{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T04:44:06Z","timestamp":1745210646312,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208877"},{"type":"electronic","value":"9783540398813"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-39881-3_13","type":"book-chapter","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T22:14:04Z","timestamp":1277331244000},"page":"130-142","source":"Crossref","is-referenced-by-count":17,"title":["End-to-End Trust Starts with Recognition"],"prefix":"10.1007","author":[{"given":"Jean-Marc","family":"Seigneur","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Farrell","sequence":"additional","affiliation":[]},{"given":"Christian Damsgaard","family":"Jensen","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Gray","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/283699.283739","volume-title":"Proceedings of the 1997 New Security Paradigms Workshop","author":"A. Abdul-Rahman","year":"1997","unstructured":"Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: Proceedings of the 1997 New Security Paradigms Workshop, pp. 48\u201360. ACM Press, New York (1997)"},{"key":"13_CR2","volume-title":"The Evolution of Cooperation","author":"R. Axelrod","year":"1984","unstructured":"Axelrod, R.: The Evolution of Cooperation. Basic Books Publishers, New York (1984) ISBN 0-465-02122-0"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Keromytis, A.D.: Keynote: Trust Management for Public-Key Infrastructures. In: Proceedings of the Cambridge 1998 Security Protocols International Workshop, Cambridge, England, pp. 59-63 (1998)","DOI":"10.1007\/3-540-49135-X_9"},{"key":"13_CR4","first-page":"164","volume-title":"Proceedings of the 17th IEEE Symp. on Security and Privacy","author":"M. Blaze","year":"1996","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of the 17th IEEE Symp. on Security and Privacy, pp. 164\u2013173. IEEE Computer Society, Los Alamitos (1996)"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Christianson, B., Harbison, W.S.: Why Isn\u2019t Trust Transitive? In: Proceedings of the Security Protocols International Workshop, University of Cambridge (1996)","DOI":"10.1007\/3-540-62494-5_16"},{"key":"13_CR6","unstructured":"Ducatel, K., Bogdanowicz, M., Scapolo, F., Leitjen, J., Burgelman, J.-C.: That\u2019s what friends are for. Ambient Intelligence (AmI) and the IS in 2010. In: the congress of Innovations for an e-Society, Challenges for Technology Assessment Berlin, Deutschland, Oktober 17 \u2013 19 (2001)"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-49135-X_5","volume-title":"Security Protocols","author":"C. Ellison","year":"1999","unstructured":"Ellison, C.: The Trust Shell Game. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol.\u00a01550, pp. 36\u201340. Springer, Heidelberg (1999) ISBN 3-540-65663-4"},{"key":"13_CR8","unstructured":"IEEE: Pervasive computing. IEEE Magazine, \n                      http:\/\/www.computer.org\/pervasive\/"},{"key":"13_CR9","unstructured":"IETF: Public-Key Infrastructure (X.509), \n                      http:\/\/www.ietf.org\/html.charters\/pkix-charter.html"},{"key":"13_CR10","unstructured":"ITU: The Directory: Overview of Concepts, Models and Service. ITU-T Rec. X.500, Information Technology - Open Systems Interconnection (1993), \n                      http:\/\/www.itu.int\/home\/index.html"},{"key":"13_CR11","unstructured":"Jensen, C. D.: Secure Collaboration in Global Computing Systems. In: ERCIM News, vol. 49, (2002)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Johnson, S.: Emergence (2001) ISBN 0-140-287-752","DOI":"10.1016\/B978-075065382-4.50008-X"},{"key":"13_CR13","volume-title":"Proceedings of the 1996 New Security Paradigms Workshop","author":"A. J\u00f8sang","year":"1996","unstructured":"J\u00f8sang, A.: The right type of trust for distributed systems. In: Proceedings of the 1996 New Security Paradigms Workshop, ACM, New York (1996)"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/BFb0055873","volume-title":"Computer Security \u2013 ESORICS 98","author":"A. J\u00f8sang","year":"1998","unstructured":"J\u00f8sang, A.: A Subjective Metric of Authentication. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 329\u2013344. Springer, Heidelberg (1998)"},{"key":"13_CR15","unstructured":"J\u00f8sang, A., Knapskog, S.J.: A Metric for Trusted Systems. In: Proceedings of the 21st NIST-NCSC National Information Systems Security Conference (1998)"},{"key":"13_CR16","unstructured":"Khare, R.: What\u2019s in a Name? Trust. 