Next Article in Journal
Characterizing the Reproducibility of Noisy Quantum Circuits
Previous Article in Journal
An Efficient Parallel Reverse Conversion of Residue Code to Mixed-Radix Representation Based on the Chinese Remainder Theorem
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Comprehensive and Unified Approach to Web Service Trust Evaluation Based on Uncertainty Methodology

1
School of Computer and Information Technology, Shanxi University, Taiyuan 030006, China
2
School of Management, Shanxi Medical University, Taiyuan 030001, China
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(2), 243; https://doi.org/10.3390/e24020243
Submission received: 20 December 2021 / Revised: 28 January 2022 / Accepted: 3 February 2022 / Published: 5 February 2022

Abstract

:
Web services have the advantage of being able to generate new value-added services based on existing services. To effectively compose Web services, the composition process necessitates that the services that will participate in a given composite service are more trustworthy than those that provide similar functionality. The trust mechanism appears to be a promising way for determining service selection and composition. Existing trust evaluation approaches do not take into account customer expectations. Based on fuzzy set theory and probability theory, this work proposes a unique Web service trust evaluation approach that is notable for its ability to provide personalized service selection based on customer expectations and preferences. The proposed approach defines trust as a fuzzy notion that is related to prior experiences and ratings, and expresses trust in two different forms. This work mainly solves two key issues in Web service trust architectures, bootstrapping trust for the newcomer services and deriving trust for composite services. The proposed approach combines the solutions to numerous issues in a natural way. The case study and approaches comparison demonstrate that the proposed approach is feasible.

1. Introduction

Currently, many organizations deploy various applications for business management. Rather than developing new solutions in-house, these applications are frequently constructed by integrating components produced by outside firms [1,2,3]. Web services are self-contained application components created on many platforms and advertised, hosted, and accessed via the Internet [4,5,6]. An elementary Web service is a network-accessible process that performs a defined task. When two or more elementary Web services are combined, a new Web service is created that performs a complex composite task that no single elementary service can accomplish alone [7,8,9]. In this case, the new Web service that contains the elementary Web services is called the composite service, and these elementary Web services are called the component services. The process of creating composite services can be performed iteratively, with one composite service serving as a component of a more complicated composite service. The true power of Web services, as demonstrated above, is their ability to be dynamically integrated into composite services, performing new tasks and conducting new business transactions [10,11,12].
To create a successful composite service, the correct component services need to be selected [2]. In the sector of Web services, how to select desirable Web services and composite appropriate Web services has been a major issue. Both for direct interactions and for specifying composite services, service selection is critical. The rapid growth of the Internet has resulted in a massive increase in the number of Web services, posing a challenge to consumers’ ability to quickly and precisely locate their desirable services [13,14,15]. Furthermore, an increasing number of Web services from diverse service providers provide the same functionality [16]. Businesses today must comprehend not just what a Web service can do but also how well the Web service can do it. How to select the desired component services and recommend the satisfactory composite services are very important issues [17]. The non-functional characteristics of Web services, such as QoS (Quality of Service) and trust, are very essential criteria when selecting and composing the desirable Web services [18,19,20,21].
The QoS determines the performance of a Web service [22], so the QoS is regarded as the most important non-functional criterion for service selection and composition [23,24,25]. However, the QoS that a given Web service will supply is not predictable and foreseeable due to dynamic changes in network performance [3,8,17,26,27,28]. Furthermore, various customers may be concerned with different QoS attributes, and different customers may assign different priority to the same QoS attributes [12,29,30]. To replace QoS-aware service selection and composition procedures, the attention has recently shifted to social techniques based on trust or reputation. The trust mechanism provides a smart and accurate solution to the issue of service selection and composition [2,31].
Trust in a Web service represents a certain level of confidence that the service will perform as expected [2]. Trust should be applicable to both elementary and composite services. Trust is based on a consumer’s past interactions with or observations of a Web service, either directly with the customer or as reported by other customers. Each customer in a community can function as a rater, giving a service a rating based on his/her interactions with it. Individuals’ ratings on the quality of a service are reflected in trust, which is customized and subjective. The higher a service’s quality, the more trust the consumer has in it. Trust can be used to assess the overall quality of a service [32]. A trust model for Web services integrates past experiences or interactions to generate trust, allowing customers to identify good from bad services based on customers’ ratings, and assisting customers in forecasting and selecting the best quality services [33,34].
Because trust can only exist in a risky and uncertain environment, where certain parts of the application are not within our control, trust is inherently uncertain. Our previous work defined trust in Web services using a mathematical model based on fuzzy theory and probability theory, and presented a customer-centric trust evaluation model for personalized service selection [35]. However, our previous work did not consider bootstrapping trust for the newcomer services and deriving trust for the composite services, which are two key issues in Web service trust architectures. This work will improve the previous work to form a complete Web service trust evaluation approach.
This work combines the solutions to numerous issues to develop a comprehensive and unified Web service trust evaluation approach. A motivation example is discussed in Section 2. The present research on bootstrapping trust for the newcomer services and deriving trust for the composite services are investigated in Section 3. The integrated trust evaluation approach is described in Section 4. Through a case study, Section 5 describes the proposed approach’s practical applicability. This work compares the proposed approach to existing approaches in Section 6. Section 7 of the work finishes with an overview of the vast potentials of such an approach.

2. Motivation

First and foremost, a motivating case is offered to emphasize this work’s motivation.
Service-oriented architecture (SOA) systems have capabilities to dynamically compose Web services [6,36], including the following:
  • Service tracking to detect all available services and their rating information;
  • Service planning to design a composite service’s execution process;
  • Service selection to determine the optimum service for each task node in a composite service process;
  • Service composition to generate a new service that performs the expected complex task by compositing the selected component services;
  • Service execution to perform the expected complex task according to the optimal composed plan.
A service workflow, i.e., a composite service, includes a set of tasks [37]. According to service planning, there may be more than one way to build a composite service [36]. Figure 1 depicts a composite service that can take one of two paths: T a s k 1 , T a s k 2 , T a s k 3 , T a s k 5 or T a s k 1 , T a s k 4 , T a s k 5 . Each task T a s k i may be performed by any elementary service in service class S i . The rating information of each elementary service is shown in Table 1.
Assume that Alice and Bob both need to select desired services in order to build the composite service. Table 1 shows that Alice and Bob are faced with the following three service selection scenarios:
  • Alice and Bob have used and rated all of the candidate services (for example, in service class S 1 ). They can make decisions directly based on their own ratings. Of course, they can also make decisions based on ratings from previous customers who have used these services.
  • Alice and Bob have never used any of the candidate services and have no knowledge of how well they perform (for example, in service class S 2 ). Only ratings submitted by other consumers who have used these services can help them make decisions.
  • Alice and Bob have used some of the candidate services, but they have no knowledge of the performance of others (for example, in the service class S 4 ). They can make decisions based on ratings submitted by other consumers who have used these services, similar to the second scenario.
In this motivating example, there are three issues that should be noted. The first issue is to bootstrap trust for new Web services. s 3 is a new Web service in service class S 2 . No consumer has interacted with it, and no rating exists of its past behavior. Consequently, consumers are unable to evaluate its trustworthiness. A mechanism for assigning trust to new services must be specified so that they can compete for market share with existing services. The second issue is to reduce the influence of subjectivity and contingency when the ratings are few. In service class S 4 , there are only three ratings on s 7 , while there are 1540 ratings on s 8 . These three ratings cannot completely and effectively reflect the performance of s 7 , so consumers need to reduce the decision-making risk caused by the subjective and contingency when ratings on services are few. This issue is closely related to the first issue. The third issue is deriving trust for composite services. The composite service has two alternative paths, so customers need to choose one to execute. Choosing the option to implement the composite service is actually a decision to implement a more trustworthy composite service. Another mechanism must be defined to derive trust for composite services, allowing customers to select them as elementary services.
Our previous work has modeled the uncertainty of trust and implemented personalized service selection. This work will improve our previous work and address the following issues:
  • How do new services without past experience and customer ratings take part in the competition;
  • How to derive the trust value of a composite service according to the trust values of its component services while ensuring that the resultant trust values have the same properties.

