{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:56:46Z","timestamp":1725469006980},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540342953"},{"type":"electronic","value":"9783540342977"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11755593_19","type":"book-chapter","created":{"date-parts":[[2006,8,25]],"date-time":"2006-08-25T15:28:17Z","timestamp":1156519697000},"page":"252-266","source":"Crossref","is-referenced-by-count":4,"title":["Towards Automated Evaluation of Trust Constraints"],"prefix":"10.1007","author":[{"given":"Siani","family":"Pearson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"PRIME 2004: Privacy and Identity Management for Europe, European RTD Integrated Project under the FP6\/IST Programme (2004), http:\/\/www.prime-project.eu.org\/"},{"key":"19_CR2","unstructured":"TCG 2003: TCG Main Specification, v1.1b (2003), Available via: http:\/\/www.trustedcomputinggroup.org"},{"key":"19_CR3","unstructured":"TCG 2003: TCG TPM Specification, v1.2 (2003), Available via: http:\/\/www.trustedcomputinggroup.org"},{"key":"19_CR4","unstructured":"Sommer, D. (ed.): PRIME Architecture V1, D14.2b (2004), http:\/\/www.prime-project.eu.org\/"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Cranor, L., Langheinrich M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The Platform for Privacy Preferences Specification, v1.0, W3C (2002), http:\/\/www.w3.org\/TR\/P3P\/","DOI":"10.1007\/978-3-642-27739-9_759-2"},{"issue":"5","key":"19_CR6","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/506218.506249","volume":"45","author":"A. Kobsa","year":"2002","unstructured":"Kobsa, A.: Personalized hypermedia and international privacy. Communications of the ACM\u00a045(5), 64\u201367 (2002), http:\/\/www.ics.uci.edu\/~kobsa\/papers\/2002-CACM-kobsa.pdf","journal-title":"Communications of the ACM"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-540-40956-4_12","volume-title":"Privacy Enhancing Technologies","author":"A. Kobsa","year":"2003","unstructured":"Kobsa, A.: A Component Architecture for Dynamically Managing Privacy Constraints in Personalized Web-based Systems. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760, pp. 177\u2013188. Springer, Heidelberg (2003)"},{"key":"19_CR8","unstructured":"UK Information Commissioner, Who Cares About Data Protection? Segmentation Research (2003), http:\/\/www.informationcommissioner.gov.uk\/cms\/DocumentUploads\/Segmentation%20Research%20Findings.pdf"},{"key":"19_CR9","unstructured":"Leenes, R., Lips, M.: Social evaluation of early prototyoes. In: Fischer-H\u00fcbner, S., Pettersson, J.S. (eds.) Evaluation of early prototypes, PRIME deliverable D6.1.b, 1 (2004), http:\/\/www.prime-project.eu.org\/public\/prime_products\/deliverables\/"},{"key":"19_CR10","unstructured":"Fischer-H\u00fcbner, S., Pettersson, J.S. (eds.): Evaluation of early prototypes, PRIME deliverable D6.1.b, 1 (2004), http:\/\/www.prime-project.eu.org\/public\/prime_products\/deliverables\/"},{"key":"19_CR11","unstructured":"Pettersson, J.S. (ed.): HCI guidance and proposals, PRIME deliverable D6.1.c, (February 11, 2005), http:\/\/www.prime-project.eu.org\/public\/prime_products\/deliverables\/"},{"key":"19_CR12","unstructured":"Turner, C.W., Zavod, M., Yurcik, W.: Factors that Affect the Perception of Security and Privacy of E-Commerce Websites. In: Proc 4th International Conference on Electronic Commerce Research (2001)"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Turner, C.W.: The online experience and consumers\u2019 perceptions of e-commerce security. In: Proc. Human Factors and Ergonomics Society 46th Annual Meeting (2002)","DOI":"10.1177\/154193120204601402"},{"key":"19_CR14","unstructured":"Turner, C.W.: How do consumers form their judgments of the security of e-commerce web sites? In: Proc. Workshop on HCI and Security Systems, CHI 2003 (2003)"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-540-39650-5_9","volume-title":"Computer Security \u2013 ESORICS 2003","author":"M. Casassa Mont","year":"2003","unstructured":"Casassa Mont, M., Pearson, S., Bramhall, P.: Towards Accountable Management of Privacy and Identity Management. