Reputation-based business policy violation detection of long-term composed services with efficient alleviation of malicious rating of violated service
by S. Tiroumalmouroughane; P. Thambidurai
International Journal of Computer Aided Engineering and Technology (IJCAET), Vol. 15, No. 2/3, 2021

Abstract: The web services are the emergent technology in the field of business processes where the services offered by the organisation are managed through the framework called change management framework (CMF). By this framework any changes for the service offered by the organisation can be added, modified or replaced in the form of the service request offered by either the customer or other business parties thus it is helpful for the organisation to develop itself by satisfying the customer requirements in an autonomous manner. In this paper, we have presented a methodology for detecting the business policy violation with alternating Turing machine (ATM) and reputation measurement (RM). When a change request is encountered the detection of policy points is performed by ATM and if the policy violation occurs, it means reputation of the service is measured through RM by considering malicious intentions. In the case of non-policy violation or if the service has high reputation means that become integrated to the CMF otherwise it will be sent to the exception handler. The framework is implemented in the visual studio with DOTNET language and the performance is analysed with a different number of change requests.

Online publication date: Thu, 19-Aug-2021

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Computer Aided Engineering and Technology (IJCAET):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com