3. Related Work

Trust in Web services is a critical prerequisite for their widespread acceptance in an open and dynamic network environment [10,38]. To ensure Web service trust, a set of trust criteria and frameworks should be supplied. Academics have different perspectives on trust, so studies were based on distinct perspectives [39]. Some academics investigated policy-based Web service trust, while others investigated reputation-based Web service trust. Mahmud and Usman conducted a systematic literature review with the aim of identifying and classifying existing studies on trust establishment and estimation in services [40]. This work’s major goal is to investigate reputation-based trust in Web service, so here we mainly survey the relevant literature on reputation-based trust evaluation approaches for Web services. A reputation-based trust system can be used to identify suitable services or service providers based on past experiences or consumer ratings and gauge customer satisfaction with Web services [41].
Web services are typically represented and defined over three main architectures: single, composite, and communities [33], and this work deals with both single and composite architectures. Trust evaluation research in the single architecture focuses on bootstrapping trust, rating credibility, trust dynamics, and the processes of developing and upgrading trust or reputation. Our previous work has addressed issues other than bootstrapping trust.
Bootstrapping trust for a newcomer Web service means assigning an initial trust value for it [42], which is a key issue in Web service trust models [43,44]. Because historical information on newcomer Web services is unavailable, bootstrapping trust becomes a significant difficulty that most existing Web service trust models overlook [44,45]. Malik and Bouguettaya looked at a variety of ways for bootstrapping new Web service reputations equitably and properly, as well as their shortcomings [44]. Existing bootstrapping trust solutions fall into three main categories: default, punishment-based, and adaptive [46]. The default value-based approach assigns a default trust value to each newcomer service, while the punishment-based approach assigns a low trust value to newcomer services. Both these two approaches have drawbacks; if the initial trust value is high, existing services will be disadvantaged, while a low initial trust value will prevent newcomer services from competing. The adaptive bootstrapping trust approaches assign the initial trust value of a newcomer service by measuring the similarity between the newly deployed service and some existing services. The adaptive bootstrapping is the current resident bootstrapping trust solution. Nguyen et al. presented a trust bootstrapping approach with three auxiliary mechanisms, including inheritance, recommendation, and assurance mechanisms, which is distinguished by the fact that the bootstrapping mechanisms are combined with existing trust models to maximize the accuracy of the trust assessment process in the initial stage [45]. This approach is based on the characteristics and nature of the newcomer Web service itself, as well as the community, in order to apply appropriate bootstrapping mechanisms so that the assigned initial trust value is truly indicative of the newcomer’s capabilities. Yahyaoui and Zhioua introduced a new approach to bootstrap Web service trust by observing Web service interactions with customers over a certain time horizon [42]. The observation sequence is modeled as a Hidden Markov Model and matched with a predefined trust model to evaluate the behavior of such a Web service. The predefined trust model is a specification of the possible behavior of the Web service. Based on the matching results, an initial trust value is assigned to the Web service. Wahab and his colleagues suggested a peer-reviewed solution [46]. The trust bootstrapping mechanism is made up of a machine learning method for obtaining endorsements for newcomer services, a dishonesty-resistant endorsement aggregation technique, and a credibility updating mechanism for endorsers. Wu et al. presented a new technique to reputation bootstrapping in which artificial neural networks are utilized to learn correlations between existing service attributes and performance and then extend them to generate a provisional reputation when evaluating new and unknown services. The reputation bootstrapping also includes the reputations of previously published services from the same provider [47]. The above-mentioned bootstrapping trust methods are all adaptive methods, and the common shortcoming of these methods is that they require some priori information, but the bootstrapping trust problem is precisely caused by the lack of information.
The trust evaluation problem of composite services is a major focus of composite architecture research. It is important to involve trust in Web service composition when generating trustworthy composite Web services [48]. Yang et al. proposed a trust management system based on understanding and trust policies that are built on experience [49]. The trust of the participating Web services is assessed based on previous experiences, allowing the composite service’s trust to be determined based on the evaluation of each Web service and the composite service’s aggregation topology. Paradesi et al. conceptualized behavior-based trust of Web services with a mathematical model that matches many of the intuitions one has about trustworthy Web services [50]. The model allows modeling the uncertainty of people’s initial trust or distrust of Web services when there is no prior experience dealing with them. As the number of experiences with Web services increases, the level of certainty increases, although the proportion of positive experiences may remain fixed. Furthermore, when the same number of positive and negative experiences are gained, certainty is lowest. They also showed how the trust model for a single service may be used to derive trust for compositions. Yahyaoui suggested a trust-based game theoretical model with the goal of simulating the rivalry between services desiring to be assigned tasks and selecting the best candidate [51]. Web services utilize a Bayesian model to calculate a trust value for any other service willing to collaborate with them and then play a game to choose the best candidates. Kim et al. proposed a trust model that allows for the discovery and composition of services depending on their trustworthiness [52]. To determine the trustworthiness of services and service providers, the model relied on both direct and indirect consumer experience. Consumers can obtain a very trustworthy service that meets their quality and functional needs by using composing services. Gao et al. presented a formal service composition architecture for service selection [23]. They offered a subjective probability-theory-based trust evaluation approach for service composition plans, as well as a trust-oriented genetic algorithm to generate a near-optimal service composition plan with QoS limitations. Karimian et al. proposed a formulation for computing trust based on the transferable belief model using the basic concepts of belief combination and transferability [53]. Customer ratings of different interactions are combined to form a direct trust value. Trust in composite services is modeled over time using the generalized Bayes theorem in the transferable belief model, which takes into account the structure of each component in the service. Guo et al. proposed a trust-based service composition framework that uses a static program analysis approach to analyze the trust dependency between component services in a composite service. Based on this, the rating and trust dependency information is aggregated into a global trust calculation for the composite service [20]. It is important to note that a composite service can be used as a component of another more complex composite service. These current approaches to deriving trust for composite services lack the ability to generalize further.
Although there are already many approaches to serve bootstrapping trust for the newcomer services and deriving trust for the composite services, these existing trust evaluation approaches are limited in their scope of addressing issues. Their shortcomings are mainly as follows:
  • Existing trust evaluation approaches tend to focus only on one or some specific issues of trust and cannot cover the whole lifecycle and scope of trust in Web services.
  • Existing trust evaluation approaches often involve only customer preferences, and the subjective initiative of customers in the trustworthy representation is insufficient.
  • Bootstrapping trust for the newcomer services often requires additional information, but in fact, bootstrapping trust is caused by insufficient information about the newcomer services.
  • Deriving trust for the composite services was often algorithmically complex and lacked global generalization capability.
This work incorporates the solutions to multiple major challenges, and our goal is to develop a comprehensive and unified Web service trust evaluation approach. The proposed approach has the following advantages:
  • The proposed approach covers three phases of trust development, including the initial trust establishment phase, the trust improvement phase, and the trust stabilization phase, and involves two main architectures of Web services, namely, single architecture and composition architecture.
  • The proposed approach fully considers the subjective initiative of customers, involves not only their preferences but also their expectations, and leaves the setting of algorithm parameters to customers, realizing the personalization of trust evaluation.
  • Bootstrapping trust in the proposed approach cleverly utilizes customer expectations without any priori information and only needs to set the distribution of virtual ratings according to the maximum entropy principle.
  • In this work, the principle of deriving trust for composite services is simple to understand, the characteristics are stable, the algorithm is easy to implement, and the method has good global generalization ability.

4. Trust Evaluation Model

4.1. Trust Specification

Researchers have begun to recognize that Web service trust is an important attribute to measure and evaluate. Based on exploration and analysis of trust literature and extension of the online trust principles, Aljazzaf et al. presented some trust principles that form the basis of trust in Web services [54]. After a comprehensive reference to other literature [55,56], we believe that a Web service trust model should consider at least the following trust principles:
  • Trust is based on information: There is a need to know information about a Web service to establish trust.
  • Dynamic nature of trust: Trust is dynamic and changes over time and with future experiences. This requires a continuous evaluation of Web services’ trustworthiness.
  • Trust and identity: Trust depends on identity. Having identity enables the past experience of the interactions to be built on and mapped to that identity.
  • Trust is based on context: Trust is not a fixed value connected with a Web service; rather, it is dependent on the performance of the service and only applies in a certain context at a specific time.
  • Categories of trust semantics: Semantic characteristics of trust ratings are important to interpret the meaning of those measurements.
  • Individual and collective ratings: Considering individual and collective ratings to predict the trust in Web services helps the customer to make a better selection decisions.
  • Customer expectations: Trust is not absolute but a matter of degree. Therefore, a trust-based system helps the customer to select a Web service based on the customer’s expectations.
  • Trust development phases: Trust in Web services should consider the three trust development phase (initial trust establishment, trust improvement, and trust stabilization).
  • Trust approaches: Using a hybrid of multiple trust methods results in a better and more robust method to model trust in Web services.
Our previous work has addressed some of the above Web service trust principles. This work is a further extension of the previous work and will address all the above principles. To facilitate description, we firstly defines some symbols, as shown in Symbol description list 1.
Symbol description list 1:
  • s i i = 1 , , I represents a concrete element in a service market.
  • c l l = 1 , , L represents a concrete customer in a community.
  • Direct trust is personal and subjective, representing an individual’s rating on a Web service. t l i s , which is in the range of 0 , 1 , represents customer c l ’s direct trust in service s i .
  • Indirect trust is the collective view of a Web service’s character or standing. The collective view synthesizes the ratings submitted by the customers who have been interacted with the service. T i , which is called indirect trust in s i , represents the aggregation of individual direct trust in s i and is processed as a random variable in the range of 0 , 1 .
t l i s is given subjectively by c l according to his/her historical interactions with s i , which evolves over time and with new interactions. If c l has engaged with s i and has given it a rating, t l i n u l l ; otherwise, t l i = n u l l . c l must keep updating his/her rating on s i in response to the successive QoS of s i supplied to him/her. The subjective evaluation disparities in the ratings on s i submitted by different customers represent the cognitive differences and preferences of these customers. T i is relatively objective and represents a collective evaluation of a group of customers. The ratings on s i submitted by customers are seen as samples of the random variable T i . In theory, T i should be continuous.
Due to the differences in characteristics between direct and indirect trust, this work expresses direct and indirect trust in distinct forms. This work tries to combine these two trust expressive forms to create a stronger and more comprehensive way for evaluating trust in Web services.
The process of selecting a service has evolved into a comparison of Web service trust. Because direct trust values are expressed as determinate values with a fairly basic comparison procedure, this work does not go into detail. It is worth noting that indirect trust values are random variables that can’t be directly compared as determinate values. The statistical features of indirect trust values should be compared by service customers when comparing candidate services.
s a and s a are two Web services that perform the same task with the indirect trust values T a and T a . Both T a and T a are continuous random variables with values in the 0 , 1 range. To compare random variables T a and T a , a variety of methods can be employed, the most popular of which is to compare the expected values of T a and T a , that is, T a > T a if and only if E T a > E T a . In this work, a novel random variable comparison method is employed, as indicated in Symbol description list 2.
Symbol description list 2:
5.
Expected trust level α is the lowest degree of trust that a consumer can expect from a Web service’s competency in real-world situations.
6.
If P r ( T a α ) > P r ( T a α ) , it is said that T a is greater than T a and s a is more trustworthy than s a for an expected trust level α 0 , 1 . These two relationships are symbolically represented by the formulas α ( T a ) > α ( T a ) and α ( s a ) α ( s a ) , respectively.
7.
The probability density functions of T a and T a are f a ( x ) and f a ( x ) , respectively. α ( T a ) > α ( T a ) can be converted to α 1 f a ( x ) d x > α 1 f a ( x ) d x .
In different contexts, there may be different trust evaluation strategies [57], and different customers have different trust expectations for Web services, so the expected trust level α should be determined by the specific context and customer requirements. By setting different expected trust levels, the service comparison method enables personalized service selection because, for different expected trust levels, the results of the service comparison may be different.
This method of comparison seems very abstract, but in fact, we use it all the time. Many e-commerce sites such as Amazon now have customer ratings of the items they buy. These ratings are generally set at five levels, one to five stars. Customers who want to buy the items can refer to these ratings. Some customers pay attention to the proportion of four-star and above ratings, while others pay more attention to the proportion of five-star ratings. This reflects that different customers have different expectations of the items.

