Estimating the Privacy Protection Capability of a Web Service Provider

2011 ◽  
pp. 1929-1950
Author(s):  
George O.M. Yee

The growth of the Internet has been accompanied by the growth of Web services (e.g., e-commerce, e-health, etc.), leading to important provisions put in place to protect the privacy of Web service users. However, it is also important to be able to estimate the privacy protection capability of a Web service provider. Such estimates would benefit both users and providers. Users would benefit from being able to choose (assuming that such estimates were made public) the service that has the greatest ability to protect their privacy (this would in turn encourage Web service providers to pay more attention to privacy). Web service providers would benefit by being able to adjust their provisions for protecting privacy until certain target capability levels of privacy protection are reached. This article presents an approach for estimating the privacy protection capability of a Web service provider and illustrates the approach with an example.

Author(s):  
George Yee

The growth of the Internet has been accompanied by the growth of Web services (e.g., e-commerce, e-health, etc.), leading to important provisions put in place to protect the privacy of Web service users. However, it is also important to be able to estimate the privacy protection capability of a Web service provider. Such estimates would benefit both users and providers. Users would benefit from being able to choose (assuming that such estimates were made public) the service that has the greatest ability to protect their privacy (this would in turn encourage Web service providers to pay more attention to privacy). Web service providers would benefit by being able to adjust their provisions for protecting privacy until certain target capability levels of privacy protection are reached. This article presents an approach for estimating the privacy protection capability of a Web service provider and illustrates the approach with an example. [Article copies are available for purchase from InfoSci-on-Demand.com]


Author(s):  
George Yee ◽  
Larry Korba

The growth of the Internet has been accompanied by the growth of Internet services (e.g., e-commerce, e-health). This proliferation of services and the increasing attacks on them by malicious individuals have highlighted the need for service security. The security requirements of an Internet or Web service may be specified in a security policy. The provider of the service is then responsible for implementing the security measures contained in the policy. However, a service customer or consumer may have security preferences that are not reflected in the provider’s security policy. In order for service providers to attract and retain customers, as well as reach a wider market, a way of personalizing a security policy to a particular customer is needed. We derive the content of an Internet or Web service security policy and propose a flexible security personalization approach that will allow an Internet or Web service provider and customer to negotiate to an agreed-upon personalized security policy. In addition, we present two application examples of security policy personalization, and overview the design of our security personalization prototype.


2011 ◽  
Vol 08 (04) ◽  
pp. 291-302
Author(s):  
RAVI SHANKAR PANDEY

Web services are programs which perform some elementary business process of an application and are distributed over the Internet. These services are described, discovered and executed using standard languages WSDL, SOAP and UDDI. Proliferation of web services has resulted in intense competition between providers, which provide the same service. To survive in such a competitive environment, they need to advertise the quality of their service. Web service description language does not provide support to describe quality attributes. Recently, DAmbrogio proposed QOS model of web services based on a meta model of WSDL. In this paper, we present a platform to advertise QOS as declared by the service provider. This tool generates a WSDL file from Java code along with its quality of service attributes. It accepts Java code and a file containing quality attributes. These attributes include reliability, availability, and operation demand and operation latency. These attributes are included in WSDL file as a content of description element.


2011 ◽  
pp. 2498-2517
Author(s):  
Zhengping Wu ◽  
Alfred C. Weaver

The lack of effective trust establishment mechanisms impedes the deployment of diverse trust models for web services. One issue is that collaborating organizations need mechanisms to bridge extant relationships among cooperating parties. We describe an indirect trust establishment mechanism to bridge and build new trust relationships from extant trust relationships with privacy protection. Another issue is that a trust establishment mechanism for web services must ensure privacy and owner control. Current web service technologies encourage a service requester to reveal all its private attributes in a pre-packaged credential to the service provider to fulfill the requirements for direct trust establishment. This may lead to privacy leakage. We propose a mechanism whereby the service requester discovers the service provider’s requirements from a policy document, then formulates a trust primitive by selectively disclosing attributes in a pre-packaged credential to negotiate a trust relationship. Thus the service requester’s privacy is preserved.


