A Socially Inspired Reputation Model

In recent years we have observed a huge evolution of services deployed over the Internet, in particular by the World Wide Web; the development of Web Services has enabled Business-to-Business (B2B) relationships, i.e., the exchange of services over the Internet between different, possibly mutually distrustful, organisations.

[1]  C. Peltz,et al.  Web Services Orchestration and Choreography , 2003, Computer.

[2]  Daniel W. Manchala E-Commerce Trust Metrics and Models , 2000, IEEE Internet Comput..

[3]  Muthucumaru Maheswaran,et al.  Towards Trust-Aware Resource Management in Grid Computing Systems , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).

[4]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[5]  Ueli Maurer,et al.  Modelling a Public-Key Infrastructure , 1996, ESORICS.

[6]  Christopher Peltz Web Service orchestration and choreography: a look at WSCI and BPEL4WS-Feature , 2003 .

[7]  Dieter Gollmann,et al.  Computer Security — ESORICS 94 , 1994, Lecture Notes in Computer Science.

[8]  Thomas Beth,et al.  Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[9]  Muthucumaru Maheswaran,et al.  Evolving and managing trust in grid computing systems , 2002, IEEE CCECE2002. Canadian Conference on Electrical and Computer Engineering. Conference Proceedings (Cat. No.02CH37373).

[10]  Elisa Bertino,et al.  Computer Security — ESORICS 96 , 1996, Lecture Notes in Computer Science.

[11]  Nicola Mezzetti Towards a model for trust relationships in virtual enterprises , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[12]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[13]  Vladimiro Sassone,et al.  A formal model for trust in dynamic networks , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..

[14]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[15]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[16]  Nicola Mezzetti Enabling Trust-Awareness in Naming Services , 2004, TrustBus.

[17]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[18]  Jean Bacon,et al.  Access control and trust in the use of widely distributed services , 2001, Softw. Pract. Exp..

[19]  Germano Caronni,et al.  Walking the Web of trust , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).

[20]  Matjaz B. Juric,et al.  Business process execution language for web services , 2004 .

[21]  Muthucumaru Maheswaran,et al.  Integrating trust into grid resource management systems , 2002, Proceedings International Conference on Parallel Processing.

[22]  Steven Hand,et al.  Managing Trust and Reputation in the XenoServer Open Platform , 2003, iTrust.