4.2. Deriving Trust for Composite Services

A composite service’ trustworthiness is determined by the trustworthiness of its underlying component services [58]. A service composition system that may use the trustworthiness of separate components to evaluate the composite service’s derived trustworthiness is currently a work in progress. This is due in part to the lack of a flexible trust evaluation paradigm. This challenge is addressed by the trust evaluation approach given in this work.
“A chain is no stronger than its weakest link”, says an English proverb. Any system has a common characteristic in that different parts contribute differently to the system’s performance, but the weakest part often determines the overall system’s reliability. The whole is only as reliable as its weakest part. Similarly, a composite service is only as trustworthy as its least trustworthy component service.
In order to evaluate the trustworthiness of composite services, this work investigates four types of typical control flows that are frequently encountered in service compositions (see Figure 2) [9,19,50,59,60,61]. For the sake of simplicity, this work considers a composition of two Web services, s i and s j , with the indirect trust values, T i and T j , respectively. T i and T j are continuous random variables with probability density functions f i ( x ) and f j ( x ) , respectively, in the range 0 , 1 . 0 1 f i ( x ) d x = 1 and 0 1 f j ( x ) d x = 1 are simple to find. s C stands for the composite service, and T C stands for its indirect trust value. It is reasonable to assume that T C is a continuous random variable with the probability density function f C ( x ) as well.
(a)
Sequential Flow: Define ⊙ as a sequence operator. s C = s i s j represents that the composite service s C executes the component service s i before moving on to the component service s j . In a sequential flow (see Figure 2a), each component service must be executed. According to the previously described idea about how to evaluate the trustworthiness of composite services, f C ( x ) can be computed as follows:
f C ( x ) = f i ( x ) f j ( x ) = x 1 f i ( x ) f j ( u ) d u + x 1 f i ( v ) f j ( x ) d v .
The above formula shows that the composite service is only as trustworthy as its least trustworthy component service.
(b)
Concurrent Flow: Define ‖ as a parallel operator. s C = s i s j represents that the composite service s C executes both component service s i and component service s j concurrently. In a concurrent flow (see Figure 2b), like a sequential flow, each of the component services must be executed, existing only in the difference of execution sequence. As a result, f C ( x ) is computed in the same way as f C ( x ) for a sequential flow, i.e.:
f C ( x ) = f i ( x ) f j ( x ) = f i ( x ) f j ( x ) = x 1 f i ( x ) f j ( u ) d u + x 1 f i ( v ) f j ( x ) d v .
(c)
Conditional Flow: Define ⊕ as a choice operator. s C = s i s j represents that the composite service s C behaves as either component service s i or service s j . As shown in Figure 2c, any one of the component services is executed in a conditional flow. For example, let s i and s j be followed with executed probabilities, p 1 and p 2 p 1 + p 2 = 1 , respectively. By examining the composite task, these probability can be anticipated. f C ( x ) can be thought of as a weighted sum of f i ( x ) and f j ( x ) , i.e.:
f C ( x ) = f i ( x ) f j ( x ) = p 1 × f i ( x ) + p 2 × f j ( x ) .
(d)
Iterative Flow: Define σ as an iteration operator. s C = σ n ( s i ) represents that the composite service s C executes n times the component service s i . In an iterative flow, the component service must be executed similarly to a sequential flow. The difference is that the service is executed n times instead of just once (see Figure 2d). The value of n may not be constant and may vary depending on the runtime situation. The procedure for computing f C ( x ) is similar to that for a sequential flow, except ⊙ must be applied n 1 times iteratively, as follows:
f C ( x ) = σ n ( f i ( x ) ) = f i ( x ) f i ( x ) f i ( x ) n 1 t i m e s .
Theorem 1.
Consider a composition of two Web services, s i and s j , with indirect trust values, T i and T j , respectively. For an expected trust level, α 0 , 1 , there are:
α ( T i T j ) = α ( T i ) × α ( T j ) , α ( T i T j ) = α ( T i ) × α ( T j ) , α ( T i T j ) = p 1 × α ( T i ) + p 2 × α ( T j ) ,   and α ( σ n ( T i ) ) = α ( T i ) × α ( T i ) × × α ( T i ) n 1 t i m e s × .
Proof of Theorem 1.
In a sequential flow or concurrent flow, f C ( x ) = x 1 f i ( x ) f j ( u ) d u + x 1 f i ( v ) f j ( x ) d v , thus:
α 1 f C ( x ) d x = α 1 ( x 1 f i ( x ) f j ( u ) d u + x 1 f i ( v ) f j ( x ) d v ) d x = α 1 ( f i ( x ) + f j ( x ) f i ( x ) F j ( x ) f j ( x ) F i ( x ) ) d x = α 1 f i ( x ) d x + α 1 f j ( x ) d x [ F i ( x ) F j ( x ) ] α 1 = α 1 f i ( x ) d x + α 1 f j ( x ) d x 1 + ( 1 α 1 f i ( x ) d x ) ( 1 α 1 f j ( x ) d x ) = α 1 f i ( x ) d x α 1 f j ( x ) d x ,
i.e., α ( T i T j ) = α ( T i ) × α ( T j ) and α ( T i T j ) = α ( T i ) × α ( T j ) .
In a conditional flow, f C ( x ) = p 1 × f i ( x ) + p 2 × f j ( x ) , thus:
α 1 f C ( x ) d x = α 1 ( p 1 × f i ( x ) + p 2 × f j ( x ) ) d x = p 1 × α 1 f i ( x ) d x + p 2 × α 1 f j ( x ) d x ,
i.e., α ( T i T j ) = p 1 × α ( T i ) + p 2 × α ( T j ) .
In an iterative flow, it is easy to see that:
α 1 f C ( x ) d x = α 1 f i ( x ) d x α 1 f i ( x ) d x n ,
i.e., α ( σ n ( T i ) ) = α ( T i ) × α ( T i ) × × α ( T i ) n 1 t i m e s × . □
In the above formulae, F i ( x ) and F j ( x ) are the cumulative distribution functions of random variables T i and T j , respectively, namely, F i ( x ) = x f i ( v ) d v = 0 x f i ( v ) d v and F j ( x ) = x f j ( u ) d u = 0 x f j ( u ) d u . No matter what kind of control flows is deployed, we can always find 0 1 f C ( x ) d x = 1 , i.e., the random variable T C is also in the range of 0 , 1 like T i and T j . This ensures the Web service trust evaluation model maintains consistency for both elementary services and composite services.
This paper has mathematically shown the methods to evaluate the trust of each flow. These evaluation methods can all be generalized to more than two component services in a straightforward way. In practice, a composition may consist of one or more of these basic control flows. No matter how complicated the composition is, the trustworthiness of the composition can be always evaluated.

