{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:20Z","timestamp":1725494420159},"publisher-location":"Boston, MA","reference-count":13,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_6","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T23:12:08Z","timestamp":1194649928000},"page":"61-72","source":"Crossref","is-referenced-by-count":2,"title":["Trust Evaluation for Web Applications based on Behavioral Analysis"],"prefix":"10.1007","author":[{"given":"Luiz Fernando Rust C.","family":"Carmo","sequence":"first","affiliation":[]},{"given":"Breno G.","family":"de Oliveira","sequence":"additional","affiliation":[]},{"given":"Augusto C.","family":"Braga","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1016\/j.cose.2004.06.013","volume":"23","author":"J. Lopez","year":"2004","unstructured":"J. Lopez, R. Oppliger and G. Pernul, Authentication and authorization infrastructures (AAIs): a comparative survey, Computers & Security, 23 \u2014 2004, Elsevier, pp. 578\u2013590.","journal-title":"Computers & Security"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"H. Skogsrud, B. Benatallah and F. Casati, Model-Driven Trust Negotiation for Web Services, IEEE Internet Computing, 1089-7801\/03, Nov\/Dec 2003, pp. 45\u201352.","DOI":"10.1109\/MIC.2003.1250583"},{"key":"6_CR3","volume-title":"Trust-based Security in Web Services, Master\u2019s Thesis, Information Systems Institute","author":"C. Platzer","year":"2004","unstructured":"C. Platzer, Trust-based Security in Web Services, Master\u2019s Thesis, Information Systems Institute, Technical University of Vienna, Austria, 2004."},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1002\/spe.511","volume":"33","author":"J. Bacon","year":"2003","unstructured":"J. Bacon, K. Moody and W. Yao, Access Control and Trust in The Use of Widely Distributed Services, Software-Practice Experience, 33, 2003, pp. 375\u2013394.","journal-title":"Software-Practice Experience"},{"key":"6_CR5","volume-title":"In tenth ACM symposium on Access control models and technologies","author":"R. Tatyana","year":"2005","unstructured":"R. Tatyana, L. Zhou, C. Neuman, T. Leithead and K.E. Seamons, Adaptive trust negotiation and access control, In tenth ACM symposium on Access control models and technologies, ACM Press, Stockholm, Sweden, 2005."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"F. Monrose and A. Rubin, Authentication via Keystroke Dynamics, In Fourth ACM Conference on Computer and Communication Security \u2014 CCS 97, Zurich, Switzerland, 1997, pp. 48\u201356","DOI":"10.1145\/266420.266434"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1016\/S0167-4048(03)00010-5","volume":"22-8","author":"A. Guven","year":"2003","unstructured":"A. Guven, and I. Sogukpinar, Understanding Users\u2019 Keystroke Patterns for Computer Access Security, Computers & Security, Elsevier, Vol. 22-8, 2003, pp. 695\u2013706.","journal-title":"Computers & Security"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"A. Peacock, X. Ke and M. Wilkerson, Typing Patterns: A Key to User Identification, IEEE Security & Privacy, September\/October, 2004, pp. 40\u201347.","DOI":"10.1109\/MSP.2004.89"},{"key":"6_CR9","volume-title":"CCS Workshop on Visualization and Data Mining for Computer Security-VizSEC\/DMSEC\u201904","author":"M. Pusara","year":"2004","unstructured":"M. Pusara and C.E. Brodley, (2004). \u201cUser Re-Authentication via Mouse Movements, In CCS Workshop on Visualization and Data Mining for Computer Security-VizSEC\/DMSEC\u201904, ACM press, Washington, DC, USA, October, 2004."},{"issue":"3","key":"6_CR10","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1145\/322510.322526","volume":"2","author":"T. Lane","year":"1999","unstructured":"T. Lane, and C. Brodley, Temporal Sequence Learning and Data Reduction for Anomaly Detection, ACM Transactions on Information and System Security, Vol. 2, No. 3, August, 1999, pp. 295\u2013331.","journal-title":"ACM Transactions on Information and System Security"},{"issue":"1","key":"6_CR11","first-page":"37","volume":"6","author":"D.W. Aha","year":"1991","unstructured":"D.W. Aha, D. Kibler and M.K Albert, Instance-based learning algorithms\u201d, Machine Learning, Kluwer Academic Publishers, Vol. 6, No 1, January, 1991, pp. 37\u201366.","journal-title":"Machine Learning"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"M. El-Ramly and S. Stroulia, Analysis of Web-usage behavior for focused Web sites: a case study\u201d, Journal of Software Maintenance and Evolution: Research and Practice, No. 16, 2004, pp. 129\u2013150.","DOI":"10.1002\/smr.286"},{"key":"6_CR13","unstructured":"T. Lane, \u201cMachine learning techniques for the computer security\u201d. Ph.D. thesis, Purdue University, 2000."}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T08:58:24Z","timestamp":1556960304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_6","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}