{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:11:15Z","timestamp":1759961475095,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540668008"},{"type":"electronic","value":"9783540467014"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-46701-7_1","type":"book-chapter","created":{"date-parts":[[2007,8,10]],"date-time":"2007-08-10T10:47:51Z","timestamp":1186742871000},"page":"1-16","source":"Crossref","is-referenced-by-count":14,"title":["Developing Electronic Trust Policies Using a Risk Management Model"],"prefix":"10.1007","author":[{"given":"Dean","family":"Povey","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[1999,10,29]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"M. Blaze, J. Feigenbaum, and J. Lacey. Decentralized trust managment. In Proceedings of the 1996 Symposium on Security and Privacy, pages 164\u2013173, 1996.","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. Keynote: Trust management for public-key infrastructures. In Cambridge 1998 Security Protocols International Workshop, England, 1998.","DOI":"10.1007\/3-540-49135-X_9"},{"key":"1_CR3","unstructured":"Yang-Hua Chu, Joan Feigenbaum, Brian LaMacchia, Paul Resnick, and Martin Strauss. Referee: Trust management for web applications. In Proceedings of the 6th International WWW Conference, 1997."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Dennis Longley, Michael Shain, and William Caelli. Information Security: Dictionary of Concepts, Standards and Terms. Macmillan, 1992.","DOI":"10.1007\/978-1-349-12209-7_3"},{"key":"1_CR5","unstructured":"Common Criteria for Information Technology Security Evaluation-Part 1: Introduction and general model, May 1998."},{"key":"1_CR6","unstructured":"Standards Australia\/Standards New Zealand. AS\/NZS 4360:1999 Risk Management, 1999."},{"key":"1_CR7","unstructured":"Communications Security Establishment (CSE) Government of Canada. A guide to Security Risk Managment for Information Technology Systems MG-2, 1992. URL: http:\/\/www.cse.dnd.ca\/cse\/english\/Manuals\/mg2int-e.htm ."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Dennis Longley, Michael Shain, and William Caelli. Information Security: Dictionary of Concepts, Standards and Terms, pages 450\u2013453. Macmillan, 1992.","DOI":"10.1007\/978-1-349-12209-7_3"},{"key":"1_CR9","unstructured":"D. Harrison McKnight, Larry L. Cummings, and Norman L. Chervany. Trust formation in new organizational relationships. In Information and Decision Sciences Workshop, October 1995. URL: http:\/\/www.misrc.umn.edu\/wpaper\/wp96-01.htm ."},{"key":"1_CR10","unstructured":"D. Harrison McKnight and Norman L. Chervany. The meanings of trust. Technical report, MISRC Working Papers Series, 1996. URL: http:\/\/www.misrc.umn.edu\/wpaper\/wp96-04.htm ."},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Rohit Khare and Adam Rifkin. Weaving a web of trust. World Wide Web Journal, 2(3), 1997.","DOI":"10.1049\/ic:19970644"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Audun J\u00f8sang. Prospectives for modelling trust in information security. In Vijay Varadharajan, editor, Proceedings of the 1997 Australasian Conference on Information Security and Privacy. Springer-Verlag, 1997.","DOI":"10.1007\/BFb0027928"},{"key":"1_CR13","unstructured":"Audun J\u00f8sang. A model for trust in security systems. In Proceedings of the Second Nordic Workshop on Secure Computer Systems, 1997."},{"key":"1_CR14","unstructured":"W3C. Platform for Internet Content Selection (PICS) technical specification. URL: http:\/\/www.w3.org\/PICS\/ ."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Giampiero E.G. Beroggi and William A. Wallace, editors. Computer supported risk management. Kluwer Academic Publishers, 1995.","DOI":"10.1007\/978-94-011-0245-2"},{"key":"1_CR16","unstructured":"Google Inc. Why use Google?, 1999. URL: http:\/\/www.google.com\/why_use.html ."}],"container-title":["Lecture Notes in Computer Science","Secure Networking \u2014 CQRE [Secure] \u2019 99"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46701-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T07:29:31Z","timestamp":1737358171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46701-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540668008","9783540467014"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-46701-7_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}