4.3. Extension of Trust Evaluation Model

Customers should enter numerical values in the range of 0 , 1 when rating s i . In practice, however, it is more appropriate for a consumer to express his/her direct trust in s i through a subjective qualitative evaluation rather than a quantitative evaluation. According to previous interactions with s i , customers make subjective qualitative ratings on s i initially, then convert these subjective qualitative ratings to quantitative forms. A comparison between a subjective qualitative rating and a reference value is used in the conversion. This work creates a conversion comparison table (see Table 2). Based on the semantic characteristics of these ratings, this work divides them into 11 categories, which correspond to 11 values. For example, the subjective qualitative rating “very untrustworthy” corresponds to the value 0.2, indicating that t l i s is 0.2, and the subjective qualitative rating “rather trustworthy” corresponds to the value 0.7, indicating that t l i s is 0.7. Note that a value in the middle, such as 0.78, indicates that s i has a subjective qualitative rating that is somewhere between “rather trustworthy” and “very trustworthy” but is closer to the latter.
In doing so, T i will be treated as a discrete random variable with 101 possible values 0 , 0.01 , , 1.00 . To make the statement easier to understand, let x k symbolize the potential values of T i , namely, x k = k 100 for k = 0 , 1 , 2 , , 100 . T i ’s probability function is defined as follows:
f i ( x k ) = P r ( T i = x k ) = C n t ( t l i s | t l i s = x k ) C n t ( t l i s | t l i s n u l l ) ,
where x k 0 , 0.01 , 0.02 , , 1 , l 1 , 2 , , L and i 1 , 2 , , I .
C n t ( t l i s | t l i = x k ) is the number of t l i s when t l i s = x k in Formula (5). Similarly, C n t ( t l i s | t l i s n u l l ) is the number of t l i s when t l i s n u l l , also known as the number of actual ratings on s i . Because C n t ( t l i s | t l i s n u l l ) cannot be 0, Formula (5) is applicable to the case where ratings are required on s i . In the discrete case, α ( T a ) > α ( T a ) is equivalent to n = 100 α 100 f a ( x k ) > n = 100 α 100 f a ( x k ) , where α 0 , 0.01 , , 1 .
The above trust evaluation model has not taken into account the time decay of the ratings and the credibility of the raters. Older ratings are less important than newer ones since older ratings may become obsolete or meaningless as time passes. On the other hand, ratings submitted by more reliable raters are more significant. In Symbol description list 3, we have introduced some new symbols for the simplicity of expression.
Symbol description list 3:
8.
η i represents the number of actual ratings on s i , i.e., η i = C n t ( t l i s | t l i s n u l l ) .
9.
τ represents current moment, τ l , i represents the moment when c l last updated the rating on s i , and ϕ l , i represents the time interval between τ and τ l , i , i.e., ϕ l , i = τ τ l , i .
10.
H ( ϕ l , i ) , which is in the range of 0 , 1 , represents a function of ϕ l , i . The smaller ϕ l , i is, the nearer the value of H ( ϕ l , i ) to unity; the larger ϕ l , i is, the nearer the value of H ( ϕ l , i ) to 0. In other words, H ( ϕ l , i ) indicates the newness degree of t l i s .
11.
t l m c , which is in the range of 0 , 1 , represents customer c l ’s trust in another customer c m and also refers to the preference similarity between c l and c m in c l ’s individual opinion.
12.
T l i represents personalized indirect trust in s i from c l ’s perspective and is also processed as a random variable in the range of 0 , 1 .
t l m c and H ( ϕ l , i ) have completely different connotations, but they both emphasize the importance of a rating. A mechanism is needed to integrate them. Referring to the literature [62], the authors define a new function Z, which allows customers to express different preferences for the credibility of raters and the time decay of ratings. Z is defined as follows:
Z ξ ( l , m , i ) = ( 1 + ξ 2 ) × t l m c × H ( ϕ m , i ) ( ξ 2 × t l m c ) + H ( ϕ m , i ) ,
where ξ > 0 , l , m 1 , 2 , , L and i 1 , 2 , , I .
ξ gauges the relative relevance of H ( ϕ m , i ) to t l m c in Formula (6). When ξ = 1 , c l gives equal weight to H ( ϕ m , i ) and t l m c ; when ξ > 1 , c l gives more weight to H ( ϕ m , i ) ; and when ξ < 1 , c l gives more weight to t l m c .
The probability function of T l i is defined as follows:
f l i ( x k ) = P r ( T l i = x k ) = S u m ( Z ξ ( l , m , i ) | t m i s = x k ) S u m ( Z ξ ( l , m , i ) | t m i s n u l l ) ,
where x k 0 , 0.01 , 0.02 , , 1 , l , m 1 , 2 , , L and i 1 , 2 , , I .
S u m ( Z ξ ( l , m , i ) | t m i s = x k ) is the sum of Z ξ ( l , m , i ) when t m i s = x k in Formula (7). Similarly, S u m ( Z ξ ( l , m , i ) | t m i s n u l l ) is the sum of Z ξ ( l , m , i ) when t m i s n u l l , also known as the number of c l ’s calculated ratings on s i . Formula (7), like Formula (5), is applicable to the case that there must be ratings on s i .
s a and s a are two Web services that perform the same task. From the perspective of c l , T l a and T l a are personalized indirect trust values of s a and s a , respectively. It is said that T l a is greater than T l a and s a is more trustworthy than s a in c l ’s viewpoint if P r ( T l a α ) > P r ( T l a α ) for an expected trust level α 0 , 0.01 , 0.02 , , 1 . These two relationships are symbolically described by the equations α ( T l a ) > α ( T l a ) and α ( s a ) l α ( s a ) l , respectively.
Our previous work designed a trust management mechanism based on peer-to-peer network, where each customer in the community is both a provider and a requester of ratings. This mechanism makes it easy to store and manage t l m c , t m i s and τ m , i , and allows flexible and robust support for personalized trust evaluation.

4.4. Bootstrapping Trust for Newcomer Services

Trust in Web services is established based on the historical ratings. It is tough to give a recommendation for a new service if no ratings are available [13] because there is usually no way to judge its initial trust value [42,44,45]. As a result, the new service cannot be compared with other services. The new service should be given an initial trust value. Existing services will be disadvantaged if the initial trust value is high, whereas a low initial trust value will deter new services from competing [42]. Furthermore, if a system relies on a few ratings to establish trust, the subjectivities of the raters may have an undue influence. One of the first issues service selection must address is how to allow a new service to compete. Introducing virtual ratings can effectively solve this problem. Virtual ratings are not real user ratings, and their introduction aims at constructing the indirect trust probability distribution for a new service. The values of the virtual ratings are hypothetical, i.e., possible values of user ratings in the absence of the a priori information available.
According to the law of large numbers, the frequency of a random event, as the number of trials increases, tends to a stable value. That is, plenty of ratings on s i can effectively and objectively reflect the statistical properties of T l i . However, the question is, how much is plenty? There is no one-size-fits-all response to this question. The statistical features of T l i can be portrayed more effectively and objectively the more calculated ratings on s i . Plenty is a fuzzy term similar to trust in that it is not a precise amount. In order to simplify the expression, we define some new symbols in Symbol description list 4.
Symbol description list 4:
13.
Γ represents the set containing all non-negative numbers, while γ l i represents the number of c l ’s calculated ratings on s i , i.e., γ l i = S u m ( Z ξ ( l , m , i ) | t m i s n u l l ) and γ l i Γ .
14.
Plenty, denoted by P ˜ , is called a fuzzy set defined on Γ , which has a membership function μ P ˜ : Γ 0 , 1 . For each γ l i Γ , γ l i is called a fuzzy member of P ˜ . The value μ P ˜ ( γ l i ) is called the grade of membership of γ l i in P ˜ .
It is self-evident that the larger γ l i , the more γ l i belongs to P ˜ . The grade of membership of 0 in P ˜ is 0, and the grade of membership of + in P ˜ is 1. There is no one-size-fits-all way to create fuzzy membership functions. It is possible that more than one function can be utilized as the fuzzy membership function of P ˜ . This work simply chooses one of these based on the present application needs. The function that has been chosen is as follows:
μ P ˜ ( γ l i ) = 1 β γ l i ( 0 < β < 1 ) .
In Formula (8), β is a parameter of the membership function. If c l presets β to various values, the function curve will be varied. Smaller β values can result in faster changes, whereas bigger β values can result in slower changes. However, the curve change trend is essentially the same. One instance of this function is shown in Figure 3.
The goal of introducing virtual ratings is to build the probability distribution of T l i for the new service s i that has few or no calculated ratings. If there are too many virtual ratings on s i introduced, the calculated ratings on s i will be buried; if there are too few virtual ratings on s i introduced, virtual ratings will not be able to play the role they should. The more calculated ratings on s i , the fewer virtual ratings on s i should be introduced. Of course, fewer is in relation to the number of calculated ratings on s i . Assume that there are γ l i calculated ratings on s i and that δ l i virtual ratings on s i should be introduced. It is reasonable to suppose that δ l i is associated with γ l i and μ P ˜ ( γ l i ) . In the case where there are γ l i calculated ratings on s i , this work recommends that γ l i + 101 β γ l i virtual ratings on s i should be introduced, i.e.:
δ l i = γ l i + 101 ( 1 μ P ˜ ( γ l i ) ) = γ l i + 101 β γ l i .
Figure 4 depicts the relationship between the number of calculated ratings on s i and the number of virtual ratings on s i . When the number of calculated ratings on s i increases from 0, the number of virtual ratings on s i that need be introduced also increases from 101. The number of virtual ratings on s i reaches a peak as the number of calculated ratings on s i grows, then progressively drops until it is near to 0. When the number of calculated ratings on s i is minimal, constructing probability function of T l i needs to introduce virtual ratings on s i ; when the number of calculated ratings on s i is large, these calculated ratings on s i can construct probability function of T l i effectively without the use of virtual ratings on s i . Figure 4 shows a curve changing trend that meets our perception of this issue.
The next issue is how to set values for virtual ratings on s i . There is no reason to prefer one possible value over the others. The only plausible assumption is that each possible virtual rating value is assigned the same probability. This assumption is consistent with the maximum entropy principle. The essence of maximum entropy principle is that the most reasonable inference about the unknown distribution, given the known partial knowledge, is the most uncertain or random inference, which is the unbiased choice we can make. Under this assumption, δ l i should be evenly divided into 101 smaller numbers. The probability function of T l i in Formula (7) can be redefined as follows:
f l i ( x k ) = P r ( T l i = x k ) = S u m ( Z ξ ( l , m , i ) | t m i s = x k ) + δ l i 101 S u m ( Z ξ ( l , m , i ) | t m i s n u l l ) + δ l i .

