To give a simple explanation as to why Apple is reluctant to incorporate WPS into the AirPort and Time Capsule firmware, please see this post on Lifehacker: http://mnch.us/vfskZ
It's basically because WPS is designed to work with a PIN that's hard-coded (meaning it can only be changed by a firmware modification) into the device. Since this PIN is set by the company (i.e. Apple if they included WPS), the PIN for one specific model or firmware version will work on all devices of the same model or firmware version. Since this PIN cannot be changed by the user, a program (such as Reaver, discussed in that post) can perform a brute force attack and eventually open the router to reconfiguration by an adversary. When this happens, your entire network can immediately break down because few people take the time to secure individual devices or nodes on their home network, out of convenience.
Basically, I could pull up outside your house, use my Chromebook laptop with Reaver installed, and if I know what type of router you're using (which is fairly easy to find, regardless of your WiFi security), I can use WPS and easily break your WiFi password, leech off your network, release a virus to your Windows computers, or use other malicious techniques to break into your Mac machines. (OS X is a very secure operating system, but few people take the time to properly lock it down, leaving their Mac vulnerable).
In a nutshell, Apple tries to avoid any technology that has the potential to easily backfire on user security, which WPS does for the sake of convenience.