{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:53:14Z","timestamp":1725551594474},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_8","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T02:40:20Z","timestamp":1130985620000},"page":"106-119","source":"Crossref","is-referenced-by-count":2,"title":["Analysis and Modelling of Trust in Distributed Information Systems"],"prefix":"10.1007","author":[{"given":"Weiliang","family":"Zhao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"George","family":"Bryan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"unstructured":"TCSEC. Trusted computer system evaluation criteria. Technical report, U.S.A National Computer Security Council, DOD standard 5200.28-STD (1985)","key":"8_CR1"},{"doi-asserted-by":"crossref","unstructured":"Landauer, J., Redmond, T., Benzel, T.: Formal policies for trusted processes. In: Proceedings of the Computer Security Foundations Workshop II, 1989, pp. 31\u201340 (1989)","key":"8_CR2","DOI":"10.1109\/CSFW.1989.40584"},{"unstructured":"Marsh, S.: Formalising trust as a computational concept. Phd thesis, University of Sterling (1994)","key":"8_CR3"},{"doi-asserted-by":"crossref","unstructured":"Wang, Y., Vassileva, J.: Trust and reputation model in peer-to-peer networks. In: Proceedings of Third International Conference on Peer-to-Peer Computing, pp. 150\u2013157 (2003)","key":"8_CR4","DOI":"10.1109\/PTP.2003.1231515"},{"doi-asserted-by":"crossref","unstructured":"Xiong, L., Liu, L.: A reputation-based trust model for peer-to-peer e commerce communities. In: IEEE International Conference on E-Commerce, pp. 275\u2013284 (2003)","key":"8_CR5","DOI":"10.1109\/COEC.2003.1210262"},{"issue":"3","key":"8_CR6","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MIC.2002.1003138","volume":"6","author":"M.N. Huhns","year":"2002","unstructured":"Huhns, M.N., Buell, D.A.: Trusted autonomy. Internet Computing, IEEE\u00a06(3), 92\u201395 (2002)","journal-title":"Internet Computing, IEEE"},{"unstructured":"Winsborough, W.H., Seamons, K.E., et al.: Automated trust negotiation. In: Proceedings of DARPA Information Survivability Conference and Exposition (2000)","key":"8_CR7"},{"issue":"6","key":"8_CR8","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MIC.2002.1067734","volume":"6","author":"M. Winslett","year":"2002","unstructured":"Winslett, M., Yu, T., et al.: Negotiating trust in the web. IEEE Internet Computing\u00a06(6), 30\u201337 (2002)","journal-title":"IEEE Internet Computing"},{"doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 164\u2013173 (1996)","key":"8_CR9","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/3-540-49135-X_9","volume-title":"Security Protocols","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: Trust management for public-key infrastructures (position paper). In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol.\u00a01550, pp. 59\u201363. Springer, Heidelberg (1999)"},{"issue":"8\u201313","key":"8_CR11","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1016\/S0169-7552(97)00009-3","volume":"29","author":"Y.H. Chu","year":"1997","unstructured":"Chu, Y.H., Feigenbaum, J., LaMacchia, B., Resnick, P., Strauss, M.: REFEREE: Trust management for Web applications. Computer Networks and ISDN Systems\u00a029(8\u201313), 953\u2013964 (1997)","journal-title":"Computer Networks and ISDN Systems"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-540-30079-3_5","volume-title":"Trust and Privacy in Digital Business","author":"W. Zhao","year":"2004","unstructured":"Zhao, W., Varadharajan, V., Bryan, G.: Modelling trust relationships in distributed environments. In: Katsikas, S.K., L\u00f3pez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol.\u00a03184, pp. 40\u201349. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Grandison, T., Sloman, M.: A survey of trust in internet application. IEEE Communications Surveys, 2\u201316 (Fourth Quarter 2000)","key":"8_CR13","DOI":"10.1109\/COMST.2000.5340804"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/304851.304877","volume-title":"Proceedings of the 1996 New Security Paradigms Workshop","author":"A. J\u00f8sang","year":"1996","unstructured":"J\u00f8sang, A.: The right type of trust for distributed systems. In: Proceedings of the 1996 New Security Paradigms Workshop, pp. 119\u2013131. ACM Press, New York (1996)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T15:03:00Z","timestamp":1605625380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11593980_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}