Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
A web service based trust and reputation system for transitory collaboration formation in supply chains
Download
index.pdf
Date
2009
Author
Taşyurt, İbrahim
Metadata
Show full item record
Item Usage Stats
214
views
100
downloads
Cite This
Today, advancements in the information technologies increased the significance of electronic business in the world. Besides the numerous advantages provided by these advancements, competition has also increased for the enterprises. In this competitive environment, companies have to access information faster and response to the changes quickly. In a supply chain, it is a highly possible that one of the partners may defect in providing its services. When these exceptional cases occur, the pending parties have to establish transitory collaborations to replace the missing partner promptly in order not to suffer this deficiency economically. Companies need to know the competences and capabilities of their prospective business partners before establishing partnerships. Furthermore, the reputations of the candidate partners have to be known to avoid possible regrettable partnerships. In this thesis, we have developed a trust and reputation model that can be used over supply chains to determine and exploit the reputation of providers in transitory collaboration formation. The trust model takes the behaviors of providers, consumers into account and combines multiple criteria to aggregate a single reputation value. Experimental results show that, our model provides a robust and reliable reputation mechanism addressing a number of issues that have not been covered in the related studies. In addition to this, an implementation of the model is realized within a Web application and the functionalities have been exposed as Web Services. The interoperability of the Web Services have been ensured through standard GS1 XML documents, which are utilized and extended in scope of the thesis. Furthermore, client interaction is provided through Web based user interfaces and REST services.
Subject Keywords
Computer enginnering.
,
Computer software.
URI
http://etd.lib.metu.edu.tr/upload/12610887/index.pdf
https://hdl.handle.net/11511/18872
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
A geographic information systems tool development for geostatistical analysis of endangered endemic vascular plants of Turkey
Demirci, Barbaros; Akyürek, Sevda Zuhal; Department of Information Systems (2005)
Modern information systems strive to provide effective use of resources. Supplied with analysis tools, geographical information systems (GIS) can serve its stakeholders with minimal requirements. In this study, GIS capabilities were employed for Turkish Flora. Data related with the threatened plants that are indigenous to Turkey were gathered from the relevant literature and reshaped into a dataset in which spatial locations were represented in a geographically referenced format. Afterwards, this output was...
Design and implementation of an open security architecture for a software-based security module
Kaynar, Kaan; Özgit, Attila; Department of Computer Engineering (2009)
Main purpose of this thesis work is to design a comprehensive and open security architecture whose desired parts could be realized on a general-purpose embedded computer without any special cryptography hardware. The architecture provides security mechanisms that implement known cryptography techniques, operations of some famous network security protocols and appropriate system security methods. Consequently, a server machine may offload a substantial part of its security processing tasks to an embedded com...
A script based modular game engine framework for augmented reality applications
Kuru, Muhammed Furkan; Can, Tolga; Department of Computer Engineering (2009)
Augmented Reality (AR) is a technology which blends virtual and real worlds. The technology has various potential application domains such as broadcasting, architecture, manufacturing, and entertainment. As the tempting developments in AR technology continues, the solutions for rapid creation of AR applications become crucial. This thesis presents an AR application development framework with scripting capability as a solution for rapid application development and rapid prototyping in AR. The proposed AR fra...
Sharing electronic healthcare records across country borders
Yüksel, Mustafa; Doğaç, Asuman; Department of Computer Engineering (2008)
Today, the application of information and communication technologies to healthcare is on the agenda of many countries. The main aim is to make Electronic Healthcare Records (EHR) of a patient accessible anywhere at any time to all authorized users. This is even valid in the cross-border case; the European Commission has published eHealth interoperability recommendations to the EU Member States, in which the RIDE Project contributed, for the purpose of an interoperable European Health Network. Interoperable ...
Un/cefact ccts based e-business document design and customization environment for achivieng data interoperability
Tunçer, Fulya; Doğaç, Asuman; Department of Computer Engineering (2009)
The leading effort for creating a standard semantic basis for business documents to solve the electronic business document interoperability problem came from the UN/CEFACT (United Nations Centre for Trade Facilitation and Electronic Business) Core Components Technical Specification (CCTS) through a conceptual document modeling methodology. Currently, the main challenge in using UN/CEFACT CCTS based approaches is that the document artifacts are stored in spreadsheets and this makes it very difficult to disco...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
İ. Taşyurt, “A web service based trust and reputation system for transitory collaboration formation in supply chains,” M.S. - Master of Science, Middle East Technical University, 2009.