{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T10:53:35Z","timestamp":1775300015865,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030050627","type":"print"},{"value":"9783030050634","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05063-4_45","type":"book-chapter","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T19:23:45Z","timestamp":1544124225000},"page":"591-599","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Reputation Model for Third-Party Service Providers in Fog as a Service"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8061-2343","authenticated-orcid":false,"given":"Nanxi","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xiaobo","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xuzhi","family":"Miao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"issue":"1","key":"45_CR1","doi-asserted-by":"crossref","first-page":"69","DOI":"10.3390\/s17010069","volume":"17","author":"S Pirbhulal","year":"2017","unstructured":"Pirbhulal, S., Zhang, H., Me, A.E.: A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors 17(1), 69 (2017)","journal-title":"Sensors"},{"key":"45_CR2","unstructured":"Ming, L. (1999). http:\/\/www.dvbcn.com\/2018\/04\/12-161148.html . Accessed 19 April 2018"},{"issue":"6","key":"45_CR3","first-page":"3169","volume":"9","author":"Z Zheng","year":"2015","unstructured":"Zheng, Z., Wang, P., Liu, J.: Real-time big data processing framework: challenges and solutions. Appl. Math. Inf. Sci. 9(6), 3169\u20133190 (2015)","journal-title":"Appl. Math. Inf. Sci."},{"key":"45_CR4","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-319-05029-4_7","volume-title":"Big Data and Internet of Things: A Roadmap for Smart Environments","author":"F Bonomi","year":"2014","unstructured":"Bonomi, F., Milito, R., Natarajan, P., Zhu, J.: Fog computing: a platform for internet of things and analytics. In: Bessis, N., Dobre, C. (eds.) Big Data and Internet of Things: A Roadmap for Smart Environments. SCI, vol. 546, pp. 169\u2013186. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05029-4_7"},{"issue":"4","key":"45_CR5","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/s11761-017-0219-8","volume":"11","author":"O Skarlat","year":"2016","unstructured":"Skarlat, O., Nardelli, M., Schulte, S.: Resource provisioning for IoT services in the fog. Serv. Oriented Comput. Appl. 11(4), 427\u2013443 (2016)","journal-title":"Serv. Oriented Comput. Appl."},{"issue":"11","key":"45_CR6","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MCOM.2017.1700102","volume":"55","author":"R Chaudhary","year":"2017","unstructured":"Chaudhary, R., Kumar, N., Zeadally, S.: Network service chaining in fog and cloud computing for the 5G environment: data management and security challenges. IEEE Commun. Mag. 55(11), 114\u2013122 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"45_CR7","doi-asserted-by":"crossref","unstructured":"Ashrafi, T.H., Hossain, M.A., Arefin, S.E., Das, K.D.J., Chakrabarty, A.: Service based FOG computing model for IoT. In: IEEE International Conference on Collaboration and Internet Computing, pp. 163\u2013172. IEEE Computer Society (2017)","DOI":"10.1109\/CIC.2017.00031"},{"key":"45_CR8","doi-asserted-by":"crossref","unstructured":"Minh, Q.T., Nguyen, D.T., An, V.L., Hai, D.N., Truong, A.: Toward service placement on Fog computing landscape. In: Nafosted Conference on Information and Computer Science, pp. 291\u2013296 (2017)","DOI":"10.1109\/NAFOSTED.2017.8108080"},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Santoro, D., Zozin, D., Pizzolli, D., Pellegrini, F.D., Cretti, S.: Foggy: a platform for workload orchestration in a fog computing environment. IEEE International Conference on Cloud Computing Technology and Science, pp. 231\u2013234. IEEE (2017)","DOI":"10.1109\/CloudCom.2017.62"},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Yang, Y.: FA2ST: Fog as a Service Technology. In: IEEE Computer Software and Applications Conference, p. 708. IEEE Computer Society (2017)","DOI":"10.1109\/COMPSAC.2017.286"},{"key":"45_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-662-45391-9_7","volume-title":"Service-Oriented Computing","author":"N Chen","year":"2014","unstructured":"Chen, N., Clarke, S.: A dynamic service composition model for adaptive systems in mobile computing environments. In: Franch, X., Ghose, Aditya K., Lewis, Grace A., Bhiri, S. (eds.) ICSOC 2014. LNCS, vol. 8831, pp. 93\u2013107. