FORMALIZING TRUST REQUIREMENTS AND SPECIFICATION IN SERVICE WORKFLOW ENVIRONMENTS

Wattana Viriyasitavat, Andrew Martin

2011

Abstract

The emergence of advance communication technologies such as Internet has changed the nature of face-to-face towards virtual interactions in the form of services. Proliferation of services has enabled the creation of new value-added services composed of several sub-services in a pre-specified manner, known as service workflows. There are a number of security issues as workflows require disparate services to dynamically collaborate and interact on demand. Trust is an enabling technology serving as an adaptive and platform-independent solution that fits in this context. However, the lack of consensus on a unified trust definition and the traditional mindset of treating trust requirements separately pose the difficulty in developing formal specification. This paper provides a formal framework to this problem. The central part of the paper is logic based formalism with algebraic expressions to formally specify trust requirements. A trust definition and three modes of trust are described with algebraic operators to form specification formulae. The contribution of the framework is to allow trust requirements to be formally and uniformly specified by each distributed autonomous service, serving as a core component for automatic compliance checking in service workflows.

References

  1. Altunay, M., Brown, D., Byrd, G., Dean, R., 2005. TrustBased Secure Workflow Path Construction, In Proc. Of Intl. Conf. on Service Oriented Computing.
  2. Altunay, M., Brown, D., Byrd, G., Dean, R., 2005. TrustBased Secure Workflow Path Construction, In Proc. Of Intl. Conf. on Service Oriented Computing.
  3. Best, E., Devillers, R., Koutny, M., 2001. Petri Net Algebra, EATCS Monographs on Theoretical Computer Science. Springer-Verlag.
  4. Best, E., Devillers, R., Koutny, M., 2001. Petri Net Algebra, EATCS Monographs on Theoretical Computer Science. Springer-Verlag.
  5. Davulcu, H., Kifer, M., Pokorny, L., Ramakrishnan, C. R., Ramakrishnan, I. V., Dawson, S., 1999. Modeling and Analysis of Interactions in Virtual Enterprises.
  6. Davulcu, H., Kifer, M., Pokorny, L., Ramakrishnan, C. R., Ramakrishnan, I. V., Dawson, S., 1999. Modeling and Analysis of Interactions in Virtual Enterprises.
  7. Falcone, R., Pezzulo, G., Castelfranchi, C., 2003. A fuzzy approach to a belief-based trust computation, In Lecture Notes on Artificial Intelligence.
  8. Falcone, R., Pezzulo, G., Castelfranchi, C., 2003. A fuzzy approach to a belief-based trust computation, In Lecture Notes on Artificial Intelligence.
  9. Guha, R., Kumar, R., Raghavan, P., Tomkins, A., 2004. Propagation of trust and distrust, In Proc. of the 13th Intl. conf. on World Wide Web, ACM.
  10. Guha, R., Kumar, R., Raghavan, P., Tomkins, A., 2004. Propagation of trust and distrust, In Proc. of the 13th Intl. conf. on World Wide Web, ACM.
  11. Galizia, S., Gugliotta, A., Domingue, J., 2007. A trust based methodology for web service selection, In Proc. of the Intl. Conf. on Semantic Computing.
  12. Galizia, S., Gugliotta, A., Domingue, J., 2007. A trust based methodology for web service selection, In Proc. of the Intl. Conf. on Semantic Computing.
  13. Jaeger, T., Tidswell, J. E., 2001. Practical Safety in Flexible Access Control Models, ACM Transactions on Information and System Security.
  14. Jaeger, T., Tidswell, J. E., 2001. Practical Safety in Flexible Access Control Models, ACM Transactions on Information and System Security.
  15. Jøsang, A., Marsh, S., Pope, S., 2006. Exploring different types of trust propagation, In Proc. of the 4th Intl. Conf. on Trust Management.
  16. Jøsang, A., Marsh, S., Pope, S., 2006. Exploring different types of trust propagation, In Proc. of the 4th Intl. Conf. on Trust Management.
  17. Klai, K., Tata, S., 2005. Abstraction-based Workflow Cooperation Using Petri Net Theory, In Proc of the 14th IEEE Intl. Workshops on Enabling Technologies: infrastructure For Collaborative Enterprise.
  18. Klai, K., Tata, S., 2005. Abstraction-based Workflow Cooperation Using Petri Net Theory, In Proc of the 14th IEEE Intl. Workshops on Enabling Technologies: infrastructure For Collaborative Enterprise.
  19. Kuntze, N., Sch, J., 2008. Securing Decentralized Workflows in Ambient Environments, In Intl. Conf. on Embedded and Ubiquitous Computing, IEEE/IFIP.
  20. Kuntze, N., Sch, J., 2008. Securing Decentralized Workflows in Ambient Environments, In Intl. Conf. on Embedded and Ubiquitous Computing, IEEE/IFIP.
  21. Marsh S., 1994. Formalising Trust as a Computational Concept. PhD thesis, University of Stirling\.
  22. Marsh S., 1994. Formalising Trust as a Computational Concept. PhD thesis, University of Stirling\.
  23. Nyanchama, M., Osborn, S., 1999. The Role Graph Model and Conflict of Interest, ACM Transaction on Information System Security.
  24. Nyanchama, M., Osborn, S., 1999. The Role Graph Model and Conflict of Interest, ACM Transaction on Information System Security.
  25. O'Donovan, J., Smyth, B., 2005. Trust in recommender systems, In Proc. of the 10th Intl. Conf. on Intelligent User Interfaces.
  26. O'Donovan, J., Smyth, B., 2005. Trust in recommender systems, In Proc. of the 10th Intl. Conf. on Intelligent User Interfaces.
  27. Salimifard, K., Wright, M., 2001. Petri-Net based Modeling of Workflow Systems: An Overview. European Journal of Operational Research.
  28. Salimifard, K., Wright, M., 2001. Petri-Net based Modeling of Workflow Systems: An Overview. European Journal of Operational Research.
  29. Olmedilla, D., Rana, O., Matthews, B., Nejdl, W., 2005. Security and trust issues in semantic grids, In Proc. of the Dagsthul Seminar, Semantic Grid: The Convergence of Technologies.
  30. Olmedilla, D., Rana, O., Matthews, B., Nejdl, W., 2005. Security and trust issues in semantic grids, In Proc. of the Dagsthul Seminar, Semantic Grid: The Convergence of Technologies.
  31. Van der Aalst, W. M. P., 1998. Chapter 10: Three Good reasons for Using a Petri-net-based Workflow Management System. In T. Wakayama, S. Kannapan, C. M. Khoong, S. Navathe, and J. Yates, editors, Information and Process Integration in Enterprises: Rethinking Documents, Vol 428 of the Kluwer Intl. Series in Engineering and Computer Science.
  32. Van der Aalst, W. M. P., 1998. Chapter 10: Three Good reasons for Using a Petri-net-based Workflow Management System. In T. Wakayama, S. Kannapan, C. M. Khoong, S. Navathe, and J. Yates, editors, Information and Process Integration in Enterprises: Rethinking Documents, Vol 428 of the Kluwer Intl. Series in Engineering and Computer Science.
  33. Van der Aalst, W. M. P., 2004. Pi calculus versus petri nets: Let us eat”humble pie” rather than further inflate the ”pi hype”.
  34. Van der Aalst, W. M. P., 2004. Pi calculus versus petri nets: Let us eat”humble pie” rather than further inflate the ”pi hype”.
  35. Viriyasitavat, W., 2009. Modeling Delegation in Requirements-Driven Trust Framework. In Congress on Services- I.
  36. Viriyasitavat, W., 2009. Modeling Delegation in Requirements-Driven Trust Framework. In Congress on Services- I.
  37. Viriyasitavat, W., Martin, A., 2010. Formal trust specification in Service Workflows, In IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
  38. Viriyasitavat, W., Martin, A., 2010. Formal trust specification in Service Workflows, In IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
Download