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 146\u2013161. Springer, Heidelberg (2003)"},{"key":"19_CR16","unstructured":"IBM 2004: The Enterprise Privacy Authorization Language (EPAL), v1.1 specification (2004), http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-540-30079-3_13","volume-title":"Trust and Privacy in Digital Business","author":"M. Casassa Mont","year":"2004","unstructured":"Casassa Mont, M.: Dealing with Privacy Obligations: Important Aspects and Technical Approaches. In: Katsikas, S.K., L\u00f3pez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol.\u00a03184, pp. 120\u2013131. Springer, Heidelberg (2004)"},{"key":"19_CR18","unstructured":"Microsoft 2006: Next-Generation Secure Computing Base home page (2006), http:\/\/www.microsoft.com\/resources\/ngscb"},{"volume-title":"Trusted Computing Platforms","year":"2002","key":"19_CR19","unstructured":"Pearson, S. (ed.): Trusted Computing Platforms. Prentice-Hall, Englewood Cliffs (2002)"},{"key":"19_CR20","unstructured":"Cavoukian, A., Crompton, M.: Web Seals: A review of Online Privacy Programs. In: 22nd International Conference on Privacy and Data Protection (2000), http:\/\/www.privacy.gov.au\/publications\/seals.pdf"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Resnik, P., Varian, H.R.: Recommender Systems. Communications of ACM (1997), http:\/\/www.acm.org\/pubs\/cacm\/MAR97\/resnick.html","DOI":"10.1145\/245108.245121"},{"key":"19_CR22","unstructured":"Reputation Research Network 2004: Online papers on reputation and reputation research (2004), http:\/\/databases.si.umich.edu\/reputations\/index.html"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Ball, E., Chadwick, D.W., Basden, A.: The Implementation of a System for Evaluating Trust in a PKI Environment. In: Petrovic, O., Ksela, M., Fallenbock, M., Kitti, C. (eds.) Trust in the Network Economy, Evolaris, vol.\u00a02, pp. 263\u2013279 (2003)","DOI":"10.1007\/978-3-7091-6088-6_16"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust-Management System RFC 2704 (1999), http:\/\/www.cis.upenn.edu\/~angelos\/keynote.html","DOI":"10.17487\/rfc2704"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. 17th Symposium on Security and Privacy, pp. 164\u2013173 (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"19_CR26","first-page":"127","volume":"2","author":"Y.-H. Chu","year":"1997","unstructured":"Chu, Y.-H., Feigenbaum, J., LaMacchia, B., Resnick, P., Strauss, M.: REFEREE: Trust Management for Web Applications. World Wide Web Journal\u00a02, 127\u2013139 (1997)","journal-title":"World Wide Web Journal"},{"key":"19_CR27","unstructured":"Herzberg, A., Mass, Y., Michaeli, J., Naor, D., Ravid, Y.: Access Control Meets Public Key Infrastructure. Security & Privacy (2000)"},{"issue":"7","key":"19_CR28","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1109\/TKDE.2004.1318565","volume":"16","author":"E. Bertino","year":"2004","unstructured":"Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-X: A Peer-to-Peer Framework for Trust Establishment. IEEE Transactions on Knowledge and Data Engineering\u00a016(7), 827\u2013842 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"19_CR29","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML), See: http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml"},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language (2001), Available via: http:\/\/www-dse.doc.ic.ac.uk\/research\/policies\/index.shtml","DOI":"10.1007\/3-540-44569-2_2"},{"key":"19_CR31","unstructured":"MIND SWAP Trust Ontology, http:\/\/www.trust.mindswap.org\/ont\/trust.owl"},{"key":"19_CR32","unstructured":"Berners-Lee, T.: Semantic Web Tutorial Using N3 (2003), http:\/\/www.w3.org\/2000\/10\/swap\/doc\/Trust"},{"key":"19_CR33","unstructured":"Web of Trust, v0.1, http:\/\/xmlns.com\/wot\/0.1\/"},{"key":"19_CR34","unstructured":"Synomos 2005: Synomos Align 3.0 (2005), http:\/\/www.synomos.com\/"},{"key":"19_CR35","unstructured":"SenSage 2005: SenSage Web site (2005), http:\/\/www.sensage.com\/"}],"container-title":["Lecture Notes in Computer Science","Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11755593_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T03:09:55Z","timestamp":1707188995000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11755593_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540342953","9783540342977"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/11755593_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}