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45391-9_7"},{"key":"45_CR12","doi-asserted-by":"publisher","first-page":"23823","DOI":"10.18535\/ijecs\/v7i4.05","volume":"7","author":"M Divya","year":"2018","unstructured":"Divya, M., Biradar, N.B.: IOTA-next generation block chain. Int. J. Eng. Comput. Sci. 7, 23823\u201323826 (2018)","journal-title":"Int. J. Eng. Comput. Sci."},{"key":"45_CR13","unstructured":"Serguei, P.: Tangle. IOTA (2017)"},{"key":"45_CR14","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1109\/TPDS.2007.1039","volume":"18","author":"S Kalasapur","year":"2007","unstructured":"Kalasapur, S., Kumar, M., Shirazi, B.A.: Dynamic service composition in pervasive computing. IEEE Trans. Parallel Distrib. Syst. 18, 907\u2013918 (2007)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"3","key":"45_CR15","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/COMST.2016.2535718","volume":"18","author":"F Tschorsch","year":"2016","unstructured":"Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084\u20132123 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"45_CR16","doi-asserted-by":"crossref","unstructured":"Cao, Z., Zhang, X., Zhang, W.: A context-aware adaptive web service composition framework. In: IEEE International Conference on Computational Intelligence & Communication Technology, pp. 62\u201366. IEEE (2015)","DOI":"10.1109\/CICT.2015.68"},{"issue":"1","key":"45_CR17","first-page":"1","volume":"29","author":"M Madkour","year":"2013","unstructured":"Madkour, M., Ghanami, D.E., Maach, A.: Context-aware service adaptation: an approach based on fuzzy sets and service composition. J. Inf. Sci. Eng. 29(1), 1\u201316 (2013)","journal-title":"J. Inf. Sci. Eng."},{"issue":"1 and 2","key":"45_CR18","first-page":"56","volume":"6","author":"C Lin","year":"2014","unstructured":"Lin, C., Kavi, K.: A QoS-aware BPEL framework for service selection and composition using QoS properties. Int. J. Adv. Softw. 6(1 and 2), 56\u201368 (2014)","journal-title":"Int. J. Adv. Softw."},{"issue":"1","key":"45_CR19","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.jksuci.2013.08.003","volume":"26","author":"M Rajeswari","year":"2014","unstructured":"Rajeswari, M., Sambasivam, G., Balaji, N.: Original article: appraisal and analysis on various web service composition approaches based on QoS factors. J. King Saud Univ.-Comput. Inf. Sci. 26(1), 143\u2013152 (2014)","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"45_CR20","doi-asserted-by":"crossref","unstructured":"Wang, Z., Xu, T., Qian, Z.: A parameter-based scheme for service composition in pervasive computing environment. In: Complex, Intelligent and Software Intensive Systems, CISIS 2009 (2009)","DOI":"10.1109\/CISIS.2009.50"},{"key":"45_CR21","doi-asserted-by":"crossref","unstructured":"Chen, N., Yang, Y., Li, J., Zhang, T.: A fog-based service enablement architecture for cross-domain IoT applications. IEEE Fog World Congress (2017)","DOI":"10.1109\/FWC.2017.8368533"},{"key":"45_CR22","doi-asserted-by":"crossref","unstructured":"Jamali, M., Ester, M.: A matrix factorization technique with trust propagation for recommendation in social networks. In: ACM Conference on Recommender Systems, pp. 135\u2013142 ACM (2010)","DOI":"10.1145\/1864708.1864736"},{"issue":"2","key":"45_CR23","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1109\/TSC.2011.58","volume":"6","author":"G Liu","year":"2013","unstructured":"Liu, G., Wang, Y., Orgun, M.A., et al.: Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Trans. Serv. Comput. 6(2), 152\u2013167 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"45_CR24","doi-asserted-by":"crossref","unstructured":"Ziegler, C.N., Lausen, G.: Spreading activation models for trust propagation. In: IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 83\u201397. IEEE (2004)","DOI":"10.1109\/EEE.2004.1287293"},{"issue":"99","key":"45_CR25","first-page":"1","volume":"PP","author":"Y Yang","year":"2018","unstructured":"Yang, Y., Wu, Y., Chen, N., et al.: LOCASS: local optimal caching algorithm with social selfishness for mixed cooperative and selfish devices. IEEE Access PP(99), 1 (2018)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05063-4_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T09:55:58Z","timestamp":1775296558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05063-4_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030050627","9783030050634"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05063-4_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2018\/authors.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"407","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"141","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"7.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}