2011 ◽  
Vol 341-342 ◽  
pp. 462-466
Author(s):  
Meng Wang ◽  
Shu Yu Li

How to efficiently select Web services that can best meet the requirements of consumers is an ongoing research direction in Web service community. However, current discovery systems support either WSDL or OWL-S Web services but not both.Through the automatically collected WSDL files and the OWL-S web service related matching mechanism, the idea of transforming various existing web services on the Internet into a service cluster of similar homogeneous , then we can create a service search engine successfully and at the same time the search space can be reduced. By means of providing a mechanism for matching the characteristics properties of relevant web services, we can put them all together into a group which can be found and applied.


Author(s):  
Dong Dong ◽  
Lizhe Sun ◽  
Zhaohao Sun

This chapter examines Web services in China. More specifically, it examines the state-of-the-art of China's Web services in terms of cloud services, mobile services, and social networking services through exploring several leading Web service providers in the ICT industry, including Alibaba, Tencent, China Mobile, and Huawei. This research reveals that the Chinese culture has played an important role in the success of China's Web services. The trade-off ideology and communication conventions from Chinese traditional culture, as well as Mao Zedong thought, greatly influenced the development of China's Web services. The findings of this chapter might facilitate the research and development of Web services and better understanding of the growth in China's ICT industry, as well as future trends.


Author(s):  
Tung-Hsiang Chou ◽  
Ching-Chang Lee ◽  
Chin-Wen Lin

The Internet has come a long way over the past twenty years, and many Internet-era enterprises have had to face daunting challenges while trying to create innovative business models. Many types of Internet interactions can facilitate networking (e.g., The Web, Web services). Since the advent of the Internet, service requesters and service providers have generated diverse electronic services (e-services), and since 2003, many experts have proposed the concept of Web 2.0. People rely on Internet e-services to execute activities and meet requirements; however, e-services lack a standardization method for constructing and managing them. The current study presents a framework design and a comprehensive interface for e-service providers and requesters. The study adopts the concept of Web 2.0 by using Web services with related standards for developing the framework design. Specifically, the study uses semantic Web technologies to complete the construction of e-services. After that, Internet users can quickly and conveniently access the framework to obtain suitable e-services.


2010 ◽  
pp. 556-564
Author(s):  
Khaled M. Khan

Web service is becoming an important area of business processing and research for enterprise systems. Various Web service providers currently offer diverse computing services ranging from entertainment, finance, and health care to real-time application. With the widespread proliferation of Web Services, not only delivering secure services has become a critical challenge for the service providers, but users face constant challenges in selecting the appropriate Web services for their enterprise application systems. Security has become an important issue for information systems (IS) managers for a secure integration of Web services with their enterprise systems. Security is one of the determining factors in selecting appropriate Web services. The need for run-time composition of enterprise systems with third-party Web services requires a careful selection process of Web services with security assurances consistent with the enterprise business goal. Selection of appropriate Web services with required security assurances is essentially a problem of choice among several alternative services available in the market. The IS managers have little control of the actual security behavior of the third-party Web services, however, they can control the selection of right services which could likely comply their security requirements. Selecting third-party Web services arbitrarily over the Internet is critical as well as risky.


2014 ◽  
Vol 11 (2) ◽  
pp. 67-84 ◽  
Author(s):  
Tanveer Ahmed ◽  
Abhishek Srivastava

Service oriented architecture has revolutionized the way a traditional business process is executed. The success of this architecture is Indue to the composition of multiple heterogeneous services at runtime. Web service composition is a mechanism where several web services are combined at runtime to build a complex application for a user. It is one of the most sought after processes in the context of semantic web. But, composition of web services at runtime is a difficult task owing to the availability of multiple service providers offering the same functionality. The process if exasperated by due conflicting preferences of a service consumer. In this paper, the authors address the issue of selecting a service based on Quality of Service (QoS) attributes. They utilize concepts customized from physics to create an environment that facilitates the selection of a best service from the set of similar services. The technique not only facilitates the selection of the service with the best QoS attributes, but distributes the load among expeditiously. Here in this paper, the authors concentrate on minimizing and equitably balancing the waiting time for a user. They conduct in silico experiments on multiple workflows to demonstrate the efficacy of the proposed technique to balance load efficiently among similar service offerings.


Sign in / Sign up

Export Citation Format

Share Document