{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:15:07Z","timestamp":1772644507243,"version":"3.50.1"},"reference-count":23,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2005,12,1]],"date-time":"2005-12-01T00:00:00Z","timestamp":1133395200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,12,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper aims to show that information and evidence found in the XML\u2010based environment of web services can allow web services providers to gain a sense of the trustworthiness of web services requestors over time.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>A literature review on trust in web services environment is provided. Trust management models, and an existing trust specification for web services are discussed. Next, a conceptual framework for web services trust formation is presented.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The paper makes explicit types of information that can be used for trust formation. Web services providers are given the ability to trust requestors autonomously by making use of information that is published through web services standards, defined over and above a web services interface. The approach incorporates elements of social trust as it is concerned with more than cryptographic controls. It has mechanisms that allow a web services provider to manage trust autonomously, enabling different types of trust for different situations.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>A conceptual framework for trust formation has been defined that identifies a proposal for trust calculation. The paper does not address the implementation of the framework, and calculation of trust over information categories.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>The paper identifies a practical approach to autonomous web services trust by making use of web services standards such as WS\u2010Policy and WSMetadataExchange.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper identifies a taxonomy of trust information that can be used to make explicit the requirements for web services trust.<\/jats:p><\/jats:sec>","DOI":"10.1108\/10662240510629448","type":"journal-article","created":{"date-parts":[[2006,6,30]],"date-time":"2006-06-30T00:26:03Z","timestamp":1151627163000},"page":"498-507","source":"Crossref","is-referenced-by-count":13,"title":["Autonomous trust for web services"],"prefix":"10.1108","volume":"15","author":[{"given":"M.","family":"Coetzee","sequence":"first","affiliation":[]},{"given":"J.H.P.","family":"Eloff","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031220430882300_b2","unstructured":"Atkinson, B. et al. (2002), Web Services Security (WS\u2010Security), Version 1.0, available at: www.verisign.com\/wss\/wss.pdf."},{"key":"key2022031220430882300_b3","unstructured":"Ballinger, K., Box, D., Curbera, F., Davanum, S., Ferguson, D., Graham, S. and Liu, K. et al. (2004), Web Services Metadata Exchange (WS\u2010MetadataExchange), available at: www6.software.ibm.com\/software\/developer\/library\/WS\u2010MetadataExchange.pdf."},{"key":"key2022031220430882300_b5","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J. and Keromytis, A. (1999), The KeyNote Trust\u2010management System, version 2, IETF, RFC 2704.","DOI":"10.17487\/rfc2704"},{"key":"key2022031220430882300_b6","unstructured":"Box, D., Ehnebuske, D., Kakivaya, G., Layman, A., Mendelsohn, N. and Nielsen, H. et al. (2000), Simple Object Access Protocol (SOAP), 1.1, available at: www.w3.org\/TR\/SOAP."},{"key":"key2022031220430882300_b7","unstructured":"Box, D. et al. (2003), Web Services Policy Framework (WS\u2010Policy), available at: www.ibm.com\/developerworks\/library\/ws\u2010policy\/index.html."},{"key":"key2022031220430882300_b8","unstructured":"Chervany, N.L. and McKnight, D.H. (1996), \u201cThe meanings of trust\u201d, Technical Report 94\u201004, Carlson School of Management, University of Minnesota, Minneapolis, MN."},{"key":"key2022031220430882300_b9","doi-asserted-by":"crossref","unstructured":"Coetzee, M. and Eloff, J.H.P. (2004), \u201cTowards web services access control\u201d, Computers and Security, Vol. 23 No. 7.","DOI":"10.1016\/j.cose.2004.05.006"},{"key":"key2022031220430882300_b10","unstructured":"Della\u2010Libera, G. et al. (2003), Web Services Trust Language (WS\u2010Trust), available at: www.ibm.com\/developerworks\/library\/ws\u2010trust\/index.html."},{"key":"key2022031220430882300_b11","doi-asserted-by":"crossref","unstructured":"Dimitrakos, T. (2003), \u201cA service\u2010oriented trust management framework\u201d, in Falcone, R., Barber, S., Korba, L. and Singh, M. (Eds), Trust Reputation, and Security: Theories and Practice, 2631, Lecture Notes in Computer Science, Springer\u2010Verlag, Berlin, pp. 53\u201072.","DOI":"10.1007\/3-540-36609-1_6"},{"key":"key2022031220430882300_b12","unstructured":"Gambetta, D. (1988), Can We Trust Trust?, Chapter 13, Basil Blackwell, University of Oxford, Oxford, pp. 213\u201037, reprinted in electronic edition from Department of Sociology."},{"key":"key2022031220430882300_b13","doi-asserted-by":"crossref","unstructured":"Gottschalk, K., Graham, S., Kreger, H. and Snell, J. (2002), \u201cIntroduction to web services architecture\u201d, IBM Systems Journal, Vol. 41 No. 2.","DOI":"10.1147\/sj.412.0170"},{"key":"key2022031220430882300_b14","unstructured":"Grandison, T.W.A. (2003), \u201cTrust management for internet applications\u201d, PhD thesis, Imperial College of Science, Technology and Medicine, Department of Computing, University of London, London."},{"key":"key2022031220430882300_b15","unstructured":"Hallam\u2010Baker, P., Hodges, J., Maler, E., McLaren, C. and Irving, R. (2003), SAML 1.0 Specification, available at: www.oasis\u2010open.org\/committees\/tc_home.php?wg_abbrev=security."},{"key":"key2022031220430882300_b16","unstructured":"Jasper, R. and Uschold, M.A. (1999), \u201cFramework for understanding and classifying ontology applications\u201d, Proceedings of the IJCAI99 Workshop on Ontologies and Problem\u2010solving Methods (KRR5), Stockholm."},{"key":"key2022031220430882300_b17","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A. (1996), \u201cThe right type of trust for distributed systems\u201d, New Security Paradigms Workshop, ACM, New York, NY.","DOI":"10.1145\/304851.304877"},{"key":"key2022031220430882300_b18","doi-asserted-by":"crossref","unstructured":"Kosko, B. (1986), \u201cFuzzy cognitive maps\u201d, International Journal of Man\u2010Machine Studies, Vol. 24, pp. 65\u201075.","DOI":"10.1016\/S0020-7373(86)80040-2"},{"key":"key2022031220430882300_b19","unstructured":"Marsh, S. (1994), \u201cFormalising trust as a computational concept\u201d, PhD thesis, University of Stirling, Stirling."},{"key":"key2022031220430882300_b20","unstructured":"Modi, T. (2002), \u201cWSIL: do we need another web services specification?\u201d, available at: www.webservicearchitect.com."},{"key":"key2022031220430882300_b21","doi-asserted-by":"crossref","unstructured":"Ratnasingam, P.P. (2001), \u201cInterorganizational trust in business to business e\u2010commerce\u201d, PhD thesis, Erasmus University, Rotterdam.","DOI":"10.4018\/978-1-93177-775-9"},{"key":"key2022031220430882300_b22","unstructured":"Remy, D. and Rosenberg, J. (2004), Securing Web Services with WS\u2010Security, Sams Publishing, Carmel, IN."},{"key":"key2022031220430882300_b23","unstructured":"Rivest, R. and Lampson, B. (1996), SDSI \u2013 A Simple Distributed Security Infrastructure, available at: www.ece.rutgers.edu\/ \u223c\u2009parashar\/Classes\/03\u201004\/ece572\/papers\/SDSI.pdf."},{"key":"key2022031220430882300_frd1","unstructured":"Anderson, A., Anderson, S., Adams, C., Beznosov, K., Brose, G. and Crocker, S. et al. (2003), XACML 1.0 Specification, available at: www.oasis\u2010open.org\/committees\/tc_home.php?wg_abbrev=xacml."},{"key":"key2022031220430882300_frd2","unstructured":"Bellwood, T., Clement, L. and Von Riegen, C. et al. (2003), available at: http:\/\/uddi.org\/pubs\/uddi\u2010v3.0.1\u201020031014.htm."}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/10662240510629448","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240510629448\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240510629448\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:40:06Z","timestamp":1753400406000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/15\/5\/498-507\/177271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,12,1]]},"references-count":23,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2005,12,1]]}},"alternative-id":["10.1108\/10662240510629448"],"URL":"https:\/\/doi.org\/10.1108\/10662240510629448","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2005,12,1]]}}}