{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:59:40Z","timestamp":1743029980145,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030750770"},{"type":"electronic","value":"9783030750787"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75078-7_45","type":"book-chapter","created":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T09:06:00Z","timestamp":1619773560000},"page":"447-458","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the Structure and Assessment of Trust Models in Attribute Assurance"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Gr\u00fcner","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,1]]},"reference":[{"issue":"2","key":"45_CR1","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"key":"45_CR2","unstructured":"McKnight, D.H., Chervany, N.L.: The meanings of trust. University of Minnesota, Technical report. MISRC 9604 (1996)"},{"key":"45_CR3","doi-asserted-by":"crossref","unstructured":"Alexopoulos, N., Daubert, J., M\u00fchlh\u00e4user, M., Habib, S.M.: Beyond the hype: on using blockchains in trust management for authentication. In: 2017 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom), pp. 546\u2013553 (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.283"},{"issue":"1","key":"45_CR4","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1587\/transinf.E95.D.29","volume":"95","author":"H Gomi","year":"2012","unstructured":"Gomi, H.: Authentication trust metric and assessment for federated identity management systems. IEICE Trans. Inf. Syst. 95(1), 29\u201337 (2012)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"45_CR5","doi-asserted-by":"crossref","unstructured":"Gr\u00fcner, A., M\u00fchle, A., Gayvoronskaya, T., Meinel, C.: A comparative analysis of trust requirements in decentralized identity management. In: 2019 International Conference on Advanced Information Networking and Applications (AINA), pp. 200\u2013213 (2019)","DOI":"10.1007\/978-3-030-15032-7_18"},{"key":"45_CR6","volume-title":"The Official PGP User\u2019s Guide","author":"PR Zimmermann","year":"1995","unstructured":"Zimmermann, P.R.: The Official PGP User\u2019s Guide. MIT Press, Cambridge (1995)"},{"key":"45_CR7","unstructured":"Internet Engineering Task Force. RFC 5280. internet x.509 public key infrastructure certificate and certificate revocation list (CRL) profile (2008). https:\/\/tools.ietf.org\/html\/rfc5280. Accessed 30 Dec 2020"},{"key":"45_CR8","doi-asserted-by":"crossref","unstructured":"Gr\u00fcner, A., M\u00fchle, A., Meinig, M., Meinel, C.: A taxonomy of trust models for attribute assurance in identity management. In: 2020 Workshops of the 34th International Conference on Advanced Information Networking and Applications (WAINA), pp. 65\u201376 (2020)","DOI":"10.1007\/978-3-030-44038-1_7"},{"key":"45_CR9","unstructured":"J\u00f8sang, A.: An algebra for assessing trust in certification chains. In: 1999 Network and Distributed Systems Symposium (NDSS) (1999)"},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Yang, W., Huang, C., Wang, B., Wang, T., Zhang, Z.: A general trust model based on trust algebra. In: 2009 International Conference on Multimedia Information Networking and Security (MINES), pp. 125\u2013129 (2009)","DOI":"10.1109\/MINES.2009.226"},{"key":"45_CR11","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MIC.2010.83","volume":"14","author":"J Huang","year":"2010","unstructured":"Huang, J., Nicol, D.: A formal-semantics-based calculus of trust. IEEE Internet Comput. 14, 38\u201346 (2010)","journal-title":"IEEE Internet Comput."},{"key":"45_CR12","doi-asserted-by":"crossref","unstructured":"Carbone, M., Nielsen, M., Sassone, V.: A formal model for trust in dynamic networks. In: First International Conference on Software Engineering and Formal Methods (SEFM), pp. 54\u201361 (2003)","DOI":"10.1109\/SEFM.2003.1236207"},{"key":"45_CR13","doi-asserted-by":"crossref","unstructured":"Kinateder, M., Baschny, E., Rothermel, K.: Towards a generic trust model - comparison of various trust update algorithms. In: Third International Conference on Trust Management (iTrust), pp. 177\u2013192 (2005)","DOI":"10.1007\/11429760_13"},{"key":"45_CR14","doi-asserted-by":"crossref","unstructured":"Fragkakis, M., Alexandris, N.: Comparing the trust and security models of mobile agents. In: Third International Symposium on Information Assurance and Security (IAS), pp. 363\u2013368 (2007)","DOI":"10.1109\/IAS.2007.15"},{"key":"45_CR15","doi-asserted-by":"crossref","unstructured":"Moyano, F., Fernandez-Gago, C., Lopez, J.: A conceptual framework for trust models. In: International Conference on Trust, Privacy and Security in Digital Business (TrustBus) 2012, pp. 93\u2013104 (2012)","DOI":"10.1007\/978-3-642-32287-7_8"},{"key":"45_CR16","unstructured":"El Bakkali, H., Kaitouni, B.I.: A logic-based reasoning about PKI trust model. In: 6th IEEE International Symposium on Computers and Communications (ISCC), pp. 42\u201348 (2001)"},{"key":"45_CR17","unstructured":"El Bakkali, H., Kaitouni, B.I.: A predicate calculus logic for the PKI trust model analysis. In: IEEE International Symposium on Network Computing and Applications (NCA) 2001, pp. 368\u2013371 (2001)"},{"key":"45_CR18","unstructured":"Yu, H., Jin, C., Che, H.: A description logic for PKI trust domain modeling. In: 3rd International Conference on Information Technology and Applications (ICITA), pp. 524\u2013528 (2005)"},{"key":"45_CR19","doi-asserted-by":"crossref","unstructured":"Huang, J., Nicol, D.: A calculus of trust and its application to PKI and identity management. In: 8th International Symposium on Identity and Trust on the Internet (IDtrust), pp. 23\u201337 (2009)","DOI":"10.1145\/1527017.1527021"},{"key":"45_CR20","doi-asserted-by":"crossref","unstructured":"Uahhabi, Z.E., Bakkali, H.E.: A comparative study of PKI trust models. In: 2014 IEEE International Conference on Next Generation Networks and Services (NGNS), pp. 255\u2013261 (2014)","DOI":"10.1109\/NGNS.2014.6990261"},{"key":"45_CR21","doi-asserted-by":"crossref","unstructured":"Maurer, U.: Modelling a public-key infrastructure. In: European Symposium on Research in Computer Security (ESORICS) 1996, pp. 325\u2013350 (1996)","DOI":"10.1007\/3-540-61770-1_45"},{"key":"45_CR22","doi-asserted-by":"crossref","unstructured":"Marchesini, J., Smith, S.: Modeling public key infrastructures in the real world. In: European Public Key Infrastructure Workshop (EuroPKI) 2005, pp. 118\u2013134 (2005)","DOI":"10.1007\/11533733_8"},{"key":"45_CR23","doi-asserted-by":"crossref","unstructured":"Henderson, M., Coulter, R., Dawson, E., Okamoto, E.: Modelling trust structures for public key infrastructures. In: Australasian Conference on Information Security and Privacy (ACISP) 2002, pp. 56\u201370 (2002)","DOI":"10.1007\/3-540-45450-0_5"},{"key":"45_CR24","doi-asserted-by":"crossref","unstructured":"Ulrich, A., Holz, R., Hauck, P., Carle, G.: Investigating the OpenPGP web of trust. In: European Symposium on Research in Computer Security (ESORICS) 2011, pp. 489\u2013507 (2011)","DOI":"10.1007\/978-3-642-23822-2_27"},{"key":"45_CR25","unstructured":"Chirita, P.-A., Nejdl, W., Schlosser, M., Scurtu, O.: Personalized reputation management in P2P networks. In: 2004 International Conference on Trust, Security, and Reputation on the Semantic Web (ISWC), pp. 32\u201341 (2004)"},{"key":"45_CR26","doi-asserted-by":"crossref","unstructured":"Ries, S., Habib, S.M., M\u00fchlh\u00e4user, M., Varadharajan, V.: Certainlogic: a logic for modeling trust and uncertainty. In: 4th International Conference on Trust and Trustworthy Computing (Trust), pp. 254\u2013261 (2011)","DOI":"10.1007\/978-3-642-21599-5_19"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75078-7_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T11:27:17Z","timestamp":1623324437000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75078-7_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030750770","9783030750787"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75078-7_45","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}