4K Associates (1999), \n                      http:\/\/www.4k-associates.com\/IEEE-L7-names-trust.html"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Kohl, J., Neuman, B.C.: The Kerberos Network Authentication Service (Version 5). Internet Request for Comments RFC-1510 (1993)","DOI":"10.17487\/rfc1510"},{"key":"13_CR18","unstructured":"Marsh, S.: Formalising Trust as a Computational Concept. PhD Thesis, Department of Mathematics and Computer Science, University of Stirling (1994), \n                      http:\/\/citeseer.nj.nec.com\/marsh94formalising.html"},{"key":"13_CR19","unstructured":"Merriam-Webster: Merriam-Webster\u2019s Collegiate Dictionary. Website, \n                      http:\/\/www.m-w.com\/"},{"key":"13_CR20","unstructured":"Microsoft: .NET Framework General Reference: trust Element.Website, (2001), \n                      http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/en-us\/cpgenref\/html\/gngrftrustsection.asp"},{"key":"13_CR21","unstructured":"Philips: Philips Ambient Intelligence. Website, \n                      http:\/\/www.research.philips.com\/InformationCenter\/Global\/FArticleSummary.asp?lNodeId=712"},{"issue":"2","key":"13_CR22","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1145\/317087.317088","volume":"2","author":"M.K. Reiter","year":"1999","unstructured":"Reiter, M.K., Stubblebine, S.G.: Authentication Metric Analysis and Design. ACM Transactions on Information and System Security\u00a02(2), 138\u2013158 (1999)","journal-title":"ACM Transactions on Information and System Security"},{"key":"13_CR23","unstructured":"Samar, V., Lai, C.: Making Login Services Independent of Authentication Technologies. Sun Microsystems (1995), \n                      http:\/\/java.sun.com\/security\/jaas\/doc\/pam.html"},{"key":"13_CR24","unstructured":"SECURE: Secure Environments for Collaboration among Ubiquitous Roaming Entities. Website, \n                      http:\/\/secure.dsg.cs.tcd.ie"},{"key":"13_CR25","unstructured":"Seigneur, J.M., Abendroth, J., Jensen, C.D.: Bank Accounting and Ubiquitous Brokering of Trustos. In: 7th Cabernet Radicals Workshop (2002), \n                      http:\/\/citeseer.nj.nec.com\/seigneur02bank.html"},{"key":"13_CR26","unstructured":"Seigneur, J.-M., Farrell, S., Jensen, C.D.: Secure ubiquitous computing based on entity recognition. In: Ubicomp 2002 Security Workshop, G\u00f6teborg (2002), \n                      http:\/\/www.cs.tcd.ie\/Jean-Marc.Seigneur\/publications\/secureubicomper.pdf"},{"key":"13_CR27","volume-title":"Authentication: from passwords to public keys","author":"R.E. Smith","year":"2001","unstructured":"Smith, R.E.: Authentication: from passwords to public keys. Addison-Wesley, Reading (2001) ISBN 0-201-61599-1"},{"key":"13_CR28","doi-asserted-by":"publisher","DOI":"10.1002\/0470848693","volume-title":"Security for Ubiquitous Computing","author":"F. Stajano","year":"2002","unstructured":"Stajano, F.: Security for Ubiquitous Computing. John Wiley & Sons, Chichester (2002) ISBN 0470844930"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Proceedings of the 7th International Security Protocols Workshop, pp. 172-194 (1999)","DOI":"10.1007\/10720107_24"},{"key":"13_CR30","unstructured":"TCPA: TCPA Design Philosophies and Concepts Version 1.0.White paper, Trusted Computing Platform Alliance (2000), \n                      http:\/\/www.trustedcomputing.org\/docs\/designv10final.pdf"},{"key":"13_CR31","unstructured":"TCPA: Trusted Computing Platform Alliance, Website \n                      http:\/\/www.trustedcomputing.org\/"},{"key":"13_CR32","unstructured":"Weeks, S.: Understanding Trust Management Systems. In: IEEE Symposium on Security and Privacy, Oakland (2001)"},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"Weiser, M.: The Computer for the 21st Century. Scientific American (1991), \n                      http:\/\/www.ubiq.com\/hypertext\/weiser\/SciAmDraft3.html","DOI":"10.1038\/scientificamerican0991-94"},{"key":"13_CR34","unstructured":"Weiser, M., Brown, J.S.: Designing Calm Technology. PowerGrid Journal\u00a01.01 (1996)"},{"key":"13_CR35","unstructured":"Wexler, J.: Wi-fi world. Network World (2002), \n                      http:\/\/www.nwfusion.com\/wifi\/2002\/main.html"},{"key":"13_CR36","volume-title":"The Official PGP User\u2019s Guide","author":"P.R. Zimmermann","year":"1995","unstructured":"Zimmermann, P.R.: The Official PGP User\u2019s Guide. MIT Press, Cambridge (1995) ISBN 0-262-74017-6"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39881-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T16:03:57Z","timestamp":1714406637000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-540-39881-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208877","9783540398813"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39881-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}