{"title":"组合服务演化的信任分析","authors":"Li Liao, ShanShan Qi, Bixin Li","doi":"10.1109/SERA.2016.7516123","DOIUrl":null,"url":null,"abstract":"Changes to a composite service need to be well analyzed in order to ensure its trust is maintained. In this paper, we propose a trust analysis model to analyze the impact of three kinds of evolution operations performed on a composite service: business process changes, binding changes and interface changes. A trust dependency graph is introduced to analyze the impact on the trust of component services; a XBFG (eXtensible BPEL Flow Graph) is introduced to evaluate the impact on the trust of the composite service. Three metrics are introduced to evaluate the impact of these evolution operations. The case study shows how these evolution operations affect the trust of other component services and the composite service.","PeriodicalId":412361,"journal":{"name":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Trust analysis of composite service evolution\",\"authors\":\"Li Liao, ShanShan Qi, Bixin Li\",\"doi\":\"10.1109/SERA.2016.7516123\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Changes to a composite service need to be well analyzed in order to ensure its trust is maintained. In this paper, we propose a trust analysis model to analyze the impact of three kinds of evolution operations performed on a composite service: business process changes, binding changes and interface changes. A trust dependency graph is introduced to analyze the impact on the trust of component services; a XBFG (eXtensible BPEL Flow Graph) is introduced to evaluate the impact on the trust of the composite service. Three metrics are introduced to evaluate the impact of these evolution operations. The case study shows how these evolution operations affect the trust of other component services and the composite service.\",\"PeriodicalId\":412361,\"journal\":{\"name\":\"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)\",\"volume\":\"110 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-06-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SERA.2016.7516123\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SERA.2016.7516123","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Changes to a composite service need to be well analyzed in order to ensure its trust is maintained. In this paper, we propose a trust analysis model to analyze the impact of three kinds of evolution operations performed on a composite service: business process changes, binding changes and interface changes. A trust dependency graph is introduced to analyze the impact on the trust of component services; a XBFG (eXtensible BPEL Flow Graph) is introduced to evaluate the impact on the trust of the composite service. Three metrics are introduced to evaluate the impact of these evolution operations. The case study shows how these evolution operations affect the trust of other component services and the composite service.