SlideShare una empresa de Scribd logo
1 de 23
Thesis Report: Composition and Evaluation of Trustworthy Web Services James S.F. Hsieh, nomad_libral@gmail.com SOA Team, KS Lib,  Graduate Institute of Network Learning Technology ,  National Central University , Taiwan
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Motivation (1/2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Motivation (2/2) ,[object Object],[object Object],[object Object],Expectation-phase Contract-phase
Our Proposed Architecture (1/2) Based on CMU Framework Evaluate trust of a signal web service. Evaluate trust of a composite web servi ce.
Our Proposed Architecture (2/2)
Part 1: Single Service Trustworthy Evaluation ,[object Object],[object Object],[object Object]
Specifications of Trustworthy Experience  (1/3) Description of trustworthy experience of bookstore services ,[object Object],[object Object],[object Object],Bookstore Selling Domain aspect ,[object Object],[object Object],Security ,[object Object],[object Object],[object Object],Network   performance Non-Functional ,[object Object],Functional General aspect
Specifications of Trustworthy Experience (2/3) An example of the trustworthy aspect ontology
Specifications of Trustworthy Experience (2/3) Description of an experience instance  for bookstore service   2 Days 3 Hours False $ 53.5 Book delivery time Damage Price Bookstore True True RSA technology DES technology Security 510 ms 2100 ms 1.5 % Response time Turnaround time Packet miss rate Network performance True Reach Functional Value Property Aspect
Trustworthy  Requirement M atching Trustworthy requirements are kind of rule based policies that I can utilize to determine whether described trustworthy experiences are acceptable and meet service requester’s trustworthy requirement. Trustworthy requirements are similar to sentences appeared in propositional logic.   0
Requirement Hypothesis and Confidence ,[object Object],[object Object],,  ,
Part 2: Composite Service Trustworthy Evaluation ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],Composition Confidence Sub-service 1 Sub-service 2 confidence 1 confidence 2 Sequence Pattern Concurrent Pattern confidence of the composite service  =   confidence 1  ×  confidence 1 Sub-service 1 Sub-service  2 confidence 1 confidence 2 Switch and IF-Then-Else Pattern Sub-service 1 Sub-service 2 confidence 1 confidence 2 confidence of the composite service  = min{  confidence 1  , confidence 1  }
Trustworthy Web Service Evaluation Petri Net (1/3) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trustworthy Web Service Evaluation Petri Net (2/3) A control flow of a general composite service can be organized by the following control patterns .
Trustworthy Web Service Evaluation Petri Net (3/3) For Example: OWL-S Each edge has a  Confidence  value in a Coverability Graph. The Coverability Graph is a special  case of the Markov Process. <process:CompositeProcess rdf:ID=&quot;CompositionService&quot;> <process:composedOf> <process:If-Then-Else> <process:ifCondition>…</process:ifCondition> <process:then>… <process:AtomicProcess rdf:about=&quot;#Ser1&quot;/> </process:then> <process:else>… <process:SplitJoin>… <process:AtomicProcess rdf:about=&quot;#Ser2&quot;/> <process:Repeat-Until> <process:untilCondition>…</process:untilCondition> <process:untilProcess>… <process:AtomicProcess rdf:about=&quot;# Ser3&quot;/> </process:untilProcess> </process:Repeat-Until> </process:SplitJoin> </process:else> </process:If-Then-Else> </process:composedOf> </process:CompositeProcess>
Composition Confidence Evaluation (1/2) ,[object Object],[object Object],[object Object],[object Object]
Composition Confidence Evaluation (2/2) ,[object Object],Case 2 Case 1 SCC Compress the cycle  into case 1.
Evaluation Algorithm Case 1 [M initial ,   M 1 , M 2 , M 34 , M 34 ’, M 5 , M 67 , M 67 ’, M final  ] Composition Confidence   =  min{a, b × c δ } Step 1  [1, 1, 1, 1, 1, 1, 1, 1, a] 1 Step 2  [1, 1, 1, 1, 1, 1, 1, 1, a] 2 3 Step 3  [1, 1, b, 1, 1, 1, 1, 1, a] 4 Step 4  [1, 1, b, b, 1, 1, 1, 1, a] 5 Step 5  [1, 1, b, b, 1, 1,  c δ , 1, a] 6 Step 6  [1, 1, b, b, b ×c δ , 1,  c δ , 1, a] 7 Step 7  [1, 1, b, b, b ×c δ , 1,  b×c δ , 1, a] 8 Step 8  [1, 1, b, b, b ×c δ , 1,  b×c δ , 1, a] 9 Step 9  [1, 1, b, b, b ×c δ , 1,  b×c δ , 1,    min{a,  b×c δ }]
Conclusion ,[object Object],[object Object],[object Object],[object Object]
The End Thanks James S.F. Hsieh, nomad_libral@gmail.com SOA Team, KS Lib,  Graduate Institute of Network Learning Technology ,  National Central University , Taiwan

