Research of a User Preference-based Trusted Model of Service Composition
|School||Shanghai Jiaotong University|
|Keywords||Web services Service portfolio Trusted User preferences Bayesian networks|
With the increasing number of the type and number of Web services , service composition technology is becoming more mature . In an open , dynamic environment of the Internet , in the face of rapidly changing service resources and user preferences , the portfolio of services related to the issue of credibility is being more and more attention . How to measure the reputation of the component services , and how to choose a trusted combination of program is this area of research focus . The hot issues a credible model portfolio of services based on user preference and trying to model within the framework from the point of view of the user preferences to measure a single Web service reputation , based on user preferences as driven to achieve combinations trusted . For the completion of the above - mentioned research objectives , the main tasks include the following aspects : ( 1 ) comprehensive and systematic analysis of the service portfolio credible research areas of some of the current research and technology , described in detail the status of this field of research challenges and possible future development direction . (2 ) for a single Web service reputation measurement problem , using Bayesian network model of Web services based on user preferences credibility , the credibility of services in the form of a statistical probability quantified ; in service reputation quantify , on the one hand, the credibility of the source of information has been consolidated , on the other hand the user impact as their weighting factor is the introduction of the metric system . (3 ) the trusted choice for combination programs , a quantitative calculation of composite service QoS . The method combination of service QoS and QoS of component services associated with them , combined with the credibility of component services , driven user preferences , the selection of the best combination of selected programs at the same time trusted authentication scheme . (4) based on the above work , design and implement a middleware prototype system to verify the model 's feasibility and effectiveness .