| Table of Content | 6 |
|---|
| Economic Models and Algorithms forDistributed Systems | 8 |
|---|
| Part I: Reputation Mechanisms and Trust | 11 |
|---|
| Reputation Mechanisms and Trust | 12 |
| A Belief-based Trust Model for DynamicService Selection | 14 |
| 1. Introduction | 14 |
| 2. Motivations | 15 |
| 3. Related work | 15 |
| 4. The methodology | 17 |
| 5. Trust components | 17 |
| 5.1 The sources of beliefs | 18 |
| 6. Illustrating beliefs | 19 |
| 7. Deriving a trust formalism | 19 |
| 7.1 Combining belief values from various sources | 19 |
| 7.2 Weighted Dempster–Shafer theory | 21 |
| 7.3 Trust adaptation: Dynamic weighting | 22 |
| 7.4 Trust computation and selection | 23 |
| 8. Empirical evaluation | 23 |
| 8.1 Environment overview | 23 |
| 8.2 Setup summary | 25 |
| 8.3 Results | 26 |
| 8.3.1 Simulation 1: Service selection without trust | 26 |
| 8.3.2 Simulation 2: Service selection with trust | 26 |
| 8.3.3 Simulation 3: Full service adjustment | 26 |
| 8.3.4 Simulation 4: Delayed service adjustment | 27 |
| 8.4 Discussion | 27 |
| 9. Conclusion and future work | 27 |
| References | 27 |
| Reputation, Pricing and the E-Science Grid | 29 |
| 1. Introduction | 29 |
| 2. Offline allocation with fixed price | 31 |
| 2.1 Scenario | 32 |
| 2.2 Model | 32 |
| 3. Reputation-based scheduling and pricing for online allocation | 34 |
| 3.1 Scenario | 34 |
| 3.2 Model | 36 |
| 3.3 Parameter | 37 |
| 3.4 Sellers’ and buyers’ action space | 38 |
| 3.5 Reputation mechanism | 40 |
| 4. Simulation and implementation | 41 |
| 4.1 Setting | 41 |
| 4.2 Results | 42 |
| 4.3 Application | 43 |
| 5. Conclusion | 44 |
| References | 45 |
| Trust-oriented Utility-based CommunityStructure in Multiagent Systems | 48 |
| 1. Introduction | 48 |
| 2. The approach | 49 |
| 2.1 Communities reasoning about agents | 50 |
| 2.1.1 Modeling the trustworthiness of agents | 51 |
| 2.1.2 Incentives for communities to share reputation ratings of agents | 52 |
| 2.1.3 Interpreting ratings provided by communities | 57 |
| 2.1.4 Overview of community reasoning procedure | 58 |
| 2.2 Agents reasoning about communities | 59 |
| 2.3 Privacy considerations | 60 |
| 3. Discussion | 61 |
| 4. Future work | 62 |
| References | 63 |
| Formation of Virtual Organizations in Grids:A Game-Theoretic Approach | 65 |
| 1. Introduction | 65 |
| 1.1 Our contributions | 67 |
| 1.2 Related work | 67 |
| 1.3 Organization | 68 |
| 2. Coalitional game theory | 68 |
| 3. Model | 70 |
| 4. Virtual organization formation | 71 |
| 5. Virtual organization formation framework | 77 |
| 6. Conclusion | 80 |
| References | 81 |
| Towards Dynamic Authentication inthe Grid – Secure and Mobile BusinessWorkflows Using GSet | 84 |
| 1. Introduction | 84 |
| 2. State of the art | 86 |
| 3. Requirements analysis – The BIG project | 88 |
| 4. The need for dynamic authorization | 89 |
| 5. Gridified Secure Electronic Transaction (gSET) | 90 |
| 5.1 gSET | 91 |
| 5.2 Architecture | 92 |
| 6. Scenario and business model | 93 |
| 7. Integrating gSET with a mobile client | 94 |
| 7.1 Considerations regarding mobile devices | 95 |
| 7.2 Tickets | 96 |
| 7.3 The mobile gSET workflow | 96 |
| 8. Performance analysis | 98 |
| 8.1 gSET versus gridmap | 98 |
| 8.2 Evaluation of gSET in a real mobile grid environment | 100 |
| 9. Conclusions and future work | 102 |
| References | 102 |
| Part II: Service Level Agreements | 106 |
|---|
| Service Level Agreements | 107 |
| Enforcing Service Level Agreements Using anEconomically Enhanced Resource Manager | 109 |
| 1. Introduction | 109 |
| 2. Related work | 110 |
| 3. Scenario definition | 112 |
| 3.1 Revenue maximisation in resource-limited providers | 113 |
| 3.2 SLA violation | 114 |
| 4. Economically Enhanced Resource Manager | 115 |
| 4.1 Architecture | 116 |
| 4.2 Economic Resource Manager (ERM) | 117 |
| 4.3 Monitoring | 118 |
| 4.4 SLA enforcement | 120 |
| 5. Example scenario | 121 |
| 6. Conclusions and future work | 123 |
| References | 124 |
| Extended Resource Management Using ClientClassification and Economic Enhancements | 128 |
| 1. Introduction | 128 |
| 2. Objectives | 129 |
| 3. Motivational scenario | 130 |
| 4. Related work | 130 |
| 5. Economic enhancements and client classification | 131 |
| 6. Economically Enhanced Resource Management | 132 |
| 6.1 Economic design criteria | 132 |
| 6.2 Model of the EERM | 133 |
| 7. Evaluation | 135 |
| 8. Conclusions | 137 |
| References | 137 |
| Mitigating Provider Uncertainty inService Provision Contracts | 141 |
| 1. Introduction and motivation | 142 |
| 2. Related work | 143 |
| 3. Utility model for contract-based service provision | 144 |
| 4. Negative consequences of inaccurate quality level estimators | 146 |
| 5. Performance prediction methods for derivation of qualitylevel estimators | 148 |
| 6. Results | 150 |
| 7. Implementation | 153 |
| 8. Conclusion | 156 |
| References | 156 |
| Text-Content-Analysis based on the SyntacticCorrelations between Ontologies | 158 |
| 1. Introduction | 159 |
| 2. Description of work | 160 |
| 2.1 Analyzing ontologies | 161 |
| 2.2 Text-Content-Analysis | 163 |
| 2.2.1 Matching algorithm | 164 |
| 2.2.2 TCA usage | 167 |
| 2.3 SLA-Management-System | 169 |
| 2.4 A useful service | 174 |
| 3. Conclusions | 175 |
| References | 176 |
| Part III: Business Models and Market Mechanisms | 178 |
|---|
| Business Models and Market Mechanisms | 179 |
| Cloud Computing Value Chains:Understanding Businesses and Value Creation inthe Cloud | 182 |
| 1. Introduction | 183 |
| 2. Literature review | 184 |
| 2.1 Porter value chain
|