Abstract
Service-based interactions have become common over the past few years. Nowadays, their applications are visible in several forms including e-commerce, Virtual Organizations, Grid, and Cloud Computing. Proliferation of services leads to the creation of new value-added services composed of several sub-services in a pre-specified manner, known as service workflows. One important challenge is how to ensure security from the viewpoints of both workflow owners and participating services; each of which possesses its own requirements. Although there are a number of proposals regarding this, the comprehensive trust and security requirements are still immature. The intuition to develop a solution generic to service workflows is that workflow and trust characteristics must be incorporated. This article studies on the relationship of workflow characteristics with respect to trust, and then trust and security requirements for service collaborations are synthesized.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Altunay, M., Brown, D., Byrd, G., Dean, R.: Trust-based Secure Workflow Path Construction. In: Benatallah, B., Casati, F., Traverso, P. (eds.) ICSOC 2005. LNCS, vol. 3826, pp. 382–395. Springer, Heidelberg (2005)
Arenas, A.E.: Survey material on trust and security in grids. CoreGRID Project Deliverable D.IA.03 (2005)
Botha, R.A., Eloff, J.H.P.: A security interpretation of the workflow reference model. In: von Solms, R., Eloff, J.H.P. (eds.) Proceedings of WG 11.2 and WG 11.1 of IFIP TC11, Information Security – from Small Systems to Management of Infrastructures, Vienna, Austria, vol. 2, pp. 43–50 (September 2, 1998)
Das, S., Kochut, K., Miller, J., Sheth, A., Worah, D.: Orbwork: A reliable distributed corba-based workflow enactment system for meteor2 (1996)
Dogac, A., Ozsu, T., Kalinichenko, L. (eds.): Workflow Management Systems and Interoperability, 1st edn. Springer-Verlag New York, Inc., Secaucus (2001)
Ellis, C., Keddara, K., Rozenberg, G.: Dynamic change within workflow systems. In: Proceedings of Conference on Organizational Computing Systems, COCS 1995, pp. 10–21. ACM, New York (1995)
Fox, G., Gannon, D.: Workflow in grid systems. In: Concurrency and Computation: Practice and Experience, pp. 1009–1019 (2006)
Hang, C.-W., Singh, M.P.: Trustworthy service selection and composition. ACM Trans. Auton. Adapt. Syst. 6, 1–17 (2011)
Hayes, J.G., Peyrovian, E., Sarin, S., Schmidt, M.-T., Swenson, K.D., Weber, R.: Workflow interoperability standards for the internet. IEEE Internet Computing 4, 37–45 (2000)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision (2006)
Kagal, L., Finin, T., Peng, Y.: A delegation based model for distributed trust (2001)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International Conference on World Wide Web, WWW 2003, pp. 640–651. ACM, New York (2003)
Kim, Y., Doh, K.-G.: Trust type based semantic web services assessment and selection. In: Proc. 10th Int. Conf. Advanced Communication Technology ICACT 2008, vol. 3, pp. 2048–2053 (2008)
Koshutanski, H.: A survey on distributed access control systems for web business processes. I. J. Network Security 9(1), 61–69 (2009)
Kuntze, N., Schmidt, A.U., Velikova, Z., Rudolph, C.: Trust in business processes. In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, pp. 1992–1997. IEEE Computer Society, Hunan (2008)
Kuntze, N., Schutte, J.: Securing decentralized workflows in ambient environments. In: Proc. IEEE/IFIP Int. Conf. Embedded and Ubiquitous Computing EUC 2008, vol. 2, pp. 361–366 (2008)
Lorch, M., Adams, D.B., Kafura, D., Koneni, M.S.R., Rathi, A., Shah, S.: The prima system for privilege management, authorization and enforcement in grid environments. In: Proceedings of the 4th International Workshop on Grid Computing, GRID 2003, p. 109. IEEE Computer Society, Washington, DC, USA (2003)
Lu, Y., Zhang, L., Sun, J.: Types for task-based access control in workflow systems. IET Software 2(5), 461–473 (2008)
