{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:56:55Z","timestamp":1725469015385},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540342953"},{"type":"electronic","value":"9783540342977"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11755593_4","type":"book-chapter","created":{"date-parts":[[2006,8,25]],"date-time":"2006-08-25T15:28:17Z","timestamp":1156519697000},"page":"33-47","source":"Crossref","is-referenced-by-count":3,"title":["A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments"],"prefix":"10.1007","author":[{"given":"Suroop Mohan","family":"Chandran","sequence":"first","affiliation":[]},{"given":"Korporn","family":"Panyim","sequence":"additional","affiliation":[]},{"given":"James B. D.","family":"Joshi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Skogsrud, H., Benatallah, B., Casati, F.: Model Driven Trust Negotiation for Web Services. IEEE Internet Computing, 45\u201352, (November-December 2003)","DOI":"10.1109\/MIC.2003.1250583"},{"issue":"1","key":"4_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/605434.605435","volume":"6","author":"T. Yu","year":"2003","unstructured":"Yu, T., Winslett, M., Seamons, K.E.: Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation. ACM Transactions in Information Systems Security\u00a06(1), 1\u201342 (2003)","journal-title":"ACM Transactions in Information Systems Security"},{"issue":"7","key":"4_CR3","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1109\/TKDE.2004.1318565","volume":"16","author":"E. Bertino","year":"2004","unstructured":"Bertino, E., Ferrari, E., Squicciarani, A.C.: Trust-X: A Peer to Peer Framework for Trust Establishment. IEEE Transactions on Knowledge and Data Engineering\u00a016(7), 827\u2013842 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Capra, L.: Engineering Human Trust in Mobile System Collaborations. In: Proceedings of ACM SIGSOFT\/FSE-12, Newport Beach, CA, October 31-November 6, 2004, pp. 107\u2013116 (2004)","DOI":"10.1145\/1041685.1029912"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: Proceedings of ACM CIKM 2001, Atlanta, GA, November 5-10, 2001, pp. 310\u2013317 (2001)","DOI":"10.1145\/502585.502638"},{"issue":"1","key":"4_CR6","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/1044552.1044558","volume":"39","author":"H.M.L. Xianliang","year":"2005","unstructured":"Xianliang, H.M.L., Chuan, Z.-x.-Z.: A trust model of P2P system based on confirmation theory. ACM SIGOPS Operating Systems Review\u00a039(1), 56\u201362 (2005)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Gupta, M., Judge, P., Ammar, M.: A Reputation System for Peer-to-Peer Networks. In: Proceedings of NOSSDAV 2003, Monterey, California, USA (June 1\u20133, 2003)","DOI":"10.1145\/776322.776346"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Damiani, E., di Vimercati, S. de C., Paraboschi, S., Samarati, P., Violante, F.: A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: CCS 2002, Washington, DC, USA, November 18\u201322 (2002)","DOI":"10.1145\/586110.586138"},{"key":"4_CR9","unstructured":"Ye, S., Makedon, F., Ford, J.: Collaborative Automated Trust Negotiation in Peer-to-Peer Systems. In: Proceedings of the Fourth International Conference on Peer-to-Peer Computing, August 25\u201327, 2004, pp. 108\u2013115 (2004)"},{"issue":"6","key":"4_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MIS.2004.70","volume":"19","author":"M. Khedr","year":"2004","unstructured":"Khedr, M., Karmouch, A.: Negotiating context Information in Context-Aware Systems. IEEE Intelligent Systems\u00a019(6), 21\u201329 (2004)","journal-title":"IEEE Intelligent Systems"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Ryutov, T., Zhou, L., Neuman, C., Leithead, T., Seamons, K.E.: Adaptive Trust Negotiation and Access Control. In: Proceedings of SACMAT 2005, Stockholm, Sweden, June 1\u20133, 2005, pp. 139\u2013146 (2005)","DOI":"10.1145\/1063979.1064004"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Marti, S., Garcia-Molina, H.: Identity-Crisis: Anonymity vs. Reputation in P2P Systems. In: Proceedings of The Third International Conference on Peer-to-Peer Computing (P2P 2003), September 1\u20133, 2003, pp. 134\u2013141 (2003)","DOI":"10.1109\/PTP.2003.1231513"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-540-30141-7_6","volume-title":"Network and Parallel Computing","author":"S. Song","year":"2004","unstructured":"Song, S., Hwang, K., Macwan, M.: Fuzzy trust integration for security enforcement in grid computing. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol.\u00a03222, pp. 9\u201321. Springer, Heidelberg (2004)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Azzedin, F., Maheswaran, M.: Towards Trust-Aware Resource Management in Grid Computing Systems. In: Proceedings of the 2nd IEEE\/ACM International Symposium on Cluster Computing and the Grid (CCGRID 2002), August 18\u201321, 2002, pp. 47\u201354 (2002)","DOI":"10.1109\/CCGRID.2002.1017189"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Bussard, L., Roudier, Y., Molva, R.: Untraceable Secret Credentials: Trust Establishment with Privacy. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW 2004), March 14\u201317, 2004, pp. 122\u2013126 (2004)","DOI":"10.1109\/PERCOMW.2004.1276917"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Au, R., Looi, M., Ashley, P.: Automated Cross-organisational Trust Establishment on Extranets. In: Proceedings of Workshop on Information Technology for Virtual Enterprises, ITVE 2001, January 29-30, 2001, pp. 3\u201311 (2001)","DOI":"10.1109\/ITVE.2001.904483"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"O\u2019Donovan, J., Smyth, B.: Trust in Recommender Systems. In: Proceedings of IUI 2005, San Diego, California, January 9\u201312, 2005, pp. 167\u2013174 (2005)","DOI":"10.1145\/1040830.1040870"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1023\/B:WINE.0000044030.65959.91","volume":"10","author":"B. Shand","year":"2004","unstructured":"Shand, B., Dimmock, N., Bacon, J.: Trust for Ubiquitous, Transparent Collaboration. Wireless Networks\u00a010, 711\u2013721 (2004)","journal-title":"Wireless Networks"},{"issue":"2","key":"4_CR19","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/4236.832944","volume":"4","author":"D.W. Manchala","year":"2000","unstructured":"Manchala, D.W.: E-Commerce Trust Metrics and Models. Internet Computing, IEEE\u00a04(2), 36\u201344 (2000)","journal-title":"Internet Computing, IEEE"},{"key":"4_CR20","unstructured":"Daskapan, S., Vree, W.G., Eldin, A.A.: Trust Metrics for survivable security systems. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics, October 5-8, 2003, vol.\u00a04, pp. 3128\u20133135 (2003)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Patrick, P.: Impact of SoA on Enterprie Information Archietctures. In: Proceedings of SIGMOD 2005, Baltimore, Maryland, USA, June 14\u201316 (2005)","DOI":"10.1145\/1066157.1066263"},{"issue":"3","key":"4_CR22","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/844339.844346","volume":"3","author":"B. Benatallah","year":"2002","unstructured":"Benatallah, B., Dumas, M., Fauvet, M.-C., Rabhi, F.A., Sheng, Q.-Z.: Overview of some Patterns for Architecting and Managing services. ACM SIGecom Exchanges\u00a03(3), 9\u201316 (2002)","journal-title":"ACM SIGecom Exchanges"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Baresi, L., Heckel, R., Thone, S., Varro, D.: Modeling and Validation of Service-Oriented Architectures: Application vs. Style. In: Proceedings of ESEC\/FSE 2003, Helsinki, Finland, September 1\u20135 (2003)","DOI":"10.1145\/940071.940082"},{"issue":"6","key":"4_CR24","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MIC.2004.53","volume":"8","author":"J.B.D. Joshi","year":"2004","unstructured":"Joshi, J.B.D., Bhatti, R., Bertino, E., Ghafoor, A.: Access-control language for Multidomain environments. IEEE Internet Computing\u00a08(6), 40\u201350 (2004)","journal-title":"IEEE Internet Computing"},{"issue":"1","key":"4_CR25","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"J.B.D. Joshi","year":"2005","unstructured":"Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering\u00a017(1), 4\u201323 (2005)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Piromruen, S., Joshi, J.B.D.: An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environment. In: Proceedings of IEEE Workshop on Object-oriented Real-time Databases (WORDS 2005) (2005)","DOI":"10.1109\/WORDS.2005.18"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization, RFC 3281 (April 2002)","DOI":"10.17487\/rfc3281"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Chandran, S.M., Joshi, J.B.D.: LoT-RBAC: A Location and Time-based RBAC Model. In: Proceedings of 6 th International Conference on Web Information Systems Engineering, New York City, NY, November 20\u201322 (2005)","DOI":"10.1007\/11581062_27"}],"container-title":["Lecture Notes in Computer Science","Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11755593_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T20:25:05Z","timestamp":1555791905000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11755593_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540342953","9783540342977"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/11755593_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}