Paper Citation


in Harvard Style

Viriyasitavat W. and Martin A. (2011). FORMALIZING TRUST REQUIREMENTS AND SPECIFICATION IN SERVICE WORKFLOW ENVIRONMENTS . In Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-989-8425-55-3, pages 196-206. DOI: 10.5220/0003479501960206


in Harvard Style

Viriyasitavat W. and Martin A. (2011). FORMALIZING TRUST REQUIREMENTS AND SPECIFICATION IN SERVICE WORKFLOW ENVIRONMENTS . In Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-989-8425-55-3, pages 196-206. DOI: 10.5220/0003479501960206


in Bibtex Style

@conference{iceis11,
author={Wattana Viriyasitavat and Andrew Martin},
title={FORMALIZING TRUST REQUIREMENTS AND SPECIFICATION IN SERVICE WORKFLOW ENVIRONMENTS },
booktitle={Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2011},
pages={196-206},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003479501960206},
isbn={978-989-8425-55-3},
}


in Bibtex Style

@conference{iceis11,
author={Wattana Viriyasitavat and Andrew Martin},
title={FORMALIZING TRUST REQUIREMENTS AND SPECIFICATION IN SERVICE WORKFLOW ENVIRONMENTS },
booktitle={Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2011},
pages={196-206},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003479501960206},
isbn={978-989-8425-55-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - FORMALIZING TRUST REQUIREMENTS AND SPECIFICATION IN SERVICE WORKFLOW ENVIRONMENTS
SN - 978-989-8425-55-3
AU - Viriyasitavat W.
AU - Martin A.
PY - 2011
SP - 196
EP - 206
DO - 10.5220/0003479501960206


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - FORMALIZING TRUST REQUIREMENTS AND SPECIFICATION IN SERVICE WORKFLOW ENVIRONMENTS
SN - 978-989-8425-55-3
AU - Viriyasitavat W.
AU - Martin A.
PY - 2011
SP - 196
EP - 206
DO - 10.5220/0003479501960206