Fig. 4From: A collaborative service resource evaluation model based on trust networkSecurity protocol of evaluation collection process. Node W's evaluation ticket of service F, including the ID of service F and W's evaluation of f. The message is encrypted with the private key of W, the evaluation ticket will be returned along the query path, and other nodes cannot forge it. The other part of the body of the response message is the proof of transaction between the nodesBack to article page