Más contenido relacionado

Último

Último (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Destacado

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destacado (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

2006 05 12 Composition And Evaluation Of Trustworthy Web Services

  • 1. Thesis Report: Composition and Evaluation of Trustworthy Web Services James S.F. Hsieh, nomad_libral@gmail.com SOA Team, KS Lib, Graduate Institute of Network Learning Technology , National Central University , Taiwan
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Our Proposed Architecture (1/2) Based on CMU Framework Evaluate trust of a signal web service. Evaluate trust of a composite web servi ce.
  • 8.
  • 9.
  • 10. Specifications of Trustworthy Experience (2/3) An example of the trustworthy aspect ontology
  • 11. Specifications of Trustworthy Experience (2/3) Description of an experience instance for bookstore service 2 Days 3 Hours False $ 53.5 Book delivery time Damage Price Bookstore True True RSA technology DES technology Security 510 ms 2100 ms 1.5 % Response time Turnaround time Packet miss rate Network performance True Reach Functional Value Property Aspect
  • 12. Trustworthy Requirement M atching Trustworthy requirements are kind of rule based policies that I can utilize to determine whether described trustworthy experiences are acceptable and meet service requester’s trustworthy requirement. Trustworthy requirements are similar to sentences appeared in propositional logic. 0
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Trustworthy Web Service Evaluation Petri Net (2/3) A control flow of a general composite service can be organized by the following control patterns .
  • 18. Trustworthy Web Service Evaluation Petri Net (3/3) For Example: OWL-S Each edge has a Confidence value in a Coverability Graph. The Coverability Graph is a special case of the Markov Process. <process:CompositeProcess rdf:ID=&quot;CompositionService&quot;> <process:composedOf> <process:If-Then-Else> <process:ifCondition>…</process:ifCondition> <process:then>… <process:AtomicProcess rdf:about=&quot;#Ser1&quot;/> </process:then> <process:else>… <process:SplitJoin>… <process:AtomicProcess rdf:about=&quot;#Ser2&quot;/> <process:Repeat-Until> <process:untilCondition>…</process:untilCondition> <process:untilProcess>… <process:AtomicProcess rdf:about=&quot;# Ser3&quot;/> </process:untilProcess> </process:Repeat-Until> </process:SplitJoin> </process:else> </process:If-Then-Else> </process:composedOf> </process:CompositeProcess>
  • 19.
  • 20.
  • 21. Evaluation Algorithm Case 1 [M initial , M 1 , M 2 , M 34 , M 34 ’, M 5 , M 67 , M 67 ’, M final ] Composition Confidence = min{a, b × c δ } Step 1 [1, 1, 1, 1, 1, 1, 1, 1, a] 1 Step 2 [1, 1, 1, 1, 1, 1, 1, 1, a] 2 3 Step 3 [1, 1, b, 1, 1, 1, 1, 1, a] 4 Step 4 [1, 1, b, b, 1, 1, 1, 1, a] 5 Step 5 [1, 1, b, b, 1, 1, c δ , 1, a] 6 Step 6 [1, 1, b, b, b ×c δ , 1, c δ , 1, a] 7 Step 7 [1, 1, b, b, b ×c δ , 1, b×c δ , 1, a] 8 Step 8 [1, 1, b, b, b ×c δ , 1, b×c δ , 1, a] 9 Step 9 [1, 1, b, b, b ×c δ , 1, b×c δ , 1, min{a, b×c δ }]
  • 22.
  • 23. The End Thanks James S.F. Hsieh, nomad_libral@gmail.com SOA Team, KS Lib, Graduate Institute of Network Learning Technology , National Central University , Taiwan