{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:30:50Z","timestamp":1725496250330},"publisher-location":"Boston, MA","reference-count":42,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_21","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T06:41:46Z","timestamp":1195800106000},"page":"317-332","source":"Crossref","is-referenced-by-count":7,"title":["Design of Trusted Systems with Reusable Collaboration Models"],"prefix":"10.1007","author":[{"given":"Peter","family":"Herrmann","sequence":"first","affiliation":[]},{"given":"Prank Alexander","family":"Kraemer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Cheskin Research and Studio Archetype\/Sapient, eCommerce Trust Study (1999)."},{"key":"21_CR2","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A. J\u00f8sang","year":"2001","unstructured":"A. J\u00f8sang, A Logic for Uncertain Probabilities, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9, 279\u2013311 (2001).","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"A.J.I. Jones and B.S. Firozabadi, On the Characterisation of a Trusting Agent \u2014Aspects of a Formal Approach, in: Trust and Deception in Virtual Societies, edited by C. Castelfranchi and Y.H. Tan (Kluwer Academic Publishers, 2001), pp. 157\u2013168.","DOI":"10.1007\/978-94-017-3614-5_8"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"R. Falcone and C. Castelfranchi, Social Trust: A Cognitive Approach, in: Trust and Deception in Virtual Societies, edited by C. Castelfranchi and Y.H. Tan (Kluwer Academic Publishers, 2001), pp. 55\u201390.","DOI":"10.1007\/978-94-017-3614-5_3"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"N. Mezzetti, A Socially Inspired Reputation Model, in: 1st European Workshop on Public Key Infrastructure (EuroPKI 2004), Samos, edited by S.K. Katsikas, S. Gritzalis and J. Lopez, LNCS 3093 (Springer-Verlag, 2004), pp. 191\u2013204.","DOI":"10.1007\/978-3-540-25980-0_16"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"M. Blaze, J. Feigenbaum, and J. Lacy, Decentralized Trust Management, in: Proc. 17th Symposium on Security and Privacy, Oakland (IEEE Computer, 1996), pp. 164\u2013173.","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"T. Grandison and M. Sloman, Specifying and Analysing Trust for Internet Applications, in: Proc. 2nd IFIP Conference on E-Commerce, E-Business & E-Government (I3E), Lisbon (Kluwer Academic, 2002), pp. 145\u2013157.","DOI":"10.1007\/978-0-387-35617-4_10"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"A. Abdul-Rahman and S. Hailes, Supporting Trust in Virtual Communities, in: Proc. 33rd Hawaii International Conference, Volume 6., Maui, Hawaii (IEEE Computer, 2000).","DOI":"10.1109\/HICSS.2000.926814"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"K. Aberer and Z. Despotovic, Managing Trust in a Peer-2-Peer Information System. in: Proc. 10th International Conference on Information and Knowledge Management (CIKM\u201901), New York, edited by H. Paques et al. (ACM Press, 2001), pp. 310\u2013317.","DOI":"10.1145\/502585.502638"},{"key":"21_CR10","unstructured":"F. Azzedin and M. Maheswaran, A TrustBrokering System and Its Application to Resource Management in Public-Resource Grids, in: Proc. 18th International Parallel and Distributed Processing Symposium (IPDPS\u201904), Santa Fe (IEEE Computer, 2004)."},{"key":"21_CR11","unstructured":"L. Xiong and L. Liu, Building Trust in Decentralized Peer-to-Peer Electronic Communities, in: Proc. 5th International Conference on Electronic Commerce Research (ICECR-5), Dallas (ATSMA, 2002)."