information systems (InfoScale), pp. 1–7, ICST, Brussels, Belgium, Belgium, 2007. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2007)Google Scholar
  47. 47.
    Hobbs, J.R., Pan, F.: An ontology of time for the semantic web. ACM Trans. Asian Lang. Inf. Process. 3(1), 66–85 (2004)CrossRefGoogle Scholar
  48. 48.
    Huai, J., Sun, H., Hu, C., Zhu, Y., Liu, Y., Li, J.: Rost: Remote and hot service deployment with trustworthiness in crown grid. Future Generation Computer Systems 23(6), 825–835 (2007)CrossRefGoogle Scholar
  49. 49.
    Irwin, K., Yu, T.: Preventing attribute information leakage in automated trust negotiation. In: Proceedings of the 12th ACM conference on Computer and communications security (CCS ’05), New York, NY, USA, pp. 36–45. ACM (2005)Google Scholar
  50. 50.
    Jennings, N.R., Faratin, P., Lomuscio, A.R., Parsons, S., Wooldridge, M.J., Sierra, C.: Automated negotiation: Prospects, methods and challenges. Group Decision and Negotiation 10(2), 199–215 (2001)CrossRefGoogle Scholar
  51. 51.
    Keller, A., Ludwig, H.: The WSLA framework: Specifying and monitoring service level agreements for web services. Journal of Network and Systems Management 11(1), 57–81 (2003)CrossRefGoogle Scholar
  52. 52.
    Koshutanski, H., Massacci, F.: Interactive credential negotiation for stateful business processes. In: iTrust, pp. 256–272 (2005)Google Scholar
  53. 53.
    Kritikos, K., Plexousakis, D.: Semantic qos metric matching. In: ECOWS ’06: Proceedings of the European Conference on Web Services, Zurich, Switzerland, pp. 265–274. IEEE Computer Society (2006)Google Scholar
  54. 54.
    Kritikos, K., Plexousakis, D.: Semantic QoS-based web service discovery algorithms. In: ECOWS ’07: Proceedings of the Fifth European Conference on Web Services, Halle, Germany, pp. 181–190. IEEE Computer Society (2007)Google Scholar
  55. 55.
    Kritikos, K., Plexousakis, D.: Requirements for QoS-based Web Service Description and Discovery. IEEE Transactions on Services Computing, accepted (2009)Google Scholar
  56. 56.
    Lai, G., Li, C., Sycara, K., Giampapa, J.A.: Literature review on multi-attribute negotiations. Technical Report CMU-RI-TR-04-66, Robotics Institute, Carnegie Mellon University, Pittsburgh, PA (December 2004)Google Scholar
  57. 57.
    Lamparter, S., Luckner, S., Mutschelr, S.: Formal specification of Web service contracts for automated contracting and monitoring. In: Proceedings of the 40th Hawaii International Conference on System Sciences, Honolulu, Hawaii, pp. 63–73 (2007)Google Scholar
  58. 58.
    Lamparter, S., Luckner, S., Mutschler, S.: Formal specification of web service contracts for automated contracting and monitoring. In: HICSS ’07: Proceedings of the 40th Annual Hawaii International Conference on System Sciences, Washington, DC, USA, IEEE Computer Society (2007)Google Scholar
  59. 59.
    Lee, A., Winslett, M., Basney, J., Welch, V.: Traust: a trust negotiation-based authorization service for open systems. In: SACMAT ’06: Proceedings of the eleventh ACM symposium on Access control models and technologies, New York, ACM (2006)Google Scholar
  60. 60.
    Lee, A.J., Winslett, M., Basney, J., Welch, V.: The Traust authorization service. ACM Trans. Inf. Syst. Secur. 11(1), 1–33 (2008)CrossRefGoogle Scholar
  61. 61.
    Li, J., Huai, J., Xu, J., Zhu, Y., Xue, W.: Tower: Practical trust negotiation framework for grids. In: Second IEEE International Conference on e-Science and Grid Computing (e-Science’06), 0:26 (2006)Google Scholar
  62. 62.
    Li, N., Mitchell, J.: Rt: A role-based trust-management framework. In: The Third DARPA Information Survivability Conference and Exposition (DISCEX III) (April 2003)Google Scholar
  63. 63.
    Liu, Y., Ngu, A.H.H., Zeng, L.: QoS computation and policing in dynamic web service selection. In: Feldman, S.I., Uretsky, M., Najork, M., Wills, C.E. (eds.) WWW (Alternate Track Papers & Posters), pp. 66–73. ACM Press, New York (2004)Google Scholar
  64. 64.
