Reference Hub1
Social Web Services Management

Social Web Services Management

Zakaria Maamar, Noura Faci, Ejub Kajan, Emir Ugljanin
ISBN13: 9781466658844|ISBN10: 1466658843|EISBN13: 9781466658851
DOI: 10.4018/978-1-4666-5884-4.ch006
Cite Chapter Cite Chapter

MLA

Maamar, Zakaria , et al. "Social Web Services Management." Handbook of Research on Demand-Driven Web Services: Theory, Technologies, and Applications, edited by Zhaohao Sun and John Yearwood, IGI Global, 2014, pp. 135-151. https://doi.org/10.4018/978-1-4666-5884-4.ch006

APA

Maamar, Z., Faci, N., Kajan, E., & Ugljanin, E. (2014). Social Web Services Management. In Z. Sun & J. Yearwood (Eds.), Handbook of Research on Demand-Driven Web Services: Theory, Technologies, and Applications (pp. 135-151). IGI Global. https://doi.org/10.4018/978-1-4666-5884-4.ch006

Chicago

Maamar, Zakaria , et al. "Social Web Services Management." In Handbook of Research on Demand-Driven Web Services: Theory, Technologies, and Applications, edited by Zhaohao Sun and John Yearwood, 135-151. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-5884-4.ch006

Export Reference

Mendeley
Favorite

Abstract

As part of our ongoing work on social-intensive Web services, also referred to as social Web services, different types of networks that connect them together are developed. These networks include collaboration, substitution, and competition, and permit the addressing of specific issues related to Web service use such as composition, discovery, and high-availability. “Social” is embraced because of the similarities of situations that Web services run into at run time with situations that people experience daily. Indeed, Web services compete, collaborate, and substitute. This is typical to what people do. This chapter sheds light on some criteria that support Web service selection of a certain network to sign up over another. These criteria are driven by the security means that each network deploys to ensure the safety and privacy of its members from potential attacks. When a Web service signs up in a network, it becomes exposed to both the authority of the network and the existing members in the network as well. These two can check and alter the Web service's credentials, which may jeopardize its reputation and correctness levels.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.