4.5. Two Corollaries

A question to examine in service composition is how to ensure that the composite service composed of optimal component services is also optimal. Formula (1) can be rewritten as follows in the discrete case:
f l C ( x k ) = f l i ( x k ) f l j ( x k ) = u = k 100 f l i ( x k ) f l j ( x u ) + v = k + 1 100 f l i ( x v ) f l j ( x k ) .
According to Theorem 1 and Formula (11), the following equation can be found:
k = 100 α 100 f l C ( x k ) = k = 100 α 100 ( f l i ( x k ) f l j ( x k ) ) = k = 100 α 100 f l i ( x k ) k = 100 α 100 f l j ( x k ) .
Because k = 100 α 100 f l i ( x k ) 1 and k = 100 α 100 f l j ( x k ) 1 , we can find k = 100 α 100 f l C ( x k ) k = 100 α 100 f l i ( x k ) and k = 100 α 100 f l C ( x k ) k = 100 α 100 f l j ( x k ) , i.e., α ( T l i T l j ) α ( T l i ) and α ( T l i T l j ) α ( T l j ) .
As the number of component services in a composite service grows, the composite service’s trustworthiness may deteriorate. People’s perceptions are compatible with this finding. The following two corollaries can be found based on the prior discussion and Theorem 1:
Corollary 1.
Let s a and s a , s b and s b be Web services offering the same function with c l ’s indirect trust values T l a and T l a , T l b and T l b respectively. For an expected trust level α 0 , 0.01 , , 1 , if α ( s a ) l α ( s a ) l and α ( s b ) l α ( s b ) l , then
α ( s a s b ) l α ( s a s b ) l , α ( s a s b ) l α ( s a s b ) l , α ( s a s b ) l α ( s a s b ) l , α ( σ n ( s a ) ) l α ( σ n ( s a ) ) l , and α ( σ n ( s b ) ) l α ( σ n ( s b ) ) l .
Corollary 2.
Consider a composition of two Web services, s i and s j , with c l ’s indirect trust values T l i and T l j respectively. For an expected trust level α 0 , 0.01 , , 1 ,
α ( T l i T l j ) α ( T l i ) , α ( T l i T l j ) α ( T l j ) , α ( T l i T l j ) α ( T l i ) , α ( T l i T l j ) α ( T l j ) , and α ( σ n ( T l i ) ) α ( T l i ) .

5. Case Study

Our previous work has shown the feasibility of the proposed approach, which models the social features of trust in the sector of Web services and can be exploited to personalize service selection. This study will not repeat the feasibility of the proposed approach but will instead undertake a case study to illustrate the details of bootstrapping trust for the newcomer services and deriving trust for the composite services so that they may be graphically described. The case study is programmed with Scilab and MySQL, and executed on a MacBook Pro computer with the following confgurations: Intel Core i5-4308U CPU, 8 GB RAM, and Windows 10 operating system.
To the best of our knowledge, no dataset exists that perfectly matches the proposed approach. We used some synthetic data based on the extended Epinions dataset, which is a real-world dataset from Trustlet (http://www.trustlet.org/extended_epinions.html, accessed on 19 December 2021) [63,64]. Trustlet.org is a wiki-based platform for open trust metric research with the purpose of collecting and disseminating trust network datasets and trust metric scripts to facilitate comparing different trust metric algorithms. Epinions is a website where people can review products. Customers can sign up for free and write subjective reviews about many different types of items. The extended Epinions dataset contains 13,668,320 customer ratings of items, in addition to the time when these ratings were last modified and the trust or distrust values that one customer has for other customers. In general, the extended Epinions dataset is more suitable for the proposed approach, but some transformations and modifications are still needed.
In the extended Epinions dataset, the values of original ratings are 1–5, which we need to transform to within the interval [0, 1]. The approach we take is to first correspond and convert 1, 2, 3, 4, and 5 to 0.1, 0.3, 0.5, 0.7, and 0.9, respectively. Then, we calculate the mean and variance of the post-transformation rating values of a given item and use them to estimate the parameters of the Beta distribution. Finally, the Beta distribution is used to generate the same number of generated ratings as the original ratings. These generated ratings are the final values we need. We randomly replace the original ratings with the generated ratings. The original trust value of a customer to another customer is 1, and the original distrust value is −1. We modify the distrust value to 0 and set the non-existent trust value of a customer to another customer to 0.5.
Assume that the customer with MEMBER_ID 239694 is the current customer c l . Consider the sequential flow consisting of T a s k 2 and T a s k 3 in Figure 1. The composite task performed by the sequential flow is denoted as T a s k C . There are a set of candidate Web services s 3 , s 4 , s 5 that can be used to perform T a s k 2 , while there is only one candidate Web service s 6 that can be used to perform T a s k 3 . c l needs to select one in S 2 for deployment. s 3 is a new service so there is no actual rating on it. The only candidate service s 6 for T a s k 3 naturally is selected to deploy. Assume that the item with OBJECT_ID 18887577220 is s 4 , the item with OBJECT_ID 17124462212 is s 5 , and the item with OBJECT_ID 1549857 is s 6 . They have 244, 125, and 1195 actual ratings, respectively. The latest date in the extended Epinions dataset is 2003-08-12, which we have taken as the current time τ . The unit for time interval ϕ l , i is days, and the function H ( ϕ l , i ) is set to 0 . 998 ϕ l , i , i.e., H ( ϕ l , i ) = 0 . 998 ϕ l , i . The parameter ξ of Z ξ ( l , m , i ) is set to 0.3, indicating that c l considers t l m c to be more important than H ( ϕ m , i ) .
After calculating according to Formula (7), the original probability distributions for T l 3 , T l 4 , T l 5 , and T l 6 are shown in Figure 5.
As can be seen from Figure 5, s 3 has no actual and calculated ratings and hence cannot participate in the competition; the actual and calculated rating numbers for both s 4 and s 5 are low, which can not effectively reflect their actual quality. In this instance, we must incorporate virtual ratings into the service selection process. Comparison of the number of actual ratings, the number of calculated ratings and the number of virtual ratings about the four services is shown in Table 3.
After introducing virtual ratings, the probability distributions of T l 3 , T l 4 , T l 5 , and T l 6 are shown in Figure 6. From Figure 6, it can be seen that virtual ratings’ effect on the probability distribution of T l i reduces with the increasing number of calculated ratings on s i . s 3 is at initial trust establishment phase, while s 4 and s 5 are at trust improvement phase. It can be considered that s 6 is coming to trust stabilization phase. The comparisons of s 3 , s 4 , and s 5 are shown in Table 4.
When α = 0.7 , there is 0.7 ( T l 4 ) > 0.7 ( T l 5 ) > 0.7 ( T l 3 ) , so c l can find 0.7 ( s 4 ) l 0.7 ( s 5 ) l 0.7 ( s 3 ) l ; when α = 0.8 , there is 0.8 ( T l 3 ) > 0.8 ( T l 5 ) > 0.8 ( T l 4 ) , so c l can find 0.8 ( s 3 ) l 0.8 ( s 5 ) l 0.8 ( s 4 ) l .
This case study shows that for different expected trust levels, the services selected in the service selection process may be different, i.e., the optimal service is relatively optimal, rather than absolutely optimal. This case study also shows that a Web service with few or no ratings can participate in the competition and has the opportunity to be selected as the optimal service. This result accords with the fact that a consumer may try to select a new service when the existing services do not meet his/her expectations well, even though there is a decision-making risk.
As mentioned above, s 6 has been selected to perform T a s k 3 . If c l set α = 0.7 , s 4 will be selected to perform T a s k 2 , then there is a composite service s C = s 4 s 6 . In the same way, if c l set α = 0.8 , there is a composite service s C = s 3 s 6 . The probability distributions of T l C and T l C that are derived according to Formula (11) are shown in Figure 7, and the comparisons of s C and s C are shown in Table 5.
When α = 0.7 , there is 0.7 ( T l C ) > 0.7 ( T l C ) , so c l can find 0.7 ( s C ) l 0.7 ( s C ) l ; when α = 0.8 , there is 0.8 ( T l C ) > 0.8 ( T l C ) , so c l can find 0.8 ( s C ) l 0.8 ( s C ) l .
From Table 4 and Table 5, the following phenomena can be seen. For a given expected trust level α 0 , 1 and the same service s 6 , if α ( s 4 ) l α ( s 3 ) l , there is α ( s 4 s 6 ) l α ( s 3 s 6 ) l ; if α ( s 3 ) l α ( s 4 ) l , there is α ( s 3 s 6 ) l α ( s 4 s 6 ) l , i.e., if the component services selected are optimal, the composite services containing these component services are also optimal.
It is worth noting that our proposed bootstrapping trust approach is applicable to the case when the overall rating values of the existing services are small. Only in this case, the new service is likely to be selected as the optimal service, i.e., it indicates that customers try the new service only if they are dissatisfied with the existing services. When the overall rating values of existing services are large, the new service is inhibited from competing. This is when additional mechanisms may be needed to enable the new service to be competitive.