},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"S.D. Kamvar, M.T., Schlosser, and H. Garcia-Molina, The EigenTrust Algorithm for Reputation Management in P2P Networks, in: Proc. 12th International World Wide Web Conference, Budapest (ACM Press, 2003).","DOI":"10.1145\/775152.775242"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"D. Ingram, An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks, in: Proc. 3rd International Conference on Trust Management, Paris, edited by P. Herrmann et al., LNCS 3477 (Springer-Verlag, 2005), pp. 273\u2013288.","DOI":"10.1007\/11429760_19"},{"key":"21_CR14","doi-asserted-by":"crossref","first-page":"241","DOI":"10.3233\/JCS-2002-10303","volume":"10","author":"P. Bonatti","year":"2002","unstructured":"P. Bonatti and P. Samarati, A Unified Framework for Regulating Access and Information Release on the Web, Journal of Computer Security 10 241\u2013272 (2002).","journal-title":"Journal of Computer Security"},{"key":"21_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/605434.605435","volume":"6","author":"T. Yu","year":"2003","unstructured":"T. Yu, M. Winslett, and K.E. Seamons, Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation, ACM Transactions on Information and System Security 6 1\u201342 (2003).","journal-title":"ACM Transactions on Information and System Security"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"H. Koshutanski and F. Massacci, Interactive Access Control for Web Services, in: Proc. 19th IFIP Information Security Conference (SEC 2004), Toulouse (Kluwer Academic, 2004), pp. 151\u2013166.","DOI":"10.1007\/1-4020-8143-X_10"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"A.J. Lee, M. Winslett, J. Basney, and V. Welch, Traust: A Trust Negotiation Based Authorization Service, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. St\u00f8len et al., LNCS 3986 (Springer-Verlag, 2006), pp. 458\u2013462.","DOI":"10.1007\/11755593_36"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"S. Pearson and M.C. Mont, Provision of Trusted Identity Management Using Trust Credentials, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. St\u00f8len et al., LNCS 3986 (Springer-Verlag, 2006), pp. 267\u2013282.","DOI":"10.1007\/11755593_20"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"S. Pearson, Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy, in: Proc. 3rd International Conference on Trust Management, Paris, edited by P. Herrmann et al., LNCS 3477 (Springer-Verlag, 2005), pp. 305\u2013320.","DOI":"10.1007\/11429760_21"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"C.D. Jensen and P.O. Connell, Trust-Based Route Selection in Dynamic Source Routing, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. St\u00f8len et al., LNCS 3986 (Springer-Verlag, 2006), pp. 150\u2013163.","DOI":"10.1007\/11755593_12"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"F. Kerschbaum, J. Haller, Y. Karabulut, and P. Robinson, PathTrust: A TrustBased Reputation Service for Virtual Organization Formation, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. St\u00f8len et al., LNCS 3986 (Springer-Verlag, 2006), pp. 193\u2013205.","DOI":"10.1007\/11755593_15"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"P. Herrmann, Trust-Based Protection of Software Component Users and Designers, in: Proc. 1st International Conference on Trust Management, Heraklion, edited by P. Nixon and S. Terzis, S., LNCS 2692 (Springer-Verlag, 2003), pp. 75\u201390.","DOI":"10.1007\/3-540-44875-6_6"},{"key":"21_CR23","unstructured":"G. Lenzini, A. Tokmakoff, and J. Muskens, Managing Trustworthiness in Component-Based Embedded Systems, in: Proc. 2nd International Workshop on Security and Trust Management, Hamburg (2006)."},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"D. Quercia, S. Hailes, and L. Capra, B-Trust: Bayesian Trust Framework for Pervasive Computing, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. St\u00f8len et al., LNCS 3986 (Springer-Verlag, 2006), pp. 298\u2013312.","DOI":"10.1007\/11755593_22"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"F.A. Kraemer and P. Herrmann, Service Specification by Composition of Collaborations \u2014An Example, in: 2nd International Workshop on Service Composition (Sercomp), Hong Kong (IEEE Computer, 2006).","DOI":"10.1109\/WI-IATW.2006.121"},{"key":"21_CR26","unstructured":"G. Booch, J. Rumbaugh, and I. Jacobson, The Unified Modeling Language User Guide (Addison-Wesley, 1999)."},{"key":"21_CR27","unstructured":"Object Management Group, Unified Modeling Language: Superstructure (2006)."