{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T21:03:55Z","timestamp":1777064635009,"version":"3.51.4"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031367564","type":"print"},{"value":"9783031367571","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-36757-1_6","type":"book-chapter","created":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T16:01:40Z","timestamp":1688227300000},"page":"92-109","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Incorporating Trust into Context-Aware Services"],"prefix":"10.1007","author":[{"given":"Boris","family":"Shishkov","sequence":"first","affiliation":[]},{"given":"Hans-Georg","family":"Fill","sequence":"additional","affiliation":[]},{"given":"Krassimira","family":"Ivanova","sequence":"additional","affiliation":[]},{"given":"Marten","family":"van Sinderen","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Verbraeck","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,2]]},"reference":[{"issue":"2\u20134","key":"6_CR1","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1207\/S15327051HCI16234_02","volume":"16","author":"A Dey","year":"2001","unstructured":"Dey, A., Abowd, G., Salber, D.: A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Hum.-Comput. Interact. 16(2\u20134), 97\u2013166 (2001)","journal-title":"Hum.-Comput. Interact."},{"key":"6_CR2","unstructured":"Wegdam, M.: Awareness: a project on context aware mobile networks and services. In: Proceedings of the 14th Mobile & Wireless Communications Summit. EURASIP (2005)"},{"key":"6_CR3","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-030-79976-2_7","volume-title":"Business Modeling and Software Design","author":"B Shishkov","year":"2021","unstructured":"Shishkov, B., van Sinderen, M.: Towards well-founded and richer context-awareness conceptual models. In: Shishkov, B. (ed.) BMSD 2021. LNBIP, vol. 422, pp. 118\u2013132. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-79976-2_7"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"Shishkov, B., van Sinderen, M.: On the context-aware servicing of user needs: extracting and managing context information supported by rules and predictions. In: Shishkov, B. (ed) Business Modeling and Software Design. BMSD 2022. Lecture Notes in Business Information Processing, vol. 453. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-11510-3_15","DOI":"10.1007\/978-3-031-11510-3_15"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Dey, A.K., Newberger, A.: Support for context-aware intelligibility and control. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, USA (2009)","DOI":"10.1145\/1518701.1518832"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-662-45550-0_6","volume-title":"On the Move to Meaningful Internet Systems: OTM 2014 Workshops","author":"S Bosems","year":"2014","unstructured":"Bosems, S., van Sinderen, M.: Models in the design of context-aware well-being applications. In: Meersman, R., et al. (eds.) OTM 2014. LNCS, vol. 8842, pp. 37\u201342. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45550-0_6"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.jss.2016.02.010","volume":"117","author":"U Alegre","year":"2016","unstructured":"Alegre, U., Augusto, J.C., Clark, T.: Engineering context-aware systems and applications: a survey. J. Syst. Softw. 117, 55\u201383 (2016). https:\/\/doi.org\/10.1016\/j.jss.2016.02.010","journal-title":"J. Syst. Softw."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Alf\u00e9rez, G.H., Pelechano, V.: Context-aware autonomous web services in software product lines. In: Proceedings of the 15th International SPLC Conference. IEEE, CA, USA (2011)","DOI":"10.1109\/SPLC.2011.21"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Abeywickrama, D.B., Ramakrishnan, S.: Context-aware services engineering: models, transformations, and verification. ACM Trans. Internet Technol. J. 11(3), 1\u201328 (2012). ACM","DOI":"10.1145\/2078316.2078318"},{"key":"6_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22441-7","volume-title":"Designing Enterprise Information Systems, Merging Enterprise Modeling and Software Specification","author":"B Shishkov","year":"2020","unstructured":"Shishkov, B.: Designing Enterprise Information Systems, Merging Enterprise Modeling and Software Specification. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-22441-7"},{"issue":"14","key":"6_CR11","first-page":"10","volume":"2","author":"P Bonatti","year":"2007","unstructured":"Bonatti, P., Duma, C., Olmedilla, D., Shahmehri, N.: An integration of reputation-based and policy-based trust management. Networks 2(14), 10 (2007)","journal-title":"Networks"},{"key":"6_CR12","unstructured":"O\u2019Hara, K., Alani, H., Kalfoglou, Y., Shadbolt, N.: Trust strategies for the semantic web. In: Proceedings of the 2004 International Conference on Trust, Security, and Reputation on the Semantic Web - Volume 127 (ISWC\u201904). CEUR-WS.org, Aachen, DEU, pp. 42\u201351 (2004)"},{"key":"6_CR13","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2011","unstructured":"Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques, 3rd edn. Morgan Kaufmann Publ. Inc., San Francisco, CA, USA (2011)","edition":"3"},{"key":"6_CR14","doi-asserted-by":"publisher","unstructured":"Shishkov, B., Larsen, J.B., Warnier, M., Janssen, M.: Three categories of context-aware systems. In: Shishkov, B. (ed.) Business Modeling and Software Design. BMSD 2018. Lecture Notes in Business Information Processing, vol. 319. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94214-8_12","DOI":"10.1007\/978-3-319-94214-8_12"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Knittel, J., Shirazi, A.S., Henze, N., Schmidt, A.: Utilizing contextual information for mobile communication. In: CHI \u201913 Extended Abstracts on Human Factors in Computing Systems (CHI EA \u201913). ACM, New York, NY, USA (2013)","DOI":"10.1145\/2468356.2468601"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Weiser, M.: The Computer for the 21st century. SIGMOBILE Mob. Comput. Commun. Rev. 3(3), 3\u201311 (1999). ACM, New York, NY, USA","DOI":"10.1145\/329124.329126"},{"key":"6_CR17","unstructured":"Schilit, B.N.: A system architecture for context-aware mobile computing. Ph.D. dissertation, Columbia University, New York, USA (1995)"},{"key":"6_CR18","unstructured":"Krumm, J. (ed.): Ubiquitous Computing Fundamentals. Taylor and Francis Group, LLC (2009)"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Dey, A.: Chapter 8 - Context-Aware Computing. In: Krumm, J. (ed.) Ubiquitous Computing Fundamentals. Taylor and Francis Group, LLC (2009)","DOI":"10.1201\/9781420093612.ch8"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Schilit, B., Adams, N., Want, R.: Context-aware computing applications. In: First Workshop on Mobile Computing Systems and Applications, pp. 85\u201390. IEEE (1994)","DOI":"10.1109\/WMCSA.1994.16"},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1023\/A:1013767926256","volume":"8","author":"A Harter","year":"2002","unstructured":"Harter, A., Hopper, A., Steggles, P., Ward, A., Webster, P.: The anatomy of a context-aware application. Wirel. Netw. 8, 187\u2013197 (2002)","journal-title":"Wirel. Netw."},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Dey, A.K.: Context-aware computing: the cyberdesk project. In: AAAI Spring Symposium on Intelligent Environments, AAAI Technical Report SS-88-02, pp. 51\u201354 (1998)","DOI":"10.1145\/268389.268398"},{"issue":"9","key":"6_CR23","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MCOM.2006.1705985","volume":"44","author":"M van Sinderen","year":"2006","unstructured":"van Sinderen, M., van Halteren, A., Wegdam, M., et al.: Supporting context-aware mobile applications: an infrastructure approach. IEEE Commun. Mag. 44(9), 96\u2013104 (2006)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"6_CR24","first-page":"400","volume":"3","author":"T Chaari","year":"2007","unstructured":"Chaari, T., Laforest, F., Celentano, A.: Adaptation in context-aware pervasive information systems: the SECAS project. Int. J. Perv. Comput. Commun. 3(4), 400\u2013425 (2007)","journal-title":"Int. J. Perv. Comput. Commun."},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-030-47679-3_10","volume-title":"Computer Information Systems and Industrial Management","author":"D Borissova","year":"2020","unstructured":"Borissova, D., Cvetkova, P., Garvanov, I., Garvanova, M.: A framework of business intelligence system for decision making in efficiency management. In: Saeed, K., Dvorsk\u00fd, J. (eds.) CISIM 2020. LNCS, vol. 12133, pp. 111\u2013121. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-47679-3_10"},{"key":"6_CR26","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-030-52306-0_28","volume-title":"Business Modeling and Software Design","author":"M Garvanova","year":"2020","unstructured":"Garvanova, M., Garvanov, I., Kashukeev, I.: Business processes and the safety of stakeholders: considering the electromagnetic pollution. In: Shishkov, B. (ed.) BMSD 2020. LNBIP, vol. 391, pp. 386\u2013393. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-52306-0_28"},{"key":"6_CR27","doi-asserted-by":"publisher","unstructured":"Dimitrova, Z., Dimitrov, V., Borissova, D., Garvanov, I., Garvanova, M.: Two-stage search based approach for determination and sorting of mountain hiking routes using directed weighted multigraph. Cybern. Inf. Technol. 20(6), 28\u201339 (2020). Print ISSN 1311-9702 Online ISSN 1314-4081. https:\/\/doi.org\/10.2478\/cait-2020-0058","DOI":"10.2478\/cait-2020-0058"},{"key":"6_CR28","unstructured":"Van Engelenburg, S.: Designing context-aware architectures for business-to-government information sharing. Ph.D. thesis. TU Delft Press (2019)"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Nardi, J.C., et al.: Towards a commitment-based reference ontology for services. EDOC, pp. 175\u2013184 (2013)","DOI":"10.1109\/EDOC.2013.28"},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.is.2015.01.012","volume":"54","author":"JC Nardi","year":"2015","unstructured":"Nardi, J.C., et al.: A commitment-based reference ontology for services. Inf. Syst. 54, 263\u2013288 (2015)","journal-title":"Inf. Syst."},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Dietz, J.L.G.: Enterprise Ontology, Theory and Methodology. Springer, Heidelberg (2006)","DOI":"10.1007\/3-540-33149-2"},{"key":"6_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-33246-4_1","volume-title":"On the Move to Meaningful Internet Systems: OTM 2019 Conferences","author":"G Amaral","year":"2019","unstructured":"Amaral, G., Sales, T.P., Guizzardi, G., Porello, D.: Towards a reference ontology of trust. In: Panetto, H., Debruyne, C., Hepp, M., Lewis, D., Ardagna, C.A., Meersman, R. (eds.) OTM 2019. LNCS, vol. 11877, pp. 3\u201321. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-33246-4_1"},{"key":"6_CR33","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-030-24854-3_9","volume-title":"Business Modeling and Software Design","author":"B Shishkov","year":"2019","unstructured":"Shishkov, B.: Tuning the behavior of context-aware applications. In: Shishkov, B. (ed.) BMSD 2019. LNBIP, vol. 356, pp. 134\u2013152. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-24854-3_9"},{"key":"6_CR34","unstructured":"Muff, F., Fill, H.-G.: A framework for context-dependent augmented reality applications using machine learning and ontological reasoning. In: Proceedings of the \u201922 Spring Symposium on Machine Learning and Knowledge Engineering for Hybrid Intelligence. AAAI-MAKE 2022. Stanford University Press, Palo Alto, CA (CEUR Workshop Proceedings) (2022)"},{"key":"6_CR35","unstructured":"Kindervag, J.: No More Chewy Centers: Introducing the Zero Trust Model of Information Security. Forester (2010)"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Bunge, M.A.: Treatise on Basic Philosophy, vol. 4, A World of Systems. D. Reidel Publishing Company, Dordrecht (1979)","DOI":"10.1007\/978-94-009-9392-1"},{"key":"6_CR37","doi-asserted-by":"publisher","unstructured":"Abinaya, S., Alphonse, A.S., Abirami, S., et al.: Enhancing context-aware recommendation using trust-based contextual attentive autoencoder. Neural Process. Lett. (2023). https:\/\/doi.org\/10.1007\/s11063-023-11163-x","DOI":"10.1007\/s11063-023-11163-x"},{"key":"6_CR38","first-page":"411","volume":"2020","author":"U Ahmed","year":"2020","unstructured":"Ahmed, U., Raza, I., Hussain, S.A.: Information-centric trust management for big data-enabled IoT. Big Data-Enabled Internet of Things 2020, 411\u2013432 (2020)","journal-title":"Big Data-Enabled Internet of Things"},{"key":"6_CR39","unstructured":"Antifakos, S., Kern, N., Schiele, B., Schwaninger, A.: Towards improving trust in context-aware systems by displaying system confidence. In: MobileHCI \u201905: Proceedings of the 7th International Conference on Human Computer Interaction with Mobile Devices & Services"},{"key":"6_CR40","unstructured":"NESDIS: National Environmental Satellite, Data, and Information Service (2023). https:\/\/www.nesdis.noaa.gov"},{"key":"6_CR41","unstructured":"JMA: Japan Meteorological Agency (2023). https:\/\/www.jma.go.jp\/jma"},{"key":"6_CR42","unstructured":"EPOS: European Plate Observing System (2023). https:\/\/www.epos-eu.org"},{"key":"6_CR43","doi-asserted-by":"crossref","unstructured":"Sensor. Community: Sensor Community (2023). https:\/\/sensor.community\/en","DOI":"10.1155\/2023\/9764078"},{"key":"6_CR44","doi-asserted-by":"publisher","unstructured":"Mendling, J.: Towards Blockchain Support for Business Processes. In: Shishkov, B. (ed.) Business Modeling and Software Design. BMSD 2018. Lecture Notes in Business Information Processing, vol. 319. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94214-8_15","DOI":"10.1007\/978-3-319-94214-8_15"}],"container-title":["Lecture Notes in Business Information Processing","Business Modeling and Software Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-36757-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T13:38:59Z","timestamp":1729690739000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-36757-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031367564","9783031367571"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-36757-1_6","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"2 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BMSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Business Modeling and Software Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Utrecht","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bmsd2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.is-bmsd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}