6. Comparison with Other Approaches

The Web service trust evaluation approach proposed in this work is based on a new theory and focuses on personalized trust evaluation from the customers’ perspective. This work introduces an unprecedented concept of expected trust level to express the lowest degree of trust that a consumer can expect from a Web service’s competency. The approach proposed in this work is based on this concept. This concept is extremely subjective, and we cannot determine in advance the expected trust level for each customer. Customers set different trust expectations and may obtain different results. So, it is not meaningful for this approach to compare accuracy, efficiency, and other indicators with other approaches. Additionally, an exact benchmark trust value for a service does not exist. Various approaches for trust evaluation usually tackle different characteristics of trust. Trust evaluation is a socialization research method, and a feasible comparison scheme for trust evaluation approaches is to compare which approach is closer to the real society and better reflects the socialization characteristics of trust.
In the sector of Web services, reputation-based trust approaches primarily address concerns such as bootstrapping trust, rating credibility, trust dynamism, and trust derivation for composite services, among others. This work defines a set of criteria for the success and efficacy of reputation-based trust approaches targeting the sector of Web services, based on the reference [33]. Table 6 summarizes these criteria.
The approaches used for comparison were selected from articles published in refereed journals, all with different underlying principles. The common features of these selected articles are that they all consider both direct and indirect trust, and they all deal with Web service composition architectures. The approaches are compared in Table 7 using the criteria stated in Table 6.
The proposed approach does not take into account the filtering of unfair ratings, which could lead to collusion and deception issues. Some academics in the Web service management environment have undertaken research on identifying and filtering unfair ratings [65,66]. However, because there are no differences in their values, distinguishing between fair and unfair ratings is extremely difficult. Any type of customer rating is possible in an open environment because dynamic changes in network performance result in dynamic changes in QoS attributes. The vast majority of system participants are usually trustworthy, according to social network data [67]. The majority of the ratings will most likely be reasonable. Although this assumption is not always valid, it provides the foundation for building a trust/reputation system. A trust/reputation system would be pointless if the bulk of the ratings were unfair.
It is difficult to identify and filter out unfair ratings. Another technique to filter out unfair ratings is to assess the credibility of the raters. A trust evaluation approach should not just filter a rating if it differs from the majority opinion but should also consider whether the rating’s inconsistency is attributable to real-life experience. As a result, just the rater’s credibility is affected, but the rating remains [67]. Customers, for the most part, do not interact directly with one another. The association between trust and customer preference similarity has been proven in some research studies [68,69]. The trust that one customer has in another is based on their similarity in prior preferences. A rating given by a reputable customer carries more weight. This is how the issue is addressed in this work.
It is worth suggesting that the comparison of approaches here does not reflect methodological merits or demerits. Society is large and complicated, trust is full of fuzziness and randomness, these approaches all simulate only a part of trust socialization, and the effectiveness of these approaches can be tested only in the practice of real social relations.

7. Conclusions

This work proposes an approach to evaluate Web service trust based on uncertainty methodology. In general, the proposed trust evaluation approach adheres to trust principles and meets the expectations of service customers.
By introducing virtual ratings, this work provides a solution to bootstrapping trust. Even if a service has few or no actual and calculated ratings, it can nevertheless receive an initial trust value and participate in the competition. Furthermore, bootstrapping trust does not require any prior knowledge. Meanwhile, the bootstrapping trust mechanism can reduce decision-making risk by mitigating the negative effects of subjectivity and contingency.
The relationship between a composite service and its component services can be thought of as a whole-to-parts relationship. A composite service is only as trustworthy as its least trustworthy component service. The proposed solution follows this idea, and ensures that both elementary services and composite services are treated without any differences. In other words, the trust evaluation approach can maintain consistency for both elementary services and composite services.
This work integrates the aforementioned solutions in a natural way. The case study demonstrates the viability of the proposed approach.

Author Contributions

Conceptualization, J.Z. and D.L.; methodology, J.Z.; software, J.Z.; validation, J.Z. and D.L.; formal analysis, J.Z.; investigation, D.L.; resources, D.L.; data curation, J.Z.; writing—original draft preparation, J.Z.; writing—review and editing, D.L.; visualization, J.Z.; supervision, D.L.; project administration, D.L.; funding acquisition, D.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China (62072294, 61972238, 61806116), the Scientific and Technological Innovation Programs of Higher Education Institutions in Shanxi(STIP)(2021L287, 2019L0500), the Postgraduate Education Reform Research Project of Shanxi Province (2021YJJG041), the Key R&D program of Shanxi Province (International Cooperation, 201903D421041), the Natural Science Foundation of Shanxi Province (201901D211414, 201801D221175), the Cultivate Scientific Research Excellence Programs of Higher Education Institutions in Shanxi (CSREP)(2019SK036), and the Training Program for Young Scientific Researchers of Higher Education Institutions in Shanxi.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Extended Epinions dataset was utilized in this work to highlight the specifics of trust bootstrapping and service composition. The dataset can be found in Trustlet http://www.trustlet.org/extended_epinions.html (accessed on 19 December 2021).

