Skip to main content

In the Relation of Workflow and Trust Characteristics, and Requirements in Service Workflows

  • Conference paper
Informatics Engineering and Information Science (ICIEIS 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 251))

Abstract

Service-based interactions have become common over the past few years. Nowadays, their applications are visible in several forms including e-commerce, Virtual Organizations, Grid, and Cloud Computing. Proliferation of services leads to the creation of new value-added services composed of several sub-services in a pre-specified manner, known as service workflows. One important challenge is how to ensure security from the viewpoints of both workflow owners and participating services; each of which possesses its own requirements. Although there are a number of proposals regarding this, the comprehensive trust and security requirements are still immature. The intuition to develop a solution generic to service workflows is that workflow and trust characteristics must be incorporated. This article studies on the relationship of workflow characteristics with respect to trust, and then trust and security requirements for service collaborations are synthesized.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Altunay, M., Brown, D., Byrd, G., Dean, R.: Trust-based Secure Workflow Path Construction. In: Benatallah, B., Casati, F., Traverso, P. (eds.) ICSOC 2005. LNCS, vol. 3826, pp. 382–395. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Arenas, A.E.: Survey material on trust and security in grids. CoreGRID Project Deliverable D.IA.03 (2005)

    Google Scholar 

  3. Botha, R.A., Eloff, J.H.P.: A security interpretation of the workflow reference model. In: von Solms, R., Eloff, J.H.P. (eds.) Proceedings of WG 11.2 and WG 11.1 of IFIP TC11, Information Security – from Small Systems to Management of Infrastructures, Vienna, Austria, vol. 2, pp. 43–50 (September 2, 1998)

    Google Scholar 

  4. Das, S., Kochut, K., Miller, J., Sheth, A., Worah, D.: Orbwork: A reliable distributed corba-based workflow enactment system for meteor2 (1996)

    Google Scholar 

  5. Dogac, A., Ozsu, T., Kalinichenko, L. (eds.): Workflow Management Systems and Interoperability, 1st edn. Springer-Verlag New York, Inc., Secaucus (2001)

    Google Scholar 

  6. Ellis, C., Keddara, K., Rozenberg, G.: Dynamic change within workflow systems. In: Proceedings of Conference on Organizational Computing Systems, COCS 1995, pp. 10–21. ACM, New York (1995)

    Chapter  Google Scholar 

  7. Fox, G., Gannon, D.: Workflow in grid systems. In: Concurrency and Computation: Practice and Experience, pp. 1009–1019 (2006)

    Google Scholar 

  8. Hang, C.-W., Singh, M.P.: Trustworthy service selection and composition. ACM Trans. Auton. Adapt. Syst. 6, 1–17 (2011)

    Article  Google Scholar 

  9. Hayes, J.G., Peyrovian, E., Sarin, S., Schmidt, M.-T., Swenson, K.D., Weber, R.: Workflow interoperability standards for the internet. IEEE Internet Computing 4, 37–45 (2000)

    Article  Google Scholar 

  10. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision (2006)

    Google Scholar 

  11. Kagal, L., Finin, T., Peng, Y.: A delegation based model for distributed trust (2001)

    Google Scholar 

  12. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International Conference on World Wide Web, WWW 2003, pp. 640–651. ACM, New York (2003)

    Google Scholar 

  13. Kim, Y., Doh, K.-G.: Trust type based semantic web services assessment and selection. In: Proc. 10th Int. Conf. Advanced Communication Technology ICACT 2008, vol. 3, pp. 2048–2053 (2008)

    Google Scholar 

  14. Koshutanski, H.: A survey on distributed access control systems for web business processes. I. J. Network Security 9(1), 61–69 (2009)

    Google Scholar 

  15. Kuntze, N., Schmidt, A.U., Velikova, Z., Rudolph, C.: Trust in business processes. In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, pp. 1992–1997. IEEE Computer Society, Hunan (2008)

    Chapter  Google Scholar 

  16. Kuntze, N., Schutte, J.: Securing decentralized workflows in ambient environments. In: Proc. IEEE/IFIP Int. Conf. Embedded and Ubiquitous Computing EUC 2008, vol. 2, pp. 361–366 (2008)

    Google Scholar 

  17. Lorch, M., Adams, D.B., Kafura, D., Koneni, M.S.R., Rathi, A., Shah, S.: The prima system for privilege management, authorization and enforcement in grid environments. In: Proceedings of the 4th International Workshop on Grid Computing, GRID 2003, p. 109. IEEE Computer Society, Washington, DC, USA (2003)

