[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1967486.1967499acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

A dynamic web service-based trust and reputation scheme for scientific workflows

Published: 08 November 2010 Publication History

Abstract

Scientific workflows and Web Services have been utilized as a means to promote cooperation among researchers in the area of e-Science. These designs execute over distributed scientific nodes and resources so as to facilitate large scale and complex scientific experiments. These distributed environments using collaborative paradigms based on Web Services and workflow technologies, have specific security requirements. Current research has focused on security requirements of a distributed scientific laboratory (e-lab), such as data confidentiality and integrity, controlled access to resources, and auditing. However, no work exists that investigates trust and reputation of the scientific nodes cooperating in the laboratory. We propose a trust and reputation scheme that operates over such a distributed e-lab environment. The trust and reputation scheme enables the process owner to assess the behavior of nodes by aggregating the number of successful activity executions and detecting malicious or unreliable behavior.

References

[1]
Brooke, J. M. and Parkin, M. S. 2008. Enabling scientific collaboration on the Grid. In Future Generation Computer Systems, 3, 1.
[2]
Rudolph, C., Kuntze, N., and Velikova, Z. 2009. Secure web service workflow Execution. In Electronic Notes in Theoretical Computer Science (ENTCS), 236 (April 2009), 33--46.
[3]
Lee, J. Y., Lee, S., Kim, K., and Kim, H. 2006. Processcentric engineering web services in a distributed and collaborative environment. Computers and Industrial Engineering, 51, 2, 297--308.
[4]
Gong, R. N., Li, Q., Ning, K., Chen, Y. L., and O'Sullivan, D. 2006. Business process collaboration using semantic interoperability: Review and framework. In Asian Semantic Web Conference, Beijing, China, 2006, 191--204.
[5]
Chen, M., Zhang, D. S., and Zhou, L. 2007. Empowering collaborative commerce with web service enabled business process management systems. Decision Support Systems, 43, 2, 530--546.
[6]
Lu, Y., Zhang, L., and Sun, J. 2009. Task-activity based access control for process collaboration environments. Computers in Industry, 2, 9.
[7]
Coulouris, G., Doullimore, J., and Roberts, M. 1998. Role and task based access control in the Perdis groupware platform. In proceedings of 3th ACM Workshop on Role based access control, USA, 115--121.
[8]
Ahn, G. J. and Sandhu, R. S. 2000. Injecting RBAC to secure web-based workflow system. In Proceedings of 5th ACM Workshop on Role Based Access Control, Berlin, 1--10.
[9]
Vagts, H. 2007. Control Flow Enforcement in Workflows in the Presence of Exceptions. Master's thesis, TU Darmstadt (2007). http://www.sec.informatik.tudarmstadt.de/pages/dipl/docs/finished/vagts_diplom.pdf
[10]
Biskup, J., Carminati, B., Ferrari, E., Muller, F., and Wortmann, S. 2007. Towards secure execution orders for composite web services. In proceedings of ICWS'07, 489--496.
[11]
Rudolph, C., Kuntze, N., and Velikova, Z. 2009. Secure web service workflow execution. Electronic Notes in Theoretical Computer Science, 236, 1, 33--46.
[12]
Charfi, A., and Mezini, M. 2005. An aspect based process container for BPEL. In Proc. of AOMD'05, 2005.
[13]
Adams, W. J., Hadjichristofi, G. C, and Davis, N. J. 2005. Calculating a Node's Reputation in a Mobile Ad Hoc Network. In Proceedings of the 24th IEEE Performance, Computing, and Communications Conference (IPCCC), April 2005, 303--307.
[14]
Dessì, N., Fugini, M. G., and Pes, B. 2009. A Distributed Trust and Reputation Framework for Scientific Grids. In Proc. RCIS'09 Conf., Fez, April 22--24.
[15]
Bosin, A., Dessì, N., Fugini, M. G., and Pes, B. 2008. Cooperative E-Organizations for Distributed Bioinformatics Experiments. In Proc. of the 9th Conference on Intelligent Data Engineering and Automated Learning (IDEAL 2008). Daejeon, Korea, LNCS, 5326 (November 2008), 306--313.
[16]
Dessì, N., Fugini, M. G., and Balachandar R. A. 2008. Policies and Security Aspects for Distributed Scientific Laboratories. IFIP SEC'2008 Conference, IFIP World Computer Congress, Milano, (Sept. 2008).
[17]
Sculf, http://www.gridworkflow.org/snips/gridworkflow/space/SCUFL, available May 2010.
[18]
myGrid open source E-science environment http://www.mygrid.org.uk/, available May 2010

Cited By

View all
  • (2011)Trusted Services for Risk Management in Work EnvironmentsProceedings of the 2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering10.1109/MUE.2011.41(177-182)Online publication date: 28-Jun-2011

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
iiWAS '10: Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
November 2010
895 pages
ISBN:9781450304214
DOI:10.1145/1967486
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • IIWAS: International Organization for Information Integration
  • Web-b: Web-b

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 November 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. scientific workflows
  2. security
  3. trust and reputation
  4. virtual organization
  5. web services

Qualifiers

  • Research-article

Conference

iiWAS '10
Sponsor:
  • IIWAS
  • Web-b

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2011)Trusted Services for Risk Management in Work EnvironmentsProceedings of the 2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering10.1109/MUE.2011.41(177-182)Online publication date: 28-Jun-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media