Fig. 5From: A collaborative service resource evaluation model based on trust networkSecurity protocol of evaluation feedback process. Node V carries the proof feedback source's evaluation ticket to service F, and the proof transaction certificate of node U and node V. When node U continues to feedback to node W, the steps are similar to the evaluation collection, but this time it carries the evaluation ticket from V. The protocol guarantees that the identity of any process node will not be counterfeited and that no node will deny its own behaviorBack to article page