address Flow-oriented Property Specification (R4)
and Protection of Data (R7).
CASE 3: Trust in Service Provider. The
Information service S
is willing to provide the
service right after making a payment, and requires
that the transactions must be originated from S
and S
. The formal specification is given as
ℬ(A
(
ε,S
,ε,∅
)
)∧ℬ(∀◊(A
(
ε,S
,ε,∅
)
))) ∧
((∀ ◊ (A
(
ε,S
,ε,∅
)
))). The first term
ℬ(A
(
ε,S
,ε,∅
)
) describes all services directly
connected to S
must be the Payment service type
(S
), while the later two terms restrict the flow to be
originated from S
and S
. This falls in the BPT
mode where the trust values are β
→
, β
→
and β
→
. The first term illustrates our approach
can address Enforcement of Sequences (R5). (Due to
the page limits, the explanation of the remaining
cases is discussed briefly)
CASE 4: Trust in Service Provisions. The
Insurance service S
requires that the Private Online
Agent services must be involved in all paths. In this
case, there are no private agents presented in the
workflow which make this requirement contradicts
with the satisfiability check. This can result in two
consequences either the service S
changes the
requirement in order to participate in the workflow
or decides not to participate. Alternatively, the
workflow owner might replace the service S
to
avoid the conflict, or adjust the workflow to comply
with this requirement.
CASE 5: Existence Trust. Suppose that Tom
wants to participate in the workflow by letting one
of his apartments. He creates the service S
and
purchases the service S
for the Room Booking
process. Tom trusts the payment service S
that have
to be connected right after the service S
. He has
no concern with path from S
to S
. This formula
falls into the ET mode and represents Enforcement
of Sequences (R5).
8 ANALYSIS OF TS
Interoperability with Local Security Requirements
(R1): Obviously, the TS formula is a formal
approach enabling Interoperability with Local
Security Requirements since it allows each service
to uniformly express its own requirements to other
services.
Separation of Duty (R2): Although not illustrated by
the example cases, our TS can address this specific
requirement. For example, in a financial audit
scenario, the annual financial statement must be
audited by two different auditing companies. In this
case, it is not necessary to precisely identify the
specific companies, but instead have to make sure
that they are not the same. The atomic proposition
can be extended by introducing a dummy variable d
as ℬA
(
(
d
,ε,,ε,
{
audit
}
)
⊓(
(
~d
,ε,,ε,{audit}
)
)).
It means that two different services must be present
to execute the audit task. The remaining trust
requirements (R3-R7) are explicitly discussed along
the way in the example cases.
Mutual Relationship: In some cases the relationship
exists only in one direction. For example, if A trusts
B, it is not necessary B to trust A. However, based
on our definition of trust, the lack of trust
relationship does not imply that there is no trust
value in the computational sense. According to
Conversion Function, if there is no trust, the
function will return “0” as a default value.
9 CONCLUSIONS
This paper presents formal trust specification in
service workflow environments. Three modes of
trust and algebraic operators are developed to
formally and uniformly express trust requirements
from each autonomous service. The specification is
also discussed with its syntax and semantics. TS
formulas are incrementally built-up from Direction,
Path, and Composite operators. The binding
convention is described for operator priorities. To be
able to reason about a service workflow,
satisfiability relations are defined. Our solution
provides advantages for the success of secure
workflow interoperation in compliance with local
trust requirements and grounds for automatic
reasoning processes.
REFERENCES
Altunay, M., Brown, D., Byrd, G., Dean, R., 2005. Trust-
Based Secure Workflow Path Construction, In Proc.
Of Intl. Conf. on Service Oriented Computing.
Best, E., Devillers, R., Koutny, M., 2001. Petri Net
Algebra, EATCS Monographs on Theoretical
Computer Science. Springer-Verlag.
Davulcu, H., Kifer, M., Pokorny, L., Ramakrishnan, C. R.,
Ramakrishnan, I. V., Dawson, S., 1999. Modeling and
Analysis of Interactions in Virtual Enterprises.
Falcone, R., Pezzulo, G., Castelfranchi, C., 2003. A fuzzy
approach to a belief-based trust computation, In
Lecture Notes on Artificial Intelligence.
Guha, R., Kumar, R., Raghavan, P., Tomkins, A., 2004.
FORMALIZING TRUST REQUIREMENTS AND SPECIFICATION IN SERVICE WORKFLOW ENVIRONMENTS
205