{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:50:32Z","timestamp":1725565832371},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540229193"},{"type":"electronic","value":"9783540300793"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30079-3_4","type":"book-chapter","created":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T16:46:40Z","timestamp":1284655600000},"page":"30-39","source":"Crossref","is-referenced-by-count":3,"title":["Virtual Trust in Distributed Systems"],"prefix":"10.1007","author":[{"given":"Semir","family":"Daskapan","sequence":"first","affiliation":[]},{"given":"Ana Cristina","family":"Costa","sequence":"additional","affiliation":[]},{"given":"Willem G.","family":"Vree","sequence":"additional","affiliation":[]},{"given":"Amr A.","family":"Eldin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"volume-title":"Trust: Making and breaking cooperative relations","year":"1988","key":"4_CR1","unstructured":"Gambetta, D. (ed.): Trust: Making and breaking cooperative relations. Basil Blackwell, Oxford (1988)"},{"key":"4_CR2","unstructured":"Morris, J.H., Moberg, D.J.: Work organizations as contexts for trust and betrayal. In: Sarbin, R.T., Carney, R.M., Eoyang, C. (eds.) Citizen espionage: Studies in trust and betrayal, pp. 163\u2013187. US. Praeger Publishers\/Greenwood Publishing Group (1994)"},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1146\/annurev.psych.50.1.569","volume":"50","author":"R.M. Kramer","year":"1999","unstructured":"Kramer, R.M.: Trust and Distrust in Organizations: Emerging Perspectives, Enduring Questions. Annual Review of Psychology\u00a050, 569\u2013598 (1999)","journal-title":"Annual Review of Psychology"},{"issue":"4","key":"4_CR4","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1287\/orsc.12.4.450.10640","volume":"12","author":"K.T. Dirks","year":"2001","unstructured":"Dirks, K.T., Ferrin, D.L.: The role of Trust in Organizational Settings. Organization Science\u00a012(4), 450\u2013467 (2001)","journal-title":"Organization Science"},{"key":"4_CR5","unstructured":"Shaw, R.B.: Trust in the balance: building successful organizations on results, integrity, and concern. San Francisco, Jossey-Bass (1997)"},{"key":"4_CR6","doi-asserted-by":"crossref","first-page":"393","DOI":"10.5465\/amr.1998.926617","volume":"23","author":"M.T. Rousseau","year":"1998","unstructured":"Rousseau, M.T., Stikin, S.B., Burt, S.B., Camerer, C.: Not so different after all: a crossdiscipline view of trust. Academy of Management Review\u00a023, 393\u2013404 (1998)","journal-title":"Academy of Management Review"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"229","DOI":"10.2307\/2393957","volume":"17","author":"D.E. Zand","year":"1972","unstructured":"Zand, D.E.: Trust and managerial problem solving. Administrative Science Quarterly\u00a017, 229\u2013239 (1972)","journal-title":"Administrative Science Quarterly"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Cummings, L.L., Bromiley, P.: The Organizational Trust Inventory (OTI): Development and validation, Trust in organizations. Frontiers of theory and research (1996)","DOI":"10.1037\/t01717-000"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.2307\/1252186","volume":"61","author":"J.B. Smith","year":"1997","unstructured":"Smith, J.B., Barclay, W.B.: The effects of organizational differences and trust on the effectiveness of selling partner relationships. Journal of Marketing\u00a061, 3\u201321 (1997)","journal-title":"Journal of Marketing"},{"issue":"3","key":"4_CR10","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1080\/13594320143000654","volume":"10","author":"A.C. Costa","year":"2001","unstructured":"Costa, A.C., Roe, R.A., Taillieu, T.: Trust within teams: the relation with performance effectiveness. European Journal of Work and Organisational Psychology\u00a010(3), 225\u2013244 (2001)","journal-title":"European Journal of Work and Organisational Psychology"},{"issue":"5","key":"4_CR11","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1108\/00483480310488360","volume":"32","author":"A.C. Costa","year":"2003","unstructured":"Costa, A.C.: Work team trust and effectiveness. Personnel Review\u00a032(5), 605\u2013622 (2003)","journal-title":"Personnel Review"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"967","DOI":"10.2307\/2578601","volume":"63","author":"J.D. Lewis","year":"1985","unstructured":"Lewis, J.D., Weigert, A.: Trust as a social reality. Social Forces\u00a063, 967\u2013985 (1985)","journal-title":"Social Forces"},{"key":"4_CR13","unstructured":"Giffin, K., Patton, B.R.: Personal Trust in Human Interaction. Basic Readings in Interpersonal Communication, Harper & Row, New York (1971)"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"422","DOI":"10.2307\/259287","volume":"23","author":"B.H. Sheppard","year":"1998","unstructured":"Sheppard, B.H., Sherman, D.M.: The grammars of trust: A model and general implications. Academy of Management Review\u00a023, 422\u2013437 (1998)","journal-title":"Academy of Management Review"},{"key":"4_CR15","volume-title":"Concepts, Standards, and Deployment Considerations","author":"C. Adams","year":"2002","unstructured":"Adams, C., Lloyd, S., Understanding, P.K.I.: Concepts, Standards, and Deployment Considerations, 2nd edn. Addison-Wesley, Reading (2002)","edition":"2"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Housley, R., Ford, W., Polk, W., Solo, D.: Internet X.509 Public Key Infrastructure- Certificate and CRL Profile. IETF RFC 2459 (January 1999)","DOI":"10.17487\/rfc2459"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Kent, S.T.: RFC-1422 Privacy Enhancement for Internet Electronic Mail: PartII: Certificate-Based Key Management. Network Working Group (February 1993)","DOI":"10.17487\/rfc1422"},{"key":"4_CR18","unstructured":"Steiner, J.G., Neuman, B.C., Schiller, J.I.: Kerberos: An Authentication Service for Open Network Systems. In: Usenix Conference Proc., Dallas, pp. 191\u2013202 (1988)"},{"issue":"1","key":"4_CR19","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/90.365435","volume":"3","author":"R. Bird","year":"1995","unstructured":"Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., Yung, M.: The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution. IEEE\/ACM Transactions on Networking\u00a03(1), 31\u201341 (1995)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/3-540-48749-2_8","volume-title":"Secure Internet Programming","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The Role of Trust Management in Distributed Systems Security. In: Vitek, J., Jensen, C. (eds.) Secure Internet Programming, pp. 185\u2013210. Springer, Heidelberg (1999)"},{"key":"4_CR21","volume-title":"PGP User\u2019s Guide","author":"P. Zimmermann","year":"1994","unstructured":"Zimmermann, P.: PGP User\u2019s Guide. MIT Press, Cambridge (1994)"},{"key":"4_CR22","unstructured":"Chen, R.: Poblano- A Distributed Trust Model for Peer-to-Peer Networks. Sun (2002)"},{"key":"4_CR23","unstructured":"Elley, Y., Anderson, A., Hanna, S., Mullan, S., Perlman, R., Proctor, S.: Building Certification Paths: Forward vs. Reverse. In: NDSS Symposium (2001)"},{"key":"4_CR24","unstructured":"A&N Associates, Phase II Bridge Certification Authority Interoperability Demonstration Final Report. National Security Agency (2001)"},{"key":"4_CR25","unstructured":"Trevor, F.: Certificate Trust List. Microsoft (1999) (unpublished)"},{"key":"4_CR26","unstructured":"Lee, S.-L., Lee, J.I., Lee, H.-S.: Global PKI Interoperability; Korean Endeavour. In: Proc. of the first International Workshop for Asian PKI, Korea (2001)"},{"issue":"1","key":"4_CR27","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/12.8727","volume":"38","author":"A.E. Barbour","year":"1989","unstructured":"Barbour, A.E., Wojcik, A.S.: A General Constructive Approach to Fault-Tolerant Design Using Redundancy. IEEE Transactions on Computers\u00a038(1), 15\u201329 (1989)","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"4_CR28","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/TC.2003.1176985","volume":"52","author":"M.A. Hiltunen","year":"2003","unstructured":"Hiltunen, M.A., Schlichting, R.D., Ugarte, C.A.: Building Survivable Services Using Redundancy and Adaptation. IEEE Transactions on Computers\u00a052(2), 181\u2013194 (2003)","journal-title":"IEEE Transactions on Computers"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Dutertre, B., Crettaz, V., Stavridou, V.: Intrusion-Tolerant Enclaves. In: IEEE Symposium on Security and Privacy, California, pp. 216\u2013226 (2002)","DOI":"10.1109\/SECPRI.2002.1004373"},{"key":"4_CR30","unstructured":"Daskapan, S., Vree, W.G.: Self-organizing trust principle for survivable systems. In: Proc. of the IASTED\/ACI, Tokyo, pp. 7\u201312 (2002)"},{"key":"4_CR31","unstructured":"Daskapan, S., Verbraeck, A., Vree, W.G.: The merge of computing paradigms. In: 5th International Conf. on computer and information technology, Dhaka, pp. 553\u2013558 (2002)"}],"container-title":["Lecture Notes in Computer Science","Trust and Privacy in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30079-3_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:39:50Z","timestamp":1605760790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30079-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540229193","9783540300793"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30079-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}