Acknowledgments

The authors would like to thank Qiuju Dong for the heuristic discussions regarding trust and Yueyun Dai for her linguistic assistance during the preparation of this manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ghezzi, C.; Panzica La Manna, V.; Motta, A.; Tamburrelli, G. Performance-Driven Dynamic Service Selection. Concurr. Comp-Pract. E 2015, 27, 633–650. [Google Scholar] [CrossRef]
  2. Mármol, F.G.; Kuhnen, M.Q. Reputation-Based Web Service Orchestration in Cloud Computing: A Survey. Concurr. Comp-Pract. E 2015, 27, 2390–2412. [Google Scholar] [CrossRef]
  3. Wang, H.; Li, J.; Yu, Q.; Hong, T.; Yan, J.; Zhao, W. Integrating Recurrent Neural Networks and Reinforcement Learning for Dynamic Service Composition. Future Gener. Comp. Syst. 2020, 107, 551–563. [Google Scholar] [CrossRef]
  4. Nepal, S.; Sherchan, W.; Bouguettaya, A. A Behaviour-Based Trust Model for Service Web. In Proceedings of the 2010 IEEE International Conference on Service-Oriented Computing and Applications (SOCA’10), Perth, WA, Australia, 13–15 December 2010; pp. 1–4. [Google Scholar]
  5. Ali, S.H.; El-Atier, R.A.; Abo-Al-Ez, K.M.; Saleh, A.I. A Gen-Fuzzy Based Strategy (GFBS) for Web Service Classification. Wireless Pers. Commun. 2020, 113, 1917–1953. [Google Scholar] [CrossRef]
  6. Sridevi, S.; Karpagam, G.R.; Vinoth Kumar, B.; Uma Maheswari, J. Investigation on Blockchain Technology for Web Service Composition: A Case Study. Int. J. Web. Serv. Res. 2021, 18, 70–92. [Google Scholar] [CrossRef]
  7. Hu, F.; Huang, H.; Guo, Z. Review on Service Composition. In Proceedings of the 2021 IEEE 6th International Conference on Smart Cloud (SmartCloud), Newark, NJ, USA, 6–8 November 2021; pp. 117–124. [Google Scholar]
  8. Zanbouri, K.; Jafari Navimipour, N. A Cloud Service Composition Method Using a Trust-based Clustering Algorithm and Honeybee Mating Optimization Algorithm. Int. J. Commun. Syst. 2020, 33, e4259. [Google Scholar] [CrossRef]
  9. Da Silva, A.S.; Ma, H.; Mei, Y.; Zhang, M. A Survey of Evolutionary Computation for Web Service Composition: A Technical Perspective. IEEE Trans. Emerg. Top. Comput. Intell. 2020, 4, 538–554. [Google Scholar] [CrossRef]
  10. Zhang, J. Trustworthy Web Services: Actions for Now. IT Prof. 2005, 7, 32–36. [Google Scholar] [CrossRef]
  11. Roy, J.; Ramanujan, A. Understanding Web Services. IT Prof. 2001, 3, 69–73. [Google Scholar] [CrossRef]
  12. Lu, J.; Liu, G.; Wu, K.; Qin, W. Location-Aware Web Service Composition Based on the Mixture Rank of Web Services and Web Service Requests. Complexity 2019, 2019, 9871971. [Google Scholar] [CrossRef]
  13. Rupasingha, R.A.H.M.; Paik, I. Alleviating Sparsity by Specificity-Aware Ontology-based Clustering for Improving Web Service Recommendation. IEEJ Trans. Electr. Electron. Eng. 2019, 14, 1507–1517. [Google Scholar] [CrossRef]
  14. Su, K.; Zhang, X.; Liu, Q.; Xiao, B. Strategies of Similarity Propagation in Web Service Recommender Systems. Math. Biosci. Eng. 2021, 18, 530–550. [Google Scholar] [CrossRef] [PubMed]
  15. Wang, F.; Zhong, W.; Xu, X.; Rafique, W.; Zhou, Z.; Qi, L. Privacy-Aware Cold-Start Recommendation Based on Collaborative Filtering and Enhanced Trust. In Proceedings of the 2020 IEEE 7th International Conference on Data Science and Advanced Analytics (DSAA), Sydney, NSW, Australia, 6–9 October 2020; pp. 655–662. [Google Scholar]
  16. Hashmi, K.; Malik, Z.; Najmi, E.; Rezgui, A. SNRNeg: A Social Network Enabled Negotiation Service. Inf. Sci. 2016, 349–350, 248–262. [Google Scholar] [CrossRef]
  17. Xiao, J.; Zhou, X. Dynamic Cloud Service Composition Based on Context Temporal Information and Fuzzy Entropy Weight TOPSIS. In Proceedings of the 2020 Information Communication Technologies Conference (ICTC), Nanjing, China, 29–31 May 2020; pp. 292–296. [Google Scholar] [CrossRef]
  18. Li, B.; Liao, L.; Leung, H.; Song, R. PHAT: A Preference and Honesty Aware Trust Model for Web Services. IEEE Trans. Netw. Serv. Manag. 2014, 11, 363–375. [Google Scholar] [CrossRef]
  19. Souri, A.; Rahmani, A.M.; Jafari Navimipour, N. Formal Verification Approaches in the Web Service Composition: A Comprehensive Analysis of the Current Challenges for Future Research. Int. J. Commun. Syst. 2018, 31, e3808. [Google Scholar] [CrossRef]
  20. Guo, J.J.; Ma, J.F.; Guo, X.X.; Li, X.H.; Zhang, J.W.; Zhang, T. Trust-Based Service Composition and Selection in Service Oriented Architecture. Peer-to-Peer Netw. Appl. 2018, 11, 862–880. [Google Scholar] [CrossRef]
  21. Malouche, H.; Ben Halima, Y.; Ben Ghezala, H. Trust Level Estimation for Cloud Service Composition With Inter-Service Constraints. J. Ambient. Intell. Humaniz. Comput. 2019, 10, 4881–4899. [Google Scholar] [CrossRef]
  22. Chattopadhyay, S.; Banerjee, A. QoS-Aware Automatic Web Service Composition With Multiple Objectives. ACM T. Web. 2020, 14, 12. [Google Scholar] [CrossRef]
  23. Gao, H.; Yan, J.; Mu, Y. Trust-Oriented QoS-Aware Composite Service Selection Based on Genetic Algorithms. Concurr. Comput. Pract. Exp. 2014, 26, 500–515. [Google Scholar] [CrossRef]
  24. Ghafouri, S.H.; Hashemi, S.M.; Razzazi, M.R.; Movaghar, A. Web Service Quality of Service Prediction via Regional Reputation-Based Matrix Factorization. Concurr. Comput. Pract. Exp. 2021, 33, e6318. [Google Scholar] [CrossRef]
  25. Meena, V.; Sasikaladevi, N.; Praba, T.S.; Sriram, V.S.S. Trust Enforced Cloud Service Composition Based on Teaching–Learning-Based Optimization—STORM. J. Circuits Syst. Comput. 2021, 30, 2150293. [Google Scholar] [CrossRef]
  26. Zheng, Z.; Zhang, Y.; Lyu, M.R. Distributed QoS Evaluation for Real-World Web Services. In Proceedings of the 2010 IEEE International Conference on Web Services (ICWS’10), Miami, FL, USA, 5–10 July 2010; pp. 83–90. [Google Scholar]
  27. Zheng, Z.; Zhang, Y.; Lyu, M.R. Investigating QoS of Real-World Web Services. IEEE Trans. Serv. Comput. 2014, 7, 32–39. [Google Scholar] [CrossRef]
  28. Cai, M.; Cui, Y.; Yu, Y.; Xue, Y.; Luo, H. Trusted QoS Assurance Approach for Composite Service. Secur. Commun. Netw. 2021, 2021, 9934138. [Google Scholar] [CrossRef]
  29. Zeng, L.; Benatallah, B.; Ngu, A.H.; Dumas, M.; Kalagnanam, J.; Chang, H. QoS-Aware Middleware for Web Services Composition. IEEE Trans. Softw. Eng. 2004, 30, 311–327. [Google Scholar] [CrossRef] [Green Version]
  30. Dou, W.; Lv, C.; Zhang, X.; Chen, J. A Collaborative QoS-aware Service Evaluation Method Among Multi-Users for a Shared Service. Int. J. Web. Serv. Res. 2012, 9, 30–50. [Google Scholar] [CrossRef]
  31. Romdhani, S.; Bennani, N.; Ghedira-Guegan, C.; Vargas-Solar, G. Trusted Data Integration in Service Environments: A Systematic Mapping. In Service-Oriented Computing; Yangui, S., Bouassida Rodriguez, I., Drira, K., Tari, Z., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 237–242. [Google Scholar]
  32. Romdhani, S.; Vargas-Solar, G.; Bennani, N.; Ghedira-Guegan, C. QoS-Based Trust Evaluation for Data Services as a Black Box. In Proceedings of the 2021 IEEE International Conference on Web Services (ICWS), Chicago, IL, USA, 5–10 September 2021; pp. 476–481. [Google Scholar]
  33. Wahab, O.A.; Bentahar, J.; Otrok, H.; Mourad, A. A Survey on Trust and Reputation Models for Web Services: Single, Composite, and Communities. Decis. Support Syst. 2015, 74, 121–134. [Google Scholar] [CrossRef]
  34. Jøsang, A.; Bhuiyan, T.; Xu, Y.; Cox, C. Combining Trust and Reputation Management for Web-Based Services. In Proceedings of the 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’08), Turin, Italy, 4–5 September 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 90–99. [Google Scholar]
  35. Zhang, J.; Li, D.; Fan, X. A Customer-Centric Trust Evaluation Model for Personalized Service Selection. Sci. Programming-NETH 2018, 2018, 4819195. [Google Scholar] [CrossRef] [Green Version]
  36. Yu, T.; Zhang, Y.; Lin, K.J. Efficient Algorithms for Web Services Selection with End-to-end QoS Constraints. ACM T. Web. 2007, 1, 6:1–6:26. [Google Scholar] [CrossRef]
  37. Xie, N.; Tan, W.; Zheng, X.; Zhao, L.; Huang, L.; Sun, Y. An Efficient Two-Phase Approach for Reliable Collaboration-Aware Service Composition in Cloud Manufacturing. J. Ind. Inf. Integr. 2021, 23, 100211. [Google Scholar] [CrossRef]
  38. Spanoudakis, G.; LoPresti, S. Web Service Trust: Towards a Dynamic Assessment Framework. In Proceedings of the 2009 International Conference on Availability, Reliability and Security (ARES’09), Fukuoka, Japan, 16–19 March 2009; pp. 33–40. [Google Scholar]
  39. Artz, D.; Gil, Y. A Survey of Trust in Computer Science and the Semantic Web. J. Web. Semant. 2007, 5, 58–71. [Google Scholar] [CrossRef] [Green Version]
  40. Mahmud, K.; Usman, M. Trust Establishment and Estimation in Cloud Services: A Systematic Literature Review. J. Netw. Syst. Manag. 2019, 27, 489–540. [Google Scholar] [CrossRef]
  41. Ciszkowski, T.; Mazurczyk, W.; Kotulski, Z.; Hoßfeld, T.; Fiedler, M.; Collange, D. Towards Quality of Experience-Based Reputation Models for Future Web Service Provisioning. Telecommun. Syst. 2012, 51, 283–295. [Google Scholar] [CrossRef] [Green Version]
  42. Yahyaoui, H.; Zhioua, S. Bootstrapping Trust of Web Services Based on Trust Patterns and Hidden Markov Models. Knowl. Inf. Syst. 2013, 37, 389–416. [Google Scholar] [CrossRef]
  43. Maximilien, E.M.; Singh, M.P. Reputation and Endorsement for Web Services. Sigecom. Exch. 2001, 3, 24–31. [Google Scholar] [CrossRef]
  44. Malik, Z.; Bouguettaya, A. Reputation Bootstrapping for Trust Establishment Among Web Services. IEEE Internet Comput. 2009, 13, 40–47. [Google Scholar] [CrossRef]
  45. Nguyen, H.T.; Yang, J.; Zhao, W. Bootstrapping Trust and Reputation for Web Services. In Proceedings of the 2012 IEEE 14th International Conference on Commerce and Enterprise Computing (CEC’12), Hangzhou, China, 9–12 April 2012; pp. 41–48. [Google Scholar]
