{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T02:10:12Z","timestamp":1736475012177,"version":"3.32.0"},"publisher-location":"Boston, MA","reference-count":25,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387334059"},{"type":"electronic","value":"9780387334066"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/0-387-33406-8_7","type":"book-chapter","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T08:55:55Z","timestamp":1153731355000},"page":"74-86","source":"Crossref","is-referenced-by-count":4,"title":["A Framework for Web Services Trust"],"prefix":"10.1007","author":[{"given":"Marijke","family":"Coetzee","sequence":"first","affiliation":[]},{"given":"Jan","family":"Eloff","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","volume-title":"Framework for a General Theory of Cognition","author":"R. Axelrod","year":"1972","unstructured":"Axelrod, R., Framework for a General Theory of Cognition. Berkeley: Institute of International Studies, (1972)."},{"key":"7_CR2","unstructured":"Abdul-Rahman A., A framework for desentralised trust reasoning, PHD thesis. Department of Computer Science, University of London, (2004)."},{"key":"7_CR3","unstructured":"Barber B., Logic and Limits of Trust. New Jersey: Rutgers University Press, (1983)."},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Blaze M., Feigenbaum J., Ioannidis J., & Keromytis A., \u201cThe KeyNote Trust-management System, version 2,\u201d IETF, RFC 2704, September, (1999).","DOI":"10.17487\/rfc2704"},{"key":"7_CR5","unstructured":"Box D., Ehnebuske D., Kakivaya G., Layman A., Mendelsohn N., Nielsen H.F, Thatte S. & Winer D., (2000), Simple Object Access Protocol (SOAP) 1.1, http:\/\/www.w3.org\/TR\/SOAP\/, May (2000)."},{"key":"7_CR6","unstructured":"Box D., Web Services Policy Framework (WS-Policy), http:\/\/www.ibm.com\/developerworks\/library\/ws-policy\/index.html, (2003)."},{"key":"7_CR7","unstructured":"Castelfranchi C, Falcone R., Pezzulo G., A Fuzzy Approach to a Belief-Based Trust Computation., in Trust, reputation and security theory and practice, Bologna, Italy, July, Lecture notes in Computer Science, Vol 2631, (2002)."},{"key":"7_CR8","unstructured":"Chervany N.L. & Mgknight D.H., The meanings of trust. Technical Report 94-04, Carlson School of Management, University of Minnesota, (1996)."},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Coetzee M. & Eloff JHP, Autonomous trust for Web Services, INC 2005 (The 5th International Network Conference), 5\u20137 July, Samos, Greece, (2005) Also available at http:\/\/csweb.rau.ac.za\/stafT\/marijke\/marijke_coetzee.htm.","DOI":"10.1108\/10662240510629448"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Coyle F.P., XML, Web services and the data revolution, Addison-Wesley, (2002).","DOI":"10.1145\/763752.763749"},{"issue":"1","key":"7_CR11","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1147\/sj.431.0136","volume":"43","author":"A. Dan","year":"2004","unstructured":"Dan A., Davis D., Kearney R., King R., Keller A., Kuebler D., Ludwig H., Polan, M. Spreitzer, and Youssef A., Web Services on demand: WSLA-driven Automated M. Management, IBM Systems Journal, Special Issue on Utility Computing, Volume 43, Number 1, pages 136\u2013158, IBM Corporation, March, (2004).","journal-title":"IBM Systems Journal, Special Issue on Utility Computing"},{"key":"7_CR12","unstructured":"Della-Libera G. et al., Web Services Trust Language (WS-Trust), http:\/\/www.ibm.com\/developerworks\/library\/wstrust\/index.html, (2003)."},{"key":"7_CR13","unstructured":"Deutsch M., Cooperation and Trust: Some theoretical notes, in Nebraska Symposium on Motivation, M.R. Jones (ed.) Nebraska University Press, (1962)."},{"key":"7_CR14","first-page":"2","volume":"14","author":"J.H.P. Eloff","year":"2000","unstructured":"Eloff J.H.P. & Smith E., Cognitive fuzzy modeling for enhanced risk assessment in a health care institution, IEEE Intelligent systems and their applications, Vol 14, no 2, pp 2\u20138, (2000).","journal-title":"IEEE Intelligent systems and their applications"},{"key":"7_CR15","unstructured":"Gambetta D., Can we trust Trust?, Chapter 13, pp. 213\u2013237. Basil Blackwell. Reprinted in electronic edition from Department of Sociology, University of Oxford (1988)."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Grandison T.W.A., Trust Management for Internet Applications, PhD Thesis, Imperial College of Science, Technology and Medicine, University of London, Department of Computing, (2003).","DOI":"10.1007\/3-540-44875-6_7"},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/S0020-7373(86)80040-2","volume":"24","author":"B. Kosko","year":"1986","unstructured":"Kosko B., Fuzzy Cognitive Maps, International Journal of Man-Machine Studies, Vol 24, pp 65\u201375, (1986).","journal-title":"International Journal of Man-Machine Studies"},{"key":"7_CR18","unstructured":"Kosko B., Fuzzy Engineering, Prentice Hall, Upper Saddle River, New Jersey, (1997)."},{"key":"7_CR19","unstructured":"Luhman N., Trust and Power. Wiley, (1979)."},{"key":"7_CR20","volume-title":"Formalising Trust as a Computational Concept","author":"S. Marsh","year":"1994","unstructured":"Marsh S., Formalising Trust as a Computational Concept, PhD Thesis, University of Stirling, UK, (1994)."},{"key":"7_CR21","volume-title":"Understanding Web Services","author":"E. Newcomer","year":"2002","unstructured":"Newcomer E. Understanding Web Services, Addison-Wesley, USA. (2002)."},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Ratnasingam P.P., Interorganizational trust in Business to Business e-commerce, PhD thesis, Erasmus University Rotterdam, (2001).","DOI":"10.4018\/978-1-93177-775-9"},{"key":"7_CR23","unstructured":"Rivest R. & Lampson B., \u201cSDSI-A Simple Distributed Security Infrastructure,\u201d October (1996)."},{"key":"7_CR24","unstructured":"Winslett M. An Introduction to Trust Negotiation. Nixon & Terzis (eds), In Proceedings of the First International Conference, iTrust Heraklion, Crete, Greece, May 28\u201330, Springer. (2002)."},{"key":"7_CR25","unstructured":"SECURE, Bacon J., Belokosztolszki A., Dimmock N., Eyers D., Moody K., Using Trust and Risk in Role-Based Access Control Policies, Proceedings of Symposium on Access Control Models and Technologies SACMAT04, (2004)."}],"container-title":["IFIP International Federation for Information Processing","Security and Privacy in Dynamic Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-33406-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T01:34:45Z","timestamp":1736472885000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-33406-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9780387334059","9780387334066"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/0-387-33406-8_7","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2006]]}}}