{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:17:38Z","timestamp":1740097058245,"version":"3.37.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319097695"},{"type":"electronic","value":"9783319097701"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09770-1_2","type":"book-chapter","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T03:25:20Z","timestamp":1408418720000},"page":"13-23","source":"Crossref","is-referenced-by-count":4,"title":["Trust Relationships in Privacy-ABCs\u2019 Ecosystems"],"prefix":"10.1007","author":[{"given":"Ahmad","family":"Sabouri","sequence":"first","affiliation":[]},{"given":"Ioannis","family":"Krontiris","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Rannenberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Attribute-based Crednetials for Trust (ABC4Trust) EU Project, \n                    \n                      https:\/\/abc4trust.eu\/"},{"key":"2_CR2","unstructured":"Microsoft U-Prove, \n                    \n                      http:\/\/www.microsoft.com\/uprove"},{"key":"2_CR3","unstructured":"Identity Mixer, \n                    \n                      http:\/\/idemix.wordpress.com\/"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Luna, J., Suri, N., Krontiris, I.: Privacy-by-design based on quantitative threat modeling. In: 2012 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), pp. 1\u20138. IEEE (2012)","DOI":"10.1109\/CRISIS.2012.6378941"},{"key":"2_CR5","unstructured":"Hardin, R.: Trust and trustworthiness, vol.\u00a04. Russell Sage Foundation (2004)"},{"key":"2_CR6","unstructured":"O\u2019Hara, K.: Trust: From Socrates to Spin. Icon Books Ltd. (2004)"},{"key":"2_CR7","unstructured":"Mcknight, D.H., Chervany, N.L.: The meanings of trust. Tech. Rep (1996)"},{"key":"2_CR8","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-540-24747-0_11","volume-title":"Trust Management","author":"A. J\u00f8sang","year":"2004","unstructured":"J\u00f8sang, A., Presti, S.L.: Analysing the relationship between risk and trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol.\u00a02995, pp. 135\u2013145. Springer, Heidelberg (2004)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Delessy, N., Fernandez, E.B., Larrondo-Petrie, M.M.: A pattern language for identity management. In: Proceedings of the International Multi-Conference on Computing in the Global Information Technology, ICCGI 2007, p. 31. IEEE Computer Society, Washington, DC (2007), \n                    \n                      http:\/\/dx.doi.org\/10.1109\/ICCGI.2007.5","DOI":"10.1109\/ICCGI.2007.5"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1109\/AINA.2009.80","volume-title":"Proceedings of the 2009 International Conference on Advanced Information Networking and Applications, AINA 2009","author":"U. Kylau","year":"2009","unstructured":"Kylau, U., Thomas, I., Menzel, M., Meinel, C.: Trust requirements in identity federation topologies. In: Proceedings of the 2009 International Conference on Advanced Information Networking and Applications, AINA 2009, pp. 137\u2013145. IEEE Computer Society, Washington, DC (2009), \n                    \n                      http:\/\/dx.doi.org\/10.1109\/AINA.2009.80"},{"key":"2_CR11","unstructured":"D2.1 Architecture for Attribute-based Credential Technologies Version 1, \n                    \n                      https:\/\/abc4trust.eu\/download\/ABC4Trust-D2.1-Architecture-V1.pdf\n                    \n                    \n                  ."},{"key":"2_CR12","unstructured":"PRIME - Privacy and Identity Management for Europe, \n                    \n                      https:\/\/www.prime-project.eu\/"},{"key":"2_CR13","unstructured":"PrimeLife EU Project, \n                    \n                      http:\/\/primelife.ercim.eu\/"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy, and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09770-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T12:33:40Z","timestamp":1558960420000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09770-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319097695","9783319097701"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09770-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}