{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T18:40:06Z","timestamp":1750876806136,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319673790"},{"type":"electronic","value":"9783319673806"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67380-6_23","type":"book-chapter","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T01:13:35Z","timestamp":1505178815000},"page":"247-257","source":"Crossref","is-referenced-by-count":3,"title":["Health-Care Pervasive Environments: A CLA Based Trust Management"],"prefix":"10.1007","author":[{"given":"Omid","family":"Bushehrian","sequence":"first","affiliation":[]},{"given":"Shayeste Esmail","family":"Nejad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1146\/annurev.soc.34.040507.134601","volume":"34","author":"KP Smith","year":"2008","unstructured":"Smith, K.P., Christakis, N.A.: Social networks and health. Ann. Rev. Sociol. 34, 405\u2013429 (2008)","journal-title":"Ann. Rev. Sociol."},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.socscimed.2012.08.023","volume":"75","author":"F Griffiths","year":"2012","unstructured":"Griffiths, F., Cave, J., Boardman, F., Ren, J., Pawlikowska, T., Ball, R., Clarke, A., Cohen, A.: Social networks-the future for health care delivery. Soc. Sci. Med. 75, 1\u20139 (2012). doi: 10.1016\/j.socscimed.2012.08.023","journal-title":"Soc. Sci. Med."},{"key":"23_CR3","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/MC.2003.1250897","volume":"36","author":"U Varshney","year":"2003","unstructured":"Varshney, U.: Pervasive healthcare. IEEE Comput. 36, 138\u2013140 (2003)","journal-title":"IEEE Comput."},{"key":"23_CR4","first-page":"1829","volume":"127","author":"RC Lefebvre","year":"2013","unstructured":"Lefebvre, R.C., Bornkessel, A.S.: Digital social networks and health. J. Am. Heart Assoc. 127, 1829\u20131836 (2013)","journal-title":"J. Am. Heart Assoc."},{"key":"23_CR5","unstructured":"McKnight, D.H., Chervani, N.L.: The meanings of trust. In: The MISRC Working Paper Series, Technical report 94-04, University of Minnesota (1996)"},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.comcom.2010.01.023","volume":"34","author":"MK Denko","year":"2011","unstructured":"Denko, M.K., Sun, T., Woungang, I.: Trust management in ubiquitous computing: a Bayesian approach. Comput. Commun. 34, 398\u2013406 (2011). doi: 10.1016\/j.comcom.2010.01.023","journal-title":"Comput. Commun."},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Haque, M.M., Ahamed, S.I.: An omnipresent formal trust model (FTM) for pervasive healthcare environment. In: Proceedings of the 31st Annual International Conference on Computer Software and Applications, pp. 49\u201356. IEEE Computer Society (2007)","DOI":"10.1109\/COMPSAC.2007.69"},{"key":"23_CR8","first-page":"54","volume":"25","author":"MR Meybodi","year":"2004","unstructured":"Meybodi, M.R., Beygi, H., Taherkhani, M.: Cellular learning automata and its applications. J. Sci. Technol. 25, 54\u201377 (2004)","journal-title":"J. Sci. Technol."},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"4343","DOI":"10.1016\/j.comcom.2008.05.007","volume":"31","author":"A Boukerche","year":"2008","unstructured":"Boukerche, A., Ren, Y.: A trust-based security system for ubiquitous and pervasive computing environments. Comput. Commun. 31, 4343\u20134351 (2008). doi: 10.1016\/j.comcom.2008.05.007","journal-title":"Comput. Commun."},{"key":"23_CR10","doi-asserted-by":"publisher","unstructured":"Denko, M., Sun, T.: Probabilistic trust management in pervasive computing. In: IEEE\/IFTP International Conference an Embedded and Ubiquitous Computing, Shangai, China, pp. 610\u2013615 (2008). doi: 10.1109\/EUC.2008.149","DOI":"10.1109\/EUC.2008.149"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Dong, Z., Yian, Z., Wanbao, L., Jianhua, G., Yunlan, W.: Multilevel trust management framework for pervasive computing. In: International Conference on Knowledge Discovery and Data Mining, pp. 159\u2013162 (2010)","DOI":"10.1109\/WKDD.2010.32"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Valarmathi, J., Preethi, R., Bhuvaneshwari, N., Karthick, V.: A novel trust management scheme in pervasive healthcare. In: IEEE International Conference on Recent Trends in Information Technology, pp. 503\u2013508 (2011)","DOI":"10.1109\/ICRTIT.2011.5972384"},{"key":"23_CR13","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/978-3-642-31513-8_15","volume":"176","author":"J Valarmathi","year":"2012","unstructured":"Valarmathi, J., Lakshmi, K., Menaga, R.S., Abirami, K.V., Uthariaraj, V.R.: SLA for a pervasive healthcare environment. Adv. Comput. Inf. Technol. 176, 141\u2013149 (2012)","journal-title":"Adv. Comput. Inf. Technol."},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Iltaf, N., Ghafoor, A., Zia, U.: An attack resistant method for detecting dishonest recommendation in pervasive computing environment. In: IEEE, pp. 173\u2013178 (2012). ISBN 978-1-4673-4523-1","DOI":"10.1109\/ICON.2012.6506554"},{"key":"23_CR15","doi-asserted-by":"crossref","first-page":"1350","DOI":"10.1016\/j.automatica.2007.09.018","volume":"44","author":"H Beygi","year":"2008","unstructured":"Beygi, H., Meybodi, M.R.: Asynchronous cellular learning automata. Automatica 44, 1350\u20131357 (2008)","journal-title":"Automatica"},{"key":"23_CR16","first-page":"2","volume":"9","author":"S Wolfram","year":"1983","unstructured":"Wolfram, S.: Cellular automata. Los Alamos Sci. 9, 2\u201321 (1983)","journal-title":"Los Alamos Sci."},{"key":"23_CR17","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1109\/TSMC.1974.5408453","volume":"SMC-4","author":"KN Narendra","year":"1974","unstructured":"Narendra, K.N., Thathachar, M.A.L.: Learning automata-a survey. IEEE Trans. Syst. Man Cybern. SMC-4, 323\u2013334 (1974)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"23_CR18","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/TSMCB.2002.1049606","volume":"32","author":"MAL Thathachar","year":"2002","unstructured":"Thathachar, M.A.L., Sastry, P.S.: Varieties of learning automata: an overview. IEEE Trans. Syst. Man Cybern.-Part B: Cybern. 32, 711\u2013722 (2002)","journal-title":"IEEE Trans. Syst. Man Cybern.-Part B: Cybern."}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67380-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T18:01:58Z","timestamp":1750874518000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67380-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319673790","9783319673806"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67380-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}