{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:44:40Z","timestamp":1743122680996,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030657444"},{"type":"electronic","value":"9783030657451"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-65745-1_19","type":"book-chapter","created":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T08:03:25Z","timestamp":1608278605000},"page":"327-341","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Model Specification Implementation for Trust Negotiation"],"prefix":"10.1007","author":[{"given":"Martin","family":"Kolar","sequence":"first","affiliation":[]},{"given":"Carmen Fernandez","family":"Gago","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,19]]},"reference":[{"key":"19_CR1","first-page":"213","volume":"13","author":"D Gambetta","year":"1990","unstructured":"Gambetta, D.: Can we trust trust? Trust: Making Breaking Coop. Relat. 13, 213\u2013238 (1990)","journal-title":"Trust: Making Breaking Coop. Relat."},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. DARPA Information Survivability Conference and Exposition. In: DISCEX \u201900 Proceedings, vol. 1, pp. 88\u2013102 (2000)","DOI":"10.1109\/DISCEX.2000.824965"},{"key":"19_CR4","unstructured":"Winsborough, W.H., Li, N.: Towards practical automated trust negotiation. In: Proceedings Third International Workshop on Policies for Distributed Systems and Networks, pp. 92\u2013103, IEEE (2002)"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-319-95729-6_5","volume-title":"Data and Applications Security and Privacy XXXII","author":"M Kolar","year":"2018","unstructured":"Kolar, M., Fernandez-Gago, C., Lopez, J.: Policy languages and their suitability for trust negotiation. In: Kerschbaum, F., Paraboschi, S. (eds.) DBSec 2018. LNCS, vol. 10980, pp. 69\u201384. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95729-6_5"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Yu, T., Winslett, M., Seamons, K.E.: Interoperable strategies in automated trust negotiation. In: Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 146\u2013155 (2001)","DOI":"10.1145\/501983.502004"},{"key":"19_CR7","unstructured":"Moyano, F.: Trust engineering framework for software services. Universidad de M\u00e1laga, Lenguajes y Ciencias de la Computaci\u00f3n. PhD thesis (2015)"},{"issue":"6","key":"19_CR8","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MIC.2002.1067734","volume":"6","author":"M Winslett","year":"2002","unstructured":"Winslett, M., et al.: Negotiating trust in the web. IEEE Internet Comput. 6(6), 30\u201337 (2002)","journal-title":"IEEE Internet Comput."},{"issue":"11","key":"19_CR9","doi-asserted-by":"publisher","first-page":"1507","DOI":"10.1109\/TKDE.2010.83","volume":"22","author":"P Bonatti","year":"2010","unstructured":"Bonatti, P., De Coi, J.L., Olmedilla, D., Sauro, L.: A rule-based trust negotiation system. IEEE Trans. Knowl. Data Eng. 22(11), 1507\u20131520 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"19_CR10","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1145\/1015040.1015044","volume":"7","author":"A Hess","year":"2004","unstructured":"Hess, A., Holt, J., Jacobson, J., Seamons, K.E.: Content-triggered trust negotiation. ACM Trans. Inf. Syst. Secur. 7(3), 428\u2013456 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Guo, S., Jiang, W.: An adaptive automated trust negotiation model and algorithm. In: International Conference on Communications and Intelligence Information Security, Nanning, pp. 130\u2013134. IEEE (2010)","DOI":"10.1109\/ICCIIS.2010.71"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-36467-6_10","volume-title":"Privacy Enhancing Technologies","author":"KE Seamons","year":"2003","unstructured":"Seamons, K.E., Winslett, M., Yu, T., Yu, L., Jarvis, R.: Protecting privacy during on-line trust negotiation. In: Dingledine, R., Syverson, P. (eds.) PET 2002. LNCS, vol. 2482, pp. 129\u2013143. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36467-6_10"},{"issue":"3","key":"19_CR13","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/1764810.1764814","volume":"35","author":"NB Ruparelia","year":"2010","unstructured":"Ruparelia, N.B.: Software development lifecycle models. ACM SIGSOFT Softw. Eng. Notes 35(3), 8\u201313 (2010)","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"19_CR14","unstructured":"Driver, M., Gaehtgens, F., O\u2019Neill, M.: Managing digital trust in the software development life cycle. ID G00326944, Gartner (2017)"},{"key":"19_CR15","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.cose.2019.03.024","volume":"84","author":"M Kolar","year":"2019","unstructured":"Kolar, M., Fernandez-Gago, C., Lopez, J.: A model specification for the design of trust negotiations. Comput. Secur. 84, 288\u2013300 (2019)","journal-title":"Comput. Secur."},{"issue":"3","key":"19_CR16","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/B:AGNT.0000018806.20944.ef","volume":"8","author":"P Bresciani","year":"2004","unstructured":"Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: TROPOS: an agent-oriented software development methodology. Auton. Agent Multi-Agent Syst. 8(3), 203\u2013236 (2004). https:\/\/doi.org\/10.1023\/B:AGNT.0000018806.20944.ef","journal-title":"Auton. Agent Multi-Agent Syst."},{"issue":"5","key":"19_CR17","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1002\/spip.422","volume":"14","author":"V Casey","year":"2009","unstructured":"Casey, V., Richardson, I.: Implementation of global software development: a structured approach. Softw. Process: Improv. Pract. 14(5), 247\u2013262 (2009)","journal-title":"Softw. Process: Improv. Pract."},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Ilieva, S., Ivanov, P., Stefanova, E.: Analyses of an agile methodology implementation. In: Proceedings of the 30th Euromicro Conference, pp. 326\u2013333. IEEE (2004)","DOI":"10.1109\/EURMIC.2004.1333387"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Theodorakopoulos, G., Baras, J.S.: Trust evaluation in Ad-Hoc networks. In: Proceedings of the 3rd ACM Workshop on Wireless Security (WiSe \u201904), New York, USA, pp. 1\u201310. ACM (2004)","DOI":"10.1145\/1023646.1023648"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65745-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T13:31:16Z","timestamp":1724074276000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-65745-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030657444","9783030657451"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65745-1_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4,2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,75","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic the event was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}