Lynch, C.A.: When documents deceive: trust and provenance as new factors for information retrieval in a tangled web. J. Am. Soc. Inf. Sci. Technol. 52, 12–17 (2001)
Marinescu, D.C.: A grid workflow management architecture. GGF White Paper (2002)
Moodahi, I., Gudes, E., Lavee, O., Meisels, A.: A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 171–186. Springer, Heidelberg (2004)
Moreau, L., Chapman, S., Schreiber, A., Hempel, R., Varga, L., Cortes, U., Willmott, S.: Provenance-based trust for grid computing position paper (2004)
Muth, P., Wodtke, D., Weinenfels, J., Dittrich, A.K., Weikum, G.: From centralized workflow specification to distributed workflow execution. Journal of Intelligent Information Systems 10, 159–184 (1998)
Naqvi, S., Coregrid, T.: A study of languages for the specification of grid security policies 1. Technical Report TR0037 (2006)
Pagani, D.S., Pareschi, R.: Generalized process structure grammars gpsg for flexible representations of work. In: Conference on Computer Supported Cooperative Work, pp. 180–189 (1996)
Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: Bringing order to the web (1998)
Pearlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S.: A community authorization service for group collaboration. In: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), p. 50. IEEE Computer Society, Washington, DC, USA (2002)
Qiu, Z.M., Wong, Y.S.: Dynamic workflow change in pdm systems. Comput. Ind. 58, 453–463 (2007)
Rajbhandari, S., Rana, O.F., Wootten, I.: A fuzzy model for calculating workflow trust using provenance data. In: Proceedings of the 15th ACM Mardi Gras Conference: From Lightweight Mash-ups to Lambda Grids: Understanding the Spectrum of Distributed Computing Requirements, Applications, Tools, Infrastructures, Interoperability, and the Incremental Adoption of Key Capabilities, MG 2008, pp. 10:1–10:8. ACM, New York (2008)
Ramchurn, S., Sierra, C., Godo, L., Jennings, N.R.: A computational trust model for multi-agent interactions based on confidence and reputation. In: 6th International Workshop of Deception, Fraud and Trust in Agent Societies, pp. 69–75 (2003)
Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multi-agent systems. The Knowledge Engineering Review 19 (2004)
Sabater, J., Sierra, C.: Regret: A reputation model for gregarious societies (2000)
Sarin, S.K.: Object-oriented workflow technology in inconcert. In: COMPCON, pp. 446–450 (1996)
Simmhan, Y.L., Plale, B., Gannon, D.: A survey of data provenance in e-science. Sigmod Record 34, 31–36 (2005)
Stevens, R.D., Robinson, A.J., Goble, C.A.: myGrid: personalised bioinformatics on the information grid. Bioinformatics 19(suppl. 1) (2003)
Viriyasitavat, W.: Modeling delegation in requirements-driven trust framework. In: Proc. World Conf. Services - I, pp. 522–529 (2009)
Viriyasitavat, W., Martin, A.: Formal trust specification in service workflows. In: Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010, pp. 703–710. IEEE Computer Society, Washington, DC, USA (2010)
Viriyasitavat, W., Martin, A.: Towards the relationship of trust properties and workflow characteristics. To be published in the 7th Asian Internet Engineering Conference (AINTEC) (2011)
Witkowski, M., Artikis, A., Pitt, J.: Experiments in building experiential trust in a society of objective-trust based agents. In: Autonomous Agents & Multiagent Systems/International Conference on Autonomous Agents, pp. 111–132 (2000)
Wodtke, D., Weikum, G.: A formal foundation for distributed workflow execution based on state charts. In: International Conference on Database Theory, pp. 230–246 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Viriyasitavat, W., Martin, A. (2011). In the Relation of Workflow and Trust Characteristics, and Requirements in Service Workflows. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_42
Download citation
DOI: https://doi.org/10.1007/978-3-642-25327-0_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25326-3
Online ISBN: 978-3-642-25327-0
eBook Packages: Computer ScienceComputer Science (R0)