  46. Wahab, O.A.; Cohen, R.; Bentahar, J.; Otrok, H.; Mourad, A.; Rjoub, G. An Endorsement-Based Trust Bootstrapping Approach for Newcomer Cloud Services. Inf. Sci. 2020, 527, 159–175. [Google Scholar] [CrossRef]
  47. Wu, Q.; Zhu, Q.; Li, P. A Neural Network Based Reputation Bootstrapping Approach for Service Selection. Enterp. Inf. Syst-UK 2015, 9, 768–784. [Google Scholar] [CrossRef]
  48. Wu, Z.; Lin, P.; Huang, P.; Peng, H.; He, Y.; Chen, J. A User Constraint Awareness Approach for QoS-Based Service Composition. In Web Services—ICWS 2019; Miller, J., Stroulia, E., Lee, K., Zhang, L.J., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 48–62. [Google Scholar]
  49. Yang, S.J.; Hsieh, J.S.; Lan, B.C.; Chung, J.Y. Composition and Evaluation of Trustworthy Web Services. Int. J. Web. Grid. Serv. 2006, 2, 5–24. [Google Scholar] [CrossRef]
  50. Paradesi, S.; Doshi, P.; Swaika, S. Integrating Behavioral Trust in Web Service Compositions. In Proceedings of the 2009 IEEE 7th International Conference on Web Services (ICWS’09), Los Angeles, CA, USA, 6–10 July 2009; pp. 453–460. [Google Scholar]
  51. Yahyaoui, H. A Trust-Based Game Theoretical Model for Web Services Collaboration. Knowl.-Based Syst. 2012, 27, 162–169. [Google Scholar] [CrossRef]
  52. Kim, Y.; Choi, J.S.; Shin, Y. Trustworthy Service Discovery for Dynamic Web Service Composition. KSII T. Internet Inf. 2015, 9, 1260–1281. [Google Scholar]
  53. Karimian, K.; Ashtiani, M.; Azgomi, M.A. An Approach Based on the Transferrable Belief Model for Trust Evaluation in Web Services. Soft Comput. 2018, 22, 7293–7311. [Google Scholar] [CrossRef]
  54. Aljazzaf, Z.M.; Perry, M.; Capretz, M.A.M. Trust in Web services. In Proceedings of the 2010 6th World Congress on Services (SERVICES’10), Miami, FL, USA, 5–10 July 2010; pp. 189–190. [Google Scholar]
  55. Azzedin, F.; Ghaleb, M. Internet-of-Things and Information Fusion: Trust Perspective Survey. Sensors 2019, 19, 1929. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  56. Altaf, A.; Abbas, H.; Iqbal, F.; Khan, M.M.Z.M.; Rauf, A.; Kanwal, T. Mitigating Service-Oriented Attacks Using Context-Based Trust for Smart Cities in IoT Networks. J. Syst. Architect. 2021, 115, 102028. [Google Scholar] [CrossRef]
  57. Wang, Y.; Lin, K.J.; Wong, D.S.; Varadharajan, V. Trust Management Towards Service-Oriented Applications. Serv. Oriented Comput. 2009, 3, 129–146. [Google Scholar] [CrossRef] [Green Version]
  58. Bianculli, D.; Binder, W.; Drago, L.; Ghezzi, C. Transparent Reputation Management for Composite Web Services. In Proceedings of the 2008 IEEE 6th International Conference on Web Services (ICWS’08), Beijing, China, 8–11 July 2008; pp. 621–628. [Google Scholar]
  59. Hamadi, R.; Benatallah, B. A Petri Net-Based Model for Web Service Composition. In Proceedings of the 14th Australasian Database Conference (ADC’03), Adelaide, SA, Australia, 3–7 February 2003; Australian Computer Society, Inc.: Sydney, Australia, 2003; pp. 191–200. [Google Scholar]
  60. Hao, Y.; Zhang, Y.; Cao, J. A Novel QoS Model and Computation Framework in Web Service Selection. World Wide Web 2012, 15, 663–684. [Google Scholar] [CrossRef]
  61. Hu, C.; Wu, X.; Li, B. A Framework for Trustworthy Web Service Composition and Optimization. IEEE Access 2020, 8, 73508–73522. [Google Scholar] [CrossRef]
  62. Rijsbergen, C.J.V. Information Retrieval; Butterworths: London, UK, 1979; p. 777. [Google Scholar]
  63. Massa, P.; Souren, K.; Salvetti, M.; Tomasoni, D. Trustlet, Open Research on Trust Metrics. Scalable Comput-Prac. 2008, 9, 31–44. [Google Scholar]
  64. Massa, P.; Avesani, P. Trust-Aware Recommender Systems. In Proceedings of the 2007 ACM Conference on Recommender Systems (RecSys ’07), Minneapolis, MN, USA, 19–20 October 2007; Association for Computing Machinery: New York, NY, USA, 2007; pp. 17–24. [Google Scholar]
  65. Wu, Y.; Yan, C.; Ding, Z.; Liu, G.; Wang, P.; Jiang, C.; Zhou, M. A Novel Method for Calculating Service Reputation. IEEE Trans. Autom. Sci. Eng. 2013, 10, 634–642. [Google Scholar]
  66. Qiu, M.; He, L.; Xue, J. A Model for Feedback Credibility of Trust Management in Web Services. In Proceedings of the 2008 International Seminar on Future Information Technology and Management Engineering (FITME ’08), Loughborough, UK, 4 July 2008; pp. 201–205. [Google Scholar]
  67. Malik, Z.; Bouguettaya, A. Rater Credibility Assessment in Web Services Interactions. World Wide Web 2009, 12, 3–25. [Google Scholar] [CrossRef]
  68. Ziegler, C.N.; Lausen, G. Analyzing Correlation Between Trust and User Similarity in Online Communities. In Trust Management; Jensen, C., Poslad, S., Dimitrakos, T., Eds.; Springer: Berlin/Heidelberg, Germany, 2004; Volume 2995, pp. 251–265. [Google Scholar]
  69. Bhuiyan, T. A Survey on the Relationship Between Trust and Interest Similarity in Online Social Networks. J. Emerg. Technol. Web. Intell. 2010, 2, 291–299. [Google Scholar] [CrossRef] [Green Version]
Figure 1. An example of service selection and service composition.
Figure 1. An example of service selection and service composition.
Entropy 24 00243 g001
Figure 2. Four typical control flows appearing in composition.
Figure 2. Four typical control flows appearing in composition.
Entropy 24 00243 g002
Figure 3. A membership function of P ˜ .
Figure 3. A membership function of P ˜ .
Entropy 24 00243 g003
Figure 4. The number of virtual ratings which should be introduced.
Figure 4. The number of virtual ratings which should be introduced.
Entropy 24 00243 g004
Figure 5. Probability distributions of T l 3 (a), T l 4 (b), T l 5 (c), and T l 6 (d) originally.
Figure 5. Probability distributions of T l 3 (a), T l 4 (b), T l 5 (c), and T l 6 (d) originally.
Entropy 24 00243 g005
Figure 6. Probability distributions of T l 3 (a), T l 4 (b), T l 5 (c) and T l 6 (d) after introducing virtual ratings.
Figure 6. Probability distributions of T l 3 (a), T l 4 (b), T l 5 (c) and T l 6 (d) after introducing virtual ratings.
Entropy 24 00243 g006
Figure 7. Probability distributions of T l C (a) and T l C (b) derived by T l 4 T l 6 and T l 3 T l 6 , respectively.
Figure 7. Probability distributions of T l C (a) and T l C (b) derived by T l 4 T l 6 and T l 3 T l 6 , respectively.
Entropy 24 00243 g007
Table 1. An example of service ratings.
Table 1. An example of service ratings.
TaskService ClassService Candidate# RatingsAlice’s RatingBob’s Rating
T a s k 1 S 1 s 1 5210.88 10.79
s 2 2670.750.90
T a s k 2 S 2 s 3 0--
s 4 244--
s 5 125--
T a s k 3 S 3 s 6 1195--
T a s k 4 S 4 s 7 3-0.83
s 8 15400.80-
T a s k 5 S 5 s 9 935-0.81
1 Assume that all rating values are real numbers in the interval [0, 1].
Table 2. Comparison table of subjective qualitative rating and t l i s .
Table 2. Comparison table of subjective qualitative rating and t l i s .
Subjective Qualitative Rating t l i s
Absolutely Untrustworthy0
Extremely Untrustworthy0.1
Very Untrustworthy0.2
Rather Untrustworthy0.3
Somewhat Untrustworthy0.4
Medium0.5
Somewhat Trustworthy0.6
Rather Trustworthy0.7
Very Trustworthy0.8
Extremely Trustworthy0.9
Absolutely Trustworthy1
Table 3. Comparison table of the number of actual ratings, the number of calculated ratings and the number of virtual ratings.
Table 3. Comparison table of the number of actual ratings, the number of calculated ratings and the number of virtual ratings.
TaskService Candidate# Actual Ratings ( η i )# Calculated Ratings ( γ l i )# Virtual Ratings ( δ l i )
T a s k 2 s 3 00101
s 4 244160.23497137.44105
s 5 12580.59425131.4664
T a s k 3 s 6 1195634.3080757.856698
Table 4. Services comparison after introducing virtual ratings.
Table 4. Services comparison after introducing virtual ratings.
TaskService Candidate 0.7 ( T l i ) 0.8 ( T l i )
T a s k 2 s 3 0.30693070.2079208
s 4 0.46286700.1680446
s 5 0.32176020.1776231
T a s k 3 s 6 0.92474690.8083127
Table 5. Composite services comparison.
Table 5. Composite services comparison.
TaskService Candidate 0.7 ( T l i ) 0.8 ( T l i )
T a s k C s C 0.42803480.1358326
s C 0.28383320.1680650
Table 6. Criteria for the trust approaches in the sector of Web services.
Table 6. Criteria for the trust approaches in the sector of Web services.
IDCriterion
C1Consider the trust dynamism.
C2Account for both subjective and objective perspectives.
C3Consider different degrees of ratings.
C4Consider time decay of ratings.
C5Filter unfair ratings.
C6Assess credibility of raters.
C7Bootstrap trust for the newcomer Web services.
C8Consider personalized trust evaluation.
C9Derive trust for composite services.
Table 7. Comparison summary between the trust approaches in the sector of Web services.
Table 7. Comparison summary between the trust approaches in the sector of Web services.
ApproachC1C2C3C4C5C6C7C8C9
Proposed Approach12
Kim et al. [52]
Gao et al. [23]
Karimian et al. [53]
1 ✔ represents that the method supports the criterion. 2 ✘ represents that the method does not support the criterion.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, J.; Li, D. A Comprehensive and Unified Approach to Web Service Trust Evaluation Based on Uncertainty Methodology. Entropy 2022, 24, 243. https://doi.org/10.3390/e24020243

AMA Style

Zhang J, Li D. A Comprehensive and Unified Approach to Web Service Trust Evaluation Based on Uncertainty Methodology. Entropy. 2022; 24(2):243. https://doi.org/10.3390/e24020243

Chicago/Turabian Style

Zhang, Junwei, and Deyu Li. 2022. "A Comprehensive and Unified Approach to Web Service Trust Evaluation Based on Uncertainty Methodology" Entropy 24, no. 2: 243. https://doi.org/10.3390/e24020243

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop