{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T11:21:50Z","timestamp":1779103310000,"version":"3.51.4"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031638503","type":"print"},{"value":"9783031638510","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-63851-0_12","type":"book-chapter","created":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T23:01:51Z","timestamp":1719529311000},"page":"181-191","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Achieving Adaptive Safety via Trust Building in Autonomous Ecosystems"],"prefix":"10.1007","author":[{"given":"David","family":"Halasz","sequence":"first","affiliation":[]},{"given":"Barbora","family":"Buhnova","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,28]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Arcaini, P., Riccobene, E., Scandurra, P.: Modeling and analyzing MAPE-K feedback loops for self-adaptation. In: 2015 IEEE\/ACM 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, pp. 13\u201323 (2015)","DOI":"10.1109\/SEAMS.2015.10"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Axelsson, J.: Safety in vehicle platooning: a systematic literature review. IEEE Trans. Intell. Transp. Syst. 18, 1\u201313 (2016)","DOI":"10.1109\/TITS.2016.2598873"},{"issue":"1","key":"12_CR3","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/JPROC.2011.2165689","volume":"100","author":"A Banerjee","year":"2012","unstructured":"Banerjee, A., Venkatasubramanian, K.K., Mukherjee, T., Gupta, S.K.S.: Ensuring safety, security, and sustainability of mission-critical cyber\u2013physical systems. Proc. IEEE 100(1), 283\u2013299 (2012)","journal-title":"Proc. IEEE"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Barkowsky, M., Brand, T., Giese, H.: Improving adaptive monitoring with incremental runtime model queries. In: 2021 International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), pp. 71\u201377 (2021)","DOI":"10.1109\/SEAMS51251.2021.00019"},{"key":"12_CR5","unstructured":"Binnie, C., McCune, R.: Kubernetes Authorizationwith RBAC, pp. 251\u2013263 (2021)"},{"key":"12_CR6","doi-asserted-by":"publisher","unstructured":"Buhnova, B.: Trust management in the Internet of Everything. In: European Conference on Software Architecture. ECSA 2022 Tracks and Workshops, pp. 123\u2013137. Springer (2023). http:\/\/arxiv.org\/abs\/2212.14688, https:\/\/doi.org\/10.1007\/978-3-031-36889-9","DOI":"10.1007\/978-3-031-36889-9"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Buhnova, B., Halasz, D., Iqbal, D., Bangui, H.: Survey on trust in software engineering for autonomous dynamic ecosystems. In: Proceedings of the 38th ACM\/SIGAPP Symposium on Applied Computing, pp. 1490\u20131497. ACM (2023)","DOI":"10.1145\/3555776.3577702"},{"key":"12_CR8","unstructured":"Capilla, R., Cioroaica, E., Buhnova, B., Bosch, J.: On autonomous dynamic software ecosystems. IEEE Trans. Eng. Manage., 1\u201315 (2021)"},{"issue":"6","key":"12_CR9","doi-asserted-by":"publisher","first-page":"36333647","DOI":"10.1109\/TEM.2021.3116873","volume":"69","author":"R Capilla","year":"2022","unstructured":"Capilla, R., Cioroaica, E., Buhnova, B., Bosch, J.: On autonomous dynamic software ecosystems. IEEE Trans. Eng. Manage. 69(6), 36333647 (2022)","journal-title":"IEEE Trans. Eng. Manage."},{"key":"12_CR10","doi-asserted-by":"publisher","unstructured":"Cheng, B.H.: Models@run.time: foundations, applications, and roadmaps. Lecture notes in computer science, Springer (2014), dagstuhl Seminar 11481 on models@run.time held in November\/December (2011). https:\/\/doi.org\/10.1007\/978-3-319-08915-7","DOI":"10.1007\/978-3-319-08915-7"},{"issue":"2","key":"12_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2815595","volume":"48","author":"JH Cho","year":"2015","unstructured":"Cho, J.H., Chan, K., Adali, S.: A survey on trust modeling. ACM Comput. Surv. (CSUR) 48(2), 1\u201340 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Cioroaica, E., Kuhn, T., Buhnova, B.: (Do not) trust in ecosystems. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER), pp. 9\u201312. IEEE (2019)","DOI":"10.1109\/ICSE-NIER.2019.00011"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Cui, J., Liew, L.S., Sabaliauskaite, G., Zhou, F.: A review on safety failures, security attacks, and available countermeasures for autonomous vehicles. Ad Hoc Networks 90 (2019)","DOI":"10.1016\/j.adhoc.2018.12.006"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Desilva, S., Boppana, R.: Mitigating malicious control packet floods in ad hoc networks. In: IEEE Wireless Communications and Networking Conference, vol. 4, pp. 2112\u20132117 (2005)","DOI":"10.1109\/WCNC.2005.1424844"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.02.020","volume":"44","author":"RG Engoulou","year":"2014","unstructured":"Engoulou, R.G., Bella\u00efche, M., Pierre, S., Quintero, A.: Vanet security surveys. Comput. Commun. 44, 1\u201313 (2014)","journal-title":"Comput. Commun."},{"issue":"3","key":"12_CR16","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/JPROC.2014.2301595","volume":"102","author":"AJ Fehske","year":"2014","unstructured":"Fehske, A.J., Viering, I., Voigt, J., Sartori, C., Redana, S., Fettweis, G.P.: Smallcell self-organizing wireless networks. Proc. IEEE 102(3), 334\u2013350 (2014)","journal-title":"Proc. IEEE"},{"key":"12_CR17","unstructured":"F\u00fcrst, S., et al.: Autosar\u2013a worldwide standard is on the road. In: 14th International VDI Congress Electronic Systems for Vehicles, Baden-Baden, vol. 62, p. 5. Citeseer (2009)"},{"issue":"4","key":"12_CR18","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T Grandison","year":"2000","unstructured":"Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Commun. Surv. Tutorials 3(4), 2\u201316 (2000)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Halasz, D.: From systems to ecosystems: Rethinking adaptive safety. In: 17th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS \u201922). IEEE (2022","DOI":"10.1145\/3524844.3528067"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Halasz, D., Buhnova, B.: Rethinking safety in autonomous ecosystems. In: The 17th Conference on Computer Science and Intelligence Systems, pp. 81\u201387. IEEE (2022)","DOI":"10.15439\/2022F273"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Halasz., D., Buhnova., B.: Conceptual framework for adaptive safety in autonomous ecosystems. In: Proceedings of the 18th International Conference on Software Technologies \u2013 ICSOFT, pp. 393\u2013403. INSTICC, SciTePress (2023)","DOI":"10.5220\/0012086600003538"},{"issue":"5","key":"12_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3337791","volume":"52","author":"F Jahan","year":"2019","unstructured":"Jahan, F., Sun, W., Niyaz, Q., Alam, M.: Security modeling of autonomous systems: a survey. ACM Comput. Surv. 52(5), 1\u201334 (2019)","journal-title":"ACM Comput. Surv."},{"key":"12_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/3-540-47884-1_16","volume-title":"Integrated Formal Methods","author":"S Kent","year":"2002","unstructured":"Kent, S.: Model driven engineering. In: Butler, M., Petre, L., Sere, K. (eds.) IFM 2002. LNCS, vol. 2335, pp. 286\u2013298. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-47884-1_16"},{"issue":"1","key":"12_CR24","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"J Kephart","year":"2003","unstructured":"Kephart, J., Chess, D.: The vision of autonomic computing. Computer 36(1), 41\u201350 (2003)","journal-title":"Computer"},{"issue":"1","key":"12_CR25","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1518\/hfes.46.1.50.30392","volume":"46","author":"JD Lee","year":"2004","unstructured":"Lee, J.D., See, K.A.: Trust in automation: designing for appropriate reliance. Hum. Factors 46(1), 50\u201380 (2004)","journal-title":"Hum. Factors"},{"key":"12_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2020.102820","volume":"122","author":"G Li","year":"2021","unstructured":"Li, G., et al.: Risk assessment based collision avoidance decision-making for autonomous vehicles in multiscenarios. Transp. Res. Part C: Emerging Technol. 122, 102820 (2021)","journal-title":"Transp. Res. Part C: Emerging Technol."},{"key":"12_CR27","unstructured":"Liu, L., Loper, M., Ozkaya, Y., Yasar, A., Yigitoglu, E.: Machine to machine trust in the IoT era. In: Proceedings of the 18th International Conference on Trust in Agent Societies, vol. 1578, pp. 18\u201329. CEUR-WS.org (2016)"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Loper, M.L., Swenson, B.: Machine to machine trust in smart cities. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 1887\u20131889. IEEE (2017)","DOI":"10.1109\/ICDCS.2017.329"},{"issue":"11","key":"12_CR29","doi-asserted-by":"publisher","first-page":"3783","DOI":"10.3390\/s21113783","volume":"21","author":"S Malik","year":"2021","unstructured":"Malik, S., Khan, M.A., El-Sayed, H.: Collaborative autonomous driving\u2014a survey of solution approaches and future challenges. Sensors 21(11), 3783 (2021)","journal-title":"Sensors"},{"issue":"7","key":"12_CR30","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MC.2004.48","volume":"37","author":"P McKinley","year":"2004","unstructured":"McKinley, P., Sadjadi, S., Kasten, E., Cheng, B.: Composing adaptive software. Computer 37(7), 56\u201364 (2004)","journal-title":"Computer"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Muccini, H., Sharaf, M., Weyns, D.: Self-adaptation for cyber-physical systems: a systematic literature review. In: 2016 IEEE\/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), pp. 75\u201381 (2016)","DOI":"10.1145\/2897053.2897069"},{"issue":"2","key":"12_CR32","first-page":"92","volume":"27","author":"A Naveena","year":"2018","unstructured":"Naveena, A., Reddy, K.R.L.: Malicious node prevention and mitigation in manets using a hybrid security model. Inf. Secur. J.: A Global Perspect. 27(2), 92\u2013101 (2018)","journal-title":"Inf. Secur. J.: A Global Perspect."},{"key":"12_CR33","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.jss.2015.12.015","volume":"123","author":"P Rodr\u00edguez","year":"2017","unstructured":"Rodr\u00edguez, P., et al.: Continuous deployment of software intensive products and services: a systematic mapping study. J. Syst. Softw. 123, 263\u2013291 (2017)","journal-title":"J. Syst. Softw."},{"issue":"4","key":"12_CR34","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/0167-4048(86)90050-7","volume":"5","author":"LS Rutledge","year":"1986","unstructured":"Rutledge, L.S., Hoffman, L.J.: A survey of issues in computer network security. Comput. Secur. 5(4), 296\u2013308 (1986)","journal-title":"Comput. Secur."},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Sagar, S., Mahmood, A., Sheng, Q.Z., Pabani, J.K., Zhang, W.E.: Understanding the trustworthiness management in the social internet of things: a survey. arXiv preprint arXiv:2202.03624 (2022)","DOI":"10.2139\/ssrn.4629067"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Salehie, M., Pasquale, L., Omoronyia, I., Ali, R., Nuseibeh, B.: Requirements-driven adaptive security: Protecting variable assets at runtime. In: 2012 20th IEEE International Requirements Engineering Conference (RE), pp. 111\u2013120 (2012)","DOI":"10.1109\/RE.2012.6345794"},{"key":"12_CR37","doi-asserted-by":"crossref","unstructured":"Su, M.Y., Chiang, K.L., Liao, W.C.: Mitigation of black-hole nodes in mobile ad hoc networks. In: International Symposium on Parallel and Distributed Processing with Applications. pp. 162\u2013167 (2010)","DOI":"10.1109\/ISPA.2010.74"},{"key":"12_CR38","doi-asserted-by":"crossref","unstructured":"Taylor, A.J., Ames, A.D.: Adaptive safety with control barrier functions. In: 2020 American Control Conference (ACC), pp. 1399\u20131405 (2020)","DOI":"10.23919\/ACC45564.2020.9147463"},{"issue":"12","key":"12_CR39","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MCOM.2013.6685766","volume":"51","author":"OK Tonguz","year":"2013","unstructured":"Tonguz, O.K., Viriyasitavat, W.: Cars as roadside units: a self-organizing network solution. IEEE Commun. Mag. 51(12), 112\u2013120 (2013)","journal-title":"IEEE Commun. Mag."}],"container-title":["IFIP Advances in Information and Communication Technology","Technological Innovation for Human-Centric Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-63851-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T23:01:56Z","timestamp":1732316516000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-63851-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031638503","9783031638510"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-63851-0_12","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"28 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DoCEIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Doctoral Conference on Computing, Electrical and Industrial Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Caparica","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"doceis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/doceis.dee.fct.unl.pt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}