    Google Scholar 

  18. Lu, Y., Zhang, L., Sun, J.: Types for task-based access control in workflow systems. IET Software 2(5), 461–473 (2008)

    Article  Google Scholar 

  19. Lynch, C.A.: When documents deceive: trust and provenance as new factors for information retrieval in a tangled web. J. Am. Soc. Inf. Sci. Technol. 52, 12–17 (2001)

    Article  Google Scholar 

  20. Marinescu, D.C.: A grid workflow management architecture. GGF White Paper (2002)

    Google Scholar 

  21. Moodahi, I., Gudes, E., Lavee, O., Meisels, A.: A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 171–186. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  22. Moreau, L., Chapman, S., Schreiber, A., Hempel, R., Varga, L., Cortes, U., Willmott, S.: Provenance-based trust for grid computing position paper (2004)

    Google Scholar 

  23. Muth, P., Wodtke, D., Weinenfels, J., Dittrich, A.K., Weikum, G.: From centralized workflow specification to distributed workflow execution. Journal of Intelligent Information Systems 10, 159–184 (1998)

    Article  Google Scholar 

  24. Naqvi, S., Coregrid, T.: A study of languages for the specification of grid security policies 1. Technical Report TR0037 (2006)

    Google Scholar 

  25. Pagani, D.S., Pareschi, R.: Generalized process structure grammars gpsg for flexible representations of work. In: Conference on Computer Supported Cooperative Work, pp. 180–189 (1996)

    Google Scholar 

  26. Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: Bringing order to the web (1998)

    Google Scholar 

  27. Pearlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S.: A community authorization service for group collaboration. In: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), p. 50. IEEE Computer Society, Washington, DC, USA (2002)

    Chapter  Google Scholar 

  28. Qiu, Z.M., Wong, Y.S.: Dynamic workflow change in pdm systems. Comput. Ind. 58, 453–463 (2007)

    Article  Google Scholar 

  29. Rajbhandari, S., Rana, O.F., Wootten, I.: A fuzzy model for calculating workflow trust using provenance data. In: Proceedings of the 15th ACM Mardi Gras Conference: From Lightweight Mash-ups to Lambda Grids: Understanding the Spectrum of Distributed Computing Requirements, Applications, Tools, Infrastructures, Interoperability, and the Incremental Adoption of Key Capabilities, MG 2008, pp. 10:1–10:8. ACM, New York (2008)

    Google Scholar 

  30. Ramchurn, S., Sierra, C., Godo, L., Jennings, N.R.: A computational trust model for multi-agent interactions based on confidence and reputation. In: 6th International Workshop of Deception, Fraud and Trust in Agent Societies, pp. 69–75 (2003)

    Google Scholar 

  31. Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multi-agent systems. The Knowledge Engineering Review 19 (2004)

    Google Scholar 

  32. Sabater, J., Sierra, C.: Regret: A reputation model for gregarious societies (2000)

    Google Scholar 

  33. Sarin, S.K.: Object-oriented workflow technology in inconcert. In: COMPCON, pp. 446–450 (1996)

    Google Scholar 

  34. Simmhan, Y.L., Plale, B., Gannon, D.: A survey of data provenance in e-science. Sigmod Record 34, 31–36 (2005)

    Article  Google Scholar 

  35. Stevens, R.D., Robinson, A.J., Goble, C.A.: myGrid: personalised bioinformatics on the information grid. Bioinformatics 19(suppl. 1) (2003)

    Google Scholar 

  36. Viriyasitavat, W.: Modeling delegation in requirements-driven trust framework. In: Proc. World Conf. Services - I, pp. 522–529 (2009)

    Google Scholar 

  37. Viriyasitavat, W., Martin, A.: Formal trust specification in service workflows. In: Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010, pp. 703–710. IEEE Computer Society, Washington, DC, USA (2010)

    Chapter  Google Scholar 

  38. Viriyasitavat, W., Martin, A.: Towards the relationship of trust properties and workflow characteristics. To be published in the 7th Asian Internet Engineering Conference (AINTEC) (2011)

    Google Scholar 

  39. Witkowski, M., Artikis, A., Pitt, J.: Experiments in building experiential trust in a society of objective-trust based agents. In: Autonomous Agents & Multiagent Systems/International Conference on Autonomous Agents, pp. 111–132 (2000)

    Google Scholar 

  40. Wodtke, D., Weikum, G.: A formal foundation for distributed workflow execution based on state charts. In: International Conference on Database Theory, pp. 230–246 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Viriyasitavat, W., Martin, A. (2011). In the Relation of Workflow and Trust Characteristics, and Requirements in Service Workflows. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25327-0_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25326-3

  • Online ISBN: 978-3-642-25327-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics