{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:44:56Z","timestamp":1742921096791,"version":"3.40.3"},"publisher-location":"Cham","reference-count":6,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_32","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"357-368","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Profit-Maximizing Trustworthiness Level of Composite Systems"],"prefix":"10.1007","author":[{"given":"Costas","family":"Kalogiros","sequence":"first","affiliation":[]},{"given":"Michalis","family":"Kanakakis","sequence":"additional","affiliation":[]},{"given":"Shenja","family":"van der Graaf","sequence":"additional","affiliation":[]},{"given":"Wim","family":"Vanobberghen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"32_CR1","series-title":"Communications in Computer and Information Science","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-319-14224-1_2","volume-title":"Cloud Computing and Services Science","author":"NG Mohammadi","year":"2014","unstructured":"Mohammadi, N.G., Paulus, S., Bishr, M., Metzger, A., K\u00f6nnecke, H., Hartenstein, S., Weyer, T., Pohl, K.: Trustworthiness attributes and metrics for engineering trusted internet-based software systems. In: Helfert, M., Desprez, F., Ferguson, D., Leymann, F. (eds.) CLOSER 2013. CCIS, vol. 453, pp. 19\u201335. Springer, Heidelberg (2014)"},{"key":"32_CR2","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-41205-9_1","volume-title":"Cyber Security and Privacy","author":"F Cerbo Di","year":"2013","unstructured":"Di Cerbo, F., Bisson, P., Hartman, A., Keller, S., Meland, P.H., Moffie, M., Mohammadi, N.G., Paulus, S., Short, S.: Towards trustworthiness assurance in the cloud. In: Felici, M. (ed.) CSP EU FORUM 2013. CCIS, vol. 182, pp. 3\u201315. Springer, Heidelberg (2013)"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Elshaafi, H., et al.: Trustworthiness monitoring and prediction of composite services. In: 2012 IEEE Symposium on Computers and Communications (ISCC). IEEE (2012)","DOI":"10.1109\/ISCC.2012.6249359"},{"issue":"4","key":"32_CR4","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1287\/mnsc.23.4.399","volume":"23","author":"C Derman","year":"1976","unstructured":"Derman, C., et al.: Optimal system allocations with penalty costs. Manag. Sci. 23(4), 399\u2013403 (1976)","journal-title":"Manag. Sci."},{"key":"32_CR5","unstructured":"Kanakakis, M., et al.: Towards Market Efficiency Using a Personalised Trust Computational Model. Telecommunications Policy (Under Review)"},{"key":"32_CR6","unstructured":"Mohammadi, N.G., et al.: Trustworthiness Evaluation of Socio-Technical-Systems using Computational and Risk Assessment Approaches, CAiSE Forum (2015, To appear)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:18:48Z","timestamp":1583507928000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}