},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"R.T. Sanders, H.N. Castej\u00f3n, F.A. Kraemer, and R. Braek, Using UML 2.0 Collaborations for Compositional Service Specification, in: ACM \/ IEEE 8th International Conference on Model Driven Engineering Languages and Systems (2005).","DOI":"10.1007\/11557432_35"},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"J.E.Y. Rosseb\u00f8 and R. Br\u00e6k, Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service Composition, in: Proc. 1st International Conference on Availability, Reliability and Security (ARES\u201906) (IEEE Computer, 2006), pp. 206\u2013215.","DOI":"10.1109\/ARES.2006.135"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"H.N. Castej\u00f3n and R. Braek, A Collaboration-based Approach to Service Specification and Detection of Implied Scenarios, in: ICSE\u2019s 5th Workshop on Scenarios and State Machines: Models, Algorithms and Tools (SCESM\u201906) (2006).","DOI":"10.1145\/1138953.1138962"},{"key":"21_CR31","unstructured":"F.A. Kraemer and P. Herrmann, Transforming Collaborative Service Specifications into Efficiently Executable State Machines, to appear in:Electronic Communications of the EASST (2007)."},{"key":"21_CR32","doi-asserted-by":"crossref","unstructured":"F.A. Kraemer, P. Herrmann, and R. Br\u00e6k, Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services, in: Proc. 8th International Symposium on Distributed Objects and Applications (DOA), Montpellier, edited by R. Meersmann and Z. Tari, LNCS 4276 (Springer-Verlag, 2006), pp. 1613\u20131632.","DOI":"10.1007\/11914952_41"},{"key":"21_CR33","unstructured":"L. Lamport, Specifying Systems (Addison-Wesley, 2002)."},{"key":"21_CR34","doi-asserted-by":"crossref","unstructured":"Y. Yu, P. Manolios, and L. Lamport, Model Checking TLA+ Specifications, in: Correct Hardware Design and Verification Methods (CHARME\u2019 99), edited by L. Pierre and T. Kropf, LNCS 1703, (Springer-Verlag, 1999), pp. 54\u201366.","DOI":"10.1007\/3-540-48153-2_6"},{"key":"21_CR35","doi-asserted-by":"crossref","unstructured":"A. J\u00f8sang, The right type of trust for distributed systems, in: Proc. UCLA conference on New security paradigms workshops, Lake Arrowhead (ACM Press, 1996), pp. 119\u2013131.","DOI":"10.1145\/304851.304877"},{"key":"21_CR36","unstructured":"A. J\u00f8sang, An Algebra for Assessing Trust in Certification Chains, in: Proc. Network and Distributed Systems Security Symposium (NDSS\u201999), edited by J. Kochmar (The Internet Society, 1999)."},{"key":"21_CR37","unstructured":"A. J\u00f8sang and S.J. Knapskog, A Metric for Trusted Systems, in: Proc. 21st National Security Conference (NSA, 1998)."},{"key":"21_CR38","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/S1389-1286(00)00089-X","volume":"34","author":"P. Herrmann","year":"2000","unstructured":"P. Herrmann and H. Krumm, A Framework for Modeling Transfer Protocols, Computer Networks 34, 317\u2013337 (2000).","journal-title":"Computer Networks"},{"key":"21_CR39","unstructured":"R. Br\u00e6k, Unified System Modelling and Implementation, in: International Switching Symposium, Paris (1979), pp. 1180\u20131187."},{"key":"21_CR40","first-page":"73","volume":"95","author":"R. Br\u00e6k","year":"1997","unstructured":"R. Br\u00e6k, J. Gorman, \u00d8. Haugen, G. Melby, B. M\u00f8ller-Pedersen, and R.T. Sanders, Quality by Construction Exemplified by TIMe \u2014The Integrated Methodology, Telektronikk 95, 73\u201382 (1997).","journal-title":"Telektronikk"},{"key":"21_CR41","unstructured":"\u00d8. Haugen and B. M\u00f8ller-Pedersen, JavaFrame \u2014Framework for Java Enabled Modelling, in: Proc. Ericsson Conference on Software Engineering, Stockholm, (Ericsson, 2000)."},{"key":"21_CR42","doi-asserted-by":"crossref","unstructured":"P. Herrmann, Temporal Logic-Based Specification and Verification of Trust Models, in: Proc. 4th International Conference on Trust Management, Pisa, edited by K. St\u00f8len et al., LNCS 3986 (Springer-Verlag, 2006), pp. 105\u2013119.","DOI":"10.1007\/11755593_9"}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:12:42Z","timestamp":1619669562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_21","relation":{},"subject":[]}}