Enabling Usage Control through Reputation Objects: A Discussion on E-Commerce and the Internet of Services Environments

By Alnemr, Rehab; Koenig, Stefan et al. | Journal of Theoretical and Applied Electronic Commerce Research, August 2010 | Go to article overview

Enabling Usage Control through Reputation Objects: A Discussion on E-Commerce and the Internet of Services Environments


Alnemr, Rehab, Koenig, Stefan, Eymann, Torsten, Meinel, Christoph, Journal of Theoretical and Applied Electronic Commerce Research


Abstract

This paper discusses the meaning and the role of Trust and Reputation in Internet-of-Service and e-Commerce environments following a comparative case study. Both environments represent paradigms through which the Internet is seen as a huge infrastructure where electronic services or real products are traded on. In comparison to electronic commerce, participating in an Internet-of-Services can be full of risks for all participants. Even well known security mechanisms are not able to close all gaps of access and usage control. This paper discusses the concepts of trust and reputation and brings to light the relation between these concepts to security mechanisms, Service-Level-Agreements, and quality measurements in order to enable Usage Control. The proposed solution is based on our previous model of reputation objects. The discussion also introduces a new concept of what we call reputation auditing where quality processes are considered part of reputation management not the other way around.

Key words: Reputation, Rating, Trust, Security, Quality, QoS, SLA, Usage Control

1 Introduction

The Internet of services and e-commerce make use of the infrastructure of the Internet. But while the Internet of Services vision bases on fully automated provision and invocation of services (i.e. software agents representing users), the e-commerce scenario consists of human actors, who provide and ask for products or services. Due to the distributed nature of both scenarios, the participants of the system have to deal with multiple risks. The absence of a central authority (or the limited role of one) forced Usage Control solutions to emerge in order to minimize the risks of system interactions during runtime.

The key point of minimizing these risks is to find a suitable way to build trust between system participants. Trust relationships are important in all kinds of human interactions, business transactions, international politics, stock markets, and software engineering. In an environment where one has to deal with unknown parties, reputation is used to manage this trust. Figure 1 gives a brief view on the benefits of using reputation concepts in several environments. This model mimics real world social and business interactions to propagate trust. On the business level, corporate reputation is as a central competitive element, and is of great significance for a company's ability to win tomorrow's customers, key employees and co-operation partners. In his book, G. Silverman elaborates on the power of the word of mouth, which was described by Rahman et al. as the core process that construct one's reputation [41,46].

Existing work on reputation systems focuses on improving the calculation of reputation values, preventing malicious actions, and the deployment into the business world where reputation is mostly represented in a singular value form. Our previous work focuses on how we represent reputation to reflect its real-world concept (i.e. non-general, context specific and dynamic). In our model, we also took advantage of the extensive research on quality processes to help in configuring correct reputation values. We have achieved this by presenting a new form of reputation value: reputation object. This object holds information on the reputation of an entity in multiple contexts. This helps opening the online market to a context-aware competition between service providers, and customers can select their provider according to their customized needs.

This paper discusses the meaning and the role of trust and reputation in Internet of Service and e-commerce. The discussion build up to the goal of using our model of reputation objects to enable usage control. We elaborate on our previous work in the model and in usage control, and then relate both works at the end of the paper. This work follows the methodology of a comparative case study [19]. Following the work of Eisenhardt, we will compare two use cases, both covering the issue of trust and reputation problems through qualitative observations. …

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • A full archive of books and articles related to this one
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Enabling Usage Control through Reputation Objects: A Discussion on E-Commerce and the Internet of Services Environments
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Help
Full screen

matching results for page

    Questia reader help

    How to highlight and cite specific passages

    1. Click or tap the first word you want to select.
    2. Click or tap the last word you want to select, and you’ll see everything in between get selected.
    3. You’ll then get a menu of options like creating a highlight or a citation from that passage of text.

    OK, got it!

    Cited passage

    Style
    Citations are available only to our active members.
    Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

    "Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

    1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

    Cited passage

    Thanks for trying Questia!

    Please continue trying out our research tools, but please note, full functionality is available only to our active members.

    Your work will be lost once you leave this Web page.

    For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

    Already a member? Log in now.