    Ludwig, H., Keller, A., Dan, A., King, R.P., Franck, R.: Web Service Level Agreement (WSLA) Language Specification. Technical report, IBM Corporation (2003)Google Scholar
  65. 65.
    Mani, A., Nagarajan, A.: Understanding quality of service for web services (2002), http://www-128.ibm.com/developerworks/library/ws-quality.html
  66. 66.
    Masolo, C., Borgo, S., Gangemi, A., Guarino, N., Oltramari, A., Schneider, L.: Wonderweb deliverable d17. the wonderweb library of foundational ontologies and the dolce ontologyGoogle Scholar
  67. 67.
    Maximilien, E.M., Singh, M.P.: Conceptual model of web service reputation. SIGMOD Rec. 31(4), 36–41 (2002)CrossRefGoogle Scholar
  68. 68.
    Maximilien, E.M., Singh, M.P.: A framework and ontology for dynamic web services selection. IEEE Internet Computing 8(5), 84–93 (2004)CrossRefGoogle Scholar
  69. 69.
    Mbanaso, U.M., Cooper, G.S., Chadwick, D.W., Proctor, S.: Privacy preserving trust authorization framework using XACML. In: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM’06), pp. 673–678. IEEE (2006)Google Scholar
  70. 70.
    Menascé, D., Dubey, V.: Utility-based QoS brokering in service oriented architectures. In: Proceedings of the 2007 International Conference on Web services (2007)Google Scholar
  71. 71.
    Mukhi, N.K., Plebani, P.: Supporting policy-driven behaviors in Web services: experiences and issues. In: Proceedings of the 2nd International Conference on Service Oriented Computing, New York, NY (2004)Google Scholar
  72. 72.
    Nadalin, A., Goodner, M., Gudgin, M., Barbir, A., Granqvist, H.: WS-Trust specification. Technical report. OASIS Working Draft (2007), http://www.ibm.com/developerworks/webservices/library/specification/ws-trust
  73. 73.
    Ncho, A., Aimeur, E.: Building a multi-agent system for automated negotiation in Web service applications. In: Proc. of AAMAS’04 (2004)Google Scholar
  74. 74.
    Oldham, N., Verma, K., Sheth, A., Hakimpour, F.: Semantic WS-agreement partner selection. In: WWW ’06: Proceedings of the 15th International conference on World Wide Web, Edinburgh, Scotland, pp. 697–706. ACM Press, New York (2006)CrossRefGoogle Scholar
  75. 75.
    Oldham, N., Verma, K., Sheth, A., Hakimpour, F.: Semantic WS-agreement partner selection. In: WWW ’06: Proceedings of the 15th international conference on World Wide Web, New York, NY, USA, pp. 697–706. ACM (2006)Google Scholar
  76. 76.
    Oliver-Lalana, A.D.: Consent as a threat. A critical approach to privacy negotiation in e-commerce practices. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 110–119. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  77. 77.
    Olmedilla, D., Lara, R., Polleres, A., Lausen, H.: Trust Negotiation for Semantic Web Services. In: Cardoso, J., Sheth, A.P. (eds.) SWSWPC 2004. LNCS, vol. 3387, pp. 81–95. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  78. 78.
    Olson, L.E., Rosulek, M.J., Winslett, M.: Harvesting credentials in trust negotiation as an honest-but-curious adversary. In: Proceedings of the 2007 ACM workshop on Privacy in electronic society (WPES ’07), New York, NY, USA, pp. 64–67. ACM (2007)Google Scholar
  79. 79.
    Olson, L., Winslett, M., Tonti, G., Seeley, N., Uszok, A., Bradshaw, J.: Trust negotiation as an authorization service forweb services. In: ICDEW ’06: Proceedings of the 22nd International Conference on Data Engineering Workshops, Washington, DC, USA, IEEE Computer Society (2006)Google Scholar
  80. 80.
    O’Sullivan, J., Edmond, D., ter Hofstede, A.H.M.: Formal description of non-functional service properties. Technical report, Queensland University of Technology (2005)Google Scholar
  81. 81.
    Bonatti, P., Samarati, P.: Regulating service access and information release on the web. In: CCS ’00: Proceedings of the 7th ACM conference on Computer and communications security, New York, NY, pp. 134–143. ACM (2000)Google Scholar
  82. 82.
    Preibusch, S.: Implementing privacy negotiations in E-commerce. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol. 3841, pp. 604–615. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  83. 83.
