111 research outputs found

    Which social networks should web services sign-up in?

    Get PDF
    This paper deals with the sign up issue in social networks populated with Web services. These social networks can be used for example, to ease the discovery of Web services. Based on Web services\u27 functionalities three social networks are built: competition, substitution, and collaboration. In competition and substitution social networks, Web services offer homogeneous functionalities. In the collaboration social network, Web services that offer heterogeneous functionalities. In this latter type, Web services can be put together to develop composite services. Prior to joining a social network, a Web service through a third-party, named social Web service, should evaluate the pros and cons of being member in this network. A set of quality criteria for assessing these pros and cons are proposed. These criteria are, but not limited to, privacy, trust, fairness, and traceability. Policies for managing the sign up are, also, provided in this paper. The adoption and efficiency of these policies are monitored and assessed with respect to me values that these criteria take. In response to this sign up\u27s outcomes, these policies are fine-tuned. Copyright © 2012, Association for the Advancement of Artificial Intelligence. All rights reserved

    A Guiding Framework for IoT Servitization

    Get PDF
    This paper discusses the necessary steps and mechanisms that would allow servitizing the Internet-of-Things (IoT). Servitization exposes functionalities as services allowing potential users to consume these functionalities regardless of the development technologies. To ensure successful use of IoT functionalities, restrictions that hinder this use are identified and then, addressed from a servitization perspective. These restrictions are referred to as no-semantics, silo, and no-reasoning with focus on the first restriction in this paper. Customer-Facilitator-Provider interaction model is developed in the paper allowing to define who does what in the context of IoT servitization

    AAAI Spring Symposium: Intelligent Web Services Meet Social Computing - Which Social Networks Should Web Services Sign-Up In?

    Get PDF
    This paper deals with the sign up issue in social networks populated with Web services. These social networks can be used for example, to ease the discovery of Web services. Based on Web services\u27 functionalities three social networks are built: competition, substitution, and collaboration. In competition and substitution social networks, Web services offer homogeneous functionalities. In the collaboration social network, Web services that offer heterogeneous functionalities. In this latter type, Web services can be put together to develop composite services. Prior to joining a social network, a Web service through a third-party, named social Web service, should evaluate the pros and cons of being member in this network. A set of quality criteria for assessing these pros and cons are proposed. These criteria are, but not limited to, privacy, trust, fairness, and traceability. Policies for managing the sign up are, also, provided in this paper. The adoption and effi ciency of these policies are monitored and assessed with respect to the values that these criteria take. In response to this sign up\u27s outcomes, these policies are fine-tuned

    S-commerce: Injecting social elements into m-commere

    Get PDF
    This paper presents the S-Commerce Framework (SC-F) that weaves social elements into mobile commerce. The SC-F consists of three blocks referring to consumers, providers, and brokers, and ensures their connection through different relationships that are then mapped onto social networks. Examples of relationships include competition, referral, and loyalty. This paper, also, discusses the Smart Mobile Restaurant Guide (SMRG) that demonstrates the SC-F usefulness such as increasing the successful rate of satisfying users\u27 requests. © 2011 IEEE

    Tracking users\u27 actions over social media: Application to Facebook

    Get PDF
    © 2016 IEEE. This paper presents a system for tracking the execution of social actions over Facebook along with the execution of business tasks. Putting social actions like post and comment together, results into developing social flows. Webhooks is used to listen to the changes happening over Facebook pages. Keywords: Business Task, Facebook, Social Action, and Social Flow

    Impact Analysis of Web Services Substitution on Configurable Compositions

    Get PDF
    Web services substitution is a promising solution that enables process continuity of SOA-based applications associated with composite Web services (WSs). This chapter proposes an approach that assesses the impact of substitution on the composition and selects the best substitute, from a pool of substitutes, in order to reduce potential conflicts due to different ontologies with other peers in this composition, for example. Two types of impact along with their assessment metrics are defined: local (semantic/policy compatibility matching degree) and global (QoS satisfaction degree). This chapter addresses the selection issue as an optimization problem whose main objective is to minimize the efforts to put into resuming the ongoing composition under some temporal constraints. A set of experiments are conducted as a proof of concept and the findings show that our approach provides the necessary means for achieving Web services substitution with minimal disruption time

    Impact of Sybil attacks on Web services trust assessment

    Get PDF
    © 2015 IEEE. This paper discusses how Sybil attacks can undermine trust management systems and how to respond to these attacks using advanced techniques such as credibility and probabilistic databases. In such attacks end-users have purposely different identities and hence, can provide inconsistent ratings over the same Web Services. Many existing approaches rely on arbitrary choices to filter out Sybil users and reduce their attack capabilities. However this turns out inefficient. Our approach relies on non-Sybil credible users who provide consistent ratings over Web services and hence, can be trusted. To establish these ratings and debunk Sybil users techniques such as fuzzy-clustering, graph search, and probabilistic databases are adopted. A series of experiments are carried out to demonstrate robustness of our trust approach in presence of Sybil attacks

    Calcul de la confiance des services web dans un contexte d\u27utilisateurs muti-identités

    Get PDF
    Cet article discute comment les attaques d\u27utilisateurs avec plusieurs identites, appeles Sybil, peuvent nuire aux systemes de gestion de la confiance et propose une solution pour lutter contre ces attaques en utilisant des concepts tels que la credibilite et les reseaux sociaux. Dans de telles attaques, les utilisateurs possedent deliberement plusieurs identites et par consequent, peuvent fournir des evaluations incoherentes sur les memes services Web. Plusieurs approches existantes se basent sur des choix arbitraires pour filtrer les utilisateurs Sybil et reduire leurs capacites d\u27attaque. Cependant ceci s\u27avere inefficace. Notre approche se base sur les utilisateurs non-Sybil et credibles fournissant des evaluations coherentes sur les services Web et par consequent, peuvent etre dignes de confiance. Pour etablir ces evaluations et demystifier les utilisateurs Sybil nous adoptons des techniques telles que le clustering flou, la recherche dans les graphes, et les bases de donnees probabilistes. Nous mettons en Å“uvre une serie d\u27experimentations pour demontrer la robustesse de notre approche de confiance en presence d\u27attaques Sybil

    A diversity-based approach for managing faults in web services

    Get PDF
    This paper discusses the value-added of diversity to support fault tolerant Web Services operation. Web Services offering the same functionality are gathering into the same virtual space referred to as diversity group. Besides the group additional components are used including: composite manager, group manager, and Web service manager. The first component invokes the diversity groups and either resumes or aborts the overall execution in case of failures. The second component oversees Web services execution and the interactions between them. Finally, the last component monitors a Web service execution and reports either failure or success to the group manager. An architecture and a set of experiments showing the use of diversity to design and deploy fault tolerant Web services is presented in this paper. © 2012 IEEE

    Towards a quality of social network (o) model in the context of social web services

    Get PDF
    This paper proposes a set of criteria used to establish the uality of ocial etwork (o) of a social network connecting social Web services together. These latter are quite different from (regular) Web services since they can, for instance establish and maintain networks of contacts, count on their contacts when needed, and form with other peers strong and long lasting collaborative groups. A social Web service can sign up in three social networks referred to as competition, collaboration, and substitution. Prior to signing up the social Web service checks the privacy, trust, fairness, and traceability criteria that constitute the social network\u27s o. The interpretation and evaluation of each criterion vary from one social network to another. © 2012 Springer-Verlag GmbH Berlin Heidelberg
    • …
    corecore