{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:20:02Z","timestamp":1725852002198},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319315492"},{"type":"electronic","value":"9783319315508"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31550-8_9","type":"book-chapter","created":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T10:26:20Z","timestamp":1458642380000},"page":"130-149","source":"Crossref","is-referenced-by-count":0,"title":["A Causality-Based Model for Describing the Trustworthiness of a Computing Device"],"prefix":"10.1007","author":[{"given":"Jiun Yi","family":"Yap","sequence":"first","affiliation":[]},{"given":"Allan","family":"Tomlinson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,16]]},"reference":[{"key":"9_CR1","unstructured":"National Cyber Leap Year Summit 2009 Report. \n                      https:\/\/www.nitrd.gov\/"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Grawrock, D., Vishik, C., Rajan, A., Ramming, C., Walker, J.: Defining trust evidence: research directions. In: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, p. 66, ACM (2011)","DOI":"10.1145\/2179298.2179373"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Stoneburner, G.: Underlying Technical Models for Information Technology Security. Recommendations of the National Institute of Standards and Technology, December 2001","DOI":"10.6028\/NIST.SP.800-33"},{"key":"9_CR4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511803161","volume-title":"Causality","author":"J Pearl","year":"2009","unstructured":"Pearl, J.: Causality. Cambridge University Press, New York (2009)"},{"issue":"17","key":"9_CR5","doi-asserted-by":"publisher","first-page":"556","DOI":"10.2307\/2025310","volume":"70","author":"D Lewis","year":"1973","unstructured":"Lewis, D.: Causation. J. Philos. 70(17), 556\u2013567 (1973)","journal-title":"J. Philos."},{"issue":"4","key":"9_CR6","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1093\/bjps\/axi147","volume":"56","author":"JY Halpern","year":"2005","unstructured":"Halpern, J.Y., Pearl, J.: Causes and explanations: a structural-model approach. part I: causes. Br. J. Philos. Sci. 56(4), 843\u2013887 (2005)","journal-title":"Br. J. Philos. Sci."},{"key":"9_CR7","unstructured":"Trusted Computing Group. TNC Architecture for Interoperability. Specification Version 1.5. Revision 4, 7 May 2012"},{"key":"9_CR8","unstructured":"Trusted Computing Group. TNC IF-MAP Metadata for Network Security. Specification Version 1.1. Revision 9, 7 May 2012"},{"key":"9_CR9","unstructured":"Trusted Computing Group. IF-MAP Metadata for ICS Security. Specification Version 1.0. Revision 46, 15 September 2014"},{"key":"9_CR10","volume-title":"A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security","author":"A Will","year":"2015","unstructured":"Will, A., Challener, D.: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security. Apress, New York (2015)"},{"key":"9_CR11","unstructured":"National Institute of Standards and Technology. National Vulnerability Database. Common Platform Enumeration. \n                      https:\/\/nvd.nist.gov\/cpe.cfm"},{"key":"9_CR12","unstructured":"National Institute of Standards and Technology. National Vulnerability Database. Common Configuration Enumeration. \n                      https:\/\/nvd.nist.gov\/cce\/"},{"key":"9_CR13","unstructured":"University of Applied Sciences and Arts, Hochschule Hannover. Faculty IV, Department of Computer Science. \n                      http:\/\/trust.f4.hs-hannover.de\/"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1483","DOI":"10.1007\/11575801_34","volume-title":"On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE","author":"A Kim","year":"2005","unstructured":"Kim, A., Luo, J., Kang, M.: Security ontology for annotating resources. In: Meersman, R. (ed.) OTM 2005. LNCS, vol. 3761, pp. 1483\u20131499. Springer, Heidelberg (2005)"},{"key":"9_CR15","unstructured":"Yap, J.Y., Tomlinson, A.: A socio-technical study on user centered trust notions and their correlation to stake in practical information technology scenarios. In: Proceedings of the 6th ASE International Conference on Privacy, Security and Trust, 14\u201316 December 2014"},{"issue":"3","key":"9_CR16","first-page":"229","volume":"2","author":"RL Rivest","year":"1987","unstructured":"Rivest, R.L.: Learning decision lists. Mach. Learn. 2(3), 229\u2013246 (1987)","journal-title":"Mach. Learn."}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31550-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T17:30:11Z","timestamp":1559410211000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31550-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319315492","9783319315508"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31550-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}