    Ran, S.: A model for web services discovery with QoS. SIGecom Exch. 4(1), 1–10 (2003)CrossRefGoogle Scholar
  84. 84.
    Ran, S.: A model for web services discovery with qos. SIGecom Exch. 4(1), 1–10 (2003)CrossRefGoogle Scholar
  85. 85.
    Redman, T.C.: Data Quality for the Information Age (Foreword By - Blanton Godfrey, A.). Artech House, Inc., Norwood (1997)Google Scholar
  86. 86.
    Ruohomaa, S., Kutvonen, L.: Trust management survey. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 77–92. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  87. 87.
    Ryutov, T., Zhou, L., Neuman, C., Leithead, T., Seamons, K.E.: Adaptive trust negotiation and access control. In: Proceedings of the tenth ACM symposium on Access control models and technologies (SACMAT ’05), New York, NY, USA, pp. 139–146. ACM (2005)Google Scholar
  88. 88.
    Sabata, B., Chatterjee, S., Davis, M., Sydir, J.J., Lawrence, T.F.: Taxonomy for QoS Specifications. In: Third International Workshop on Object-Oriented Real-Time Dependable Systems, 1997. Proceedings, 5-7 Feb. 1997, pp. 100–107 (1997)Google Scholar
  89. 89.
    Sahai, A., Durante, A., Machiraju, V.: Towards Automated SLA Management for Web Services. Technical Report HPL-2001-310, HP Laboratories, Palo Alto, CA (July 2002)Google Scholar
  90. 90.
    Sakellariou, R., Yarmolenko, V.: On the flexibility of WS-Agreement for job submission. In: Proceedings of the 3rd International Workshop on Middleware for Grid Computing, MGC’05 (2005)Google Scholar
  91. 91.
    Sakellariou, R., Yarmolenko, V.: Job Scheduling on the Grid: Towards SLA-Based Scheduling. In: High Performance Computing and Grids in Action (March 2008)Google Scholar
  92. 92.
    Seamons, K.E., Winslett, M., Yu, T., Yu, L., Jarvis, R.: Protecting privacy during on-line trust negotiation. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 129–143. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  93. 93.
    Seidel, J., Wäldrich, O., Ziegler, W., Wieder, P., Yahyapour, R.: a survey. Using SLA for resource management and scheduling. Technical report, TR-0096, Institute on Resource Management and Scheduling, CoreGRID - Network of Excellence (August. 2007)Google Scholar
  94. 94.
    Shen, H., Hong, F.: An attribute-based access control model for web services. In: Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), pp. 74–79 (2006)Google Scholar
  95. 95.
    Skogsrud, H., Benatallah, B., Casati, F.: Trust-Serv: Model-driven lifecycle management of trust negotiation policies for web services. In: Proc. 13th World Wide Web Conf. (May 2004)Google Scholar
  96. 96.
    Sommerville, I.: Software Engineering, 4th edn. Addison-Wesley, Reading (1992)MATHGoogle Scholar
  97. 97.
    Squicciarini, A., Bertino, E., Ferrari, E., Paci, F., Thuraisingham, B.: PP-trust-X: A system for privacy preserving trust negotiations. ACM Transactions on Information and System Security (TISSEC) 10(3), 12 (2007)CrossRefGoogle Scholar
  98. 98.
    Strong, D.M., Lee, Y.W., Wang, R.Y.: 10 potholes in the road to information quality. Computer 30(8), 38–46 (1997)CrossRefGoogle Scholar
  99. 99.
    Sycara, K., et al.: OWL-S 1.0 Release. OWL-S Coalition (2003), http://www.daml.org/services/owl-s/1.0/
  100. 100.
    The OASIS Group. Quality model for web services. Technical report, The Oasis Group (September 2005)Google Scholar
  101. 101.
    The OMG Group. UMLTM Profile for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms. Technical Report ptc/2005-05-02, The OMG Group (May 2005)Google Scholar
  102. 102.
    Tian, M., Gramm, A., Nabulsi, M., Ritter, H., Schiller, J., Voigt, T.: Qos integration in web services. In: Gesellschaft fur Informatik DWS 2003, Doktorandenworkshop Technologien und Anwendungen von XML (October 2003)Google Scholar
  103. 103.
    Tosic, V., Esfandiari, B., Pagurek, B., Patel, K.: On requirements for ontologies in management of web services. In: Bussler, C.J., McIlraith, S.A., Orlowska, M.E., Pernici, B., Yang, J. (eds.) CAiSE 2002 and WES 2002. LNCS, vol. 2512, pp. 237–247. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  104. 104.
    Tosic, V., Pagurek, B., Patel, K.: WSOL - A language for the formal specification of classes of service for web services. In: Zhang, L.-J. (ed.) ICWS, June 2003, pp. 375–381. CSREA Press (2003)Google Scholar
  105. 105.
    Tosic, V., Patel, K., Pagurek, B.: WSOL - web service offerings language. In: Bussler, C.J., McIlraith, S.A., Orlowska, M.E., Pernici, B., Yang, J. (eds.) CAiSE 2002 and WES 2002. LNCS, vol. 2512, pp. 57–67. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  106. 106.
    Tsesmetzis, D.T., Roussaki, I.G., Papaioannou, I.V., Anagnostou, M.E.: Qos awareness support in web-service semantics. In: AICT-ICIW ’06: Proceedings of the Advanced Int’l Conference on Telecommunications and Int’l Conference on Internet and Web Applications and Services, Guadeloupe, French Caribbean, pp. 128–134. IEEE Computer Society, Google Scholar
  107. 107.
    Uszok, A., Bradshaw, J., Jeffers, R., Suri, N., Hayes, P., Breedy, M., Bunch, L., Johnson, M., Kulkarni, S., Lott, J.: Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In: POLICY ’03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, Washington, DC, USA, IEEE Computer Society (2003)Google Scholar
  108. 108.
    Wang, X., Vitvar, T., Kerrigan, M., Toma, I.: A qoS-aware selection model for semantic web services. In: Dan, A., Lamersdorf, W. (eds.) ICSOC 2006. LNCS, vol. 4294, pp. 390–401. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  109. 109.
    Winsborough, W.H., Li, N.: Safety in automated trust negotiation. ACM Transactions on Information and System Security (TISSEC) 9(3), 352–390 (2006)CrossRefGoogle Scholar
  110. 110.
    Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: The TrustBuilder architecture for trust negotiation. IEEE Internet Computing 6(6), 30–37 (2002)CrossRefGoogle Scholar
  111. 111.
    Winslett, M., Zhang, C.C., Bonatti, P.A.: Peeraccess: a logic for distributed authorization. In: CCS ’05: Proceedings of the 12th ACM conference on Computer and communications security, pp. 168–179, New York, NY, USA. ACM (2005)Google Scholar
  112. 112.
    WS-AGREEMENT. WS-Agreement Framework (September 2003), https://forge.gridforum.org/projects/graap-wg
  113. 113.
    Yan, J., Zhang, J.Y., Chhetri, M.B., Lin, J., Goh, S., Kowalczyk, R.: Towards autonomous service level agreement negotiation for adaptvive service composition. In: Proc. 10th Int. Conf. on Computer Supported Cooperative Work in Design (2006)Google Scholar
  114. 114.
    Yu, T., Winslett, M.: Policy migration for sensitive credentials in trust negotiation. In: Proceedings of the 2003 ACM workshop on Privacy in the electronic society (WPES ’03), New York, NY, USA, pp. 9–20. ACM (2003)Google Scholar
  115. 115.
    Yu, T., Winslett, M., Seamons, K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6(1), 1–42 (2003)CrossRefGoogle Scholar
  116. 116.
    Zhang, S., Makedon, F.: Privacy preserving learning in negotiation. In: Proceedings of the 2005 ACM symposium on Applied computing (SAC ’05), New York, NY, USA, pp. 821–825. ACM (2005)Google Scholar
  117. 117.
    Zhou, C., Chia, L.-T., Lee, B.-S.: Daml-qos ontology for web services. In: ICWS ’04: Proceedings of the IEEE International Conference on Web Services (ICWS’04), San Diego, CA, USA, pp. 472–479. IEEE Computer Society (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Salima Benbernou
    • 1
  • Ivona Brandic
    • 2
  • Cinzia Cappiello
    • 3
  • Manuel Carro
    • 4
  • Marco Comuzzi
    • 3
  • Attila Kertész
    • 5
  • Kyriakos Kritikos
    • 3
  • Michael Parkin
    • 6
  • Barbara Pernici
    • 6
  • Pierluigi Plebani
    • 3
  1. 1.Université Claude BernardLyonFrance
  2. 2.Technische Universität WienViennaAustria
  3. 3.Politecnico di MilanoItaly
  4. 4.Universidad Politécnica de MadridSpain
  5. 5.MTA Computer & Automation Research Institute (MTA-SZTAKI)BudapestHungary
  6. 6.Tilburg UniversityThe Netherlands

Personalised recommendations