{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:01:14Z","timestamp":1725516074265},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540692942"},{"type":"electronic","value":"9783540692959"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69295-9_6","type":"book-chapter","created":{"date-parts":[[2008,7,31]],"date-time":"2008-07-31T06:38:25Z","timestamp":1217486305000},"page":"47-59","source":"Crossref","is-referenced-by-count":2,"title":["A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments"],"prefix":"10.1007","author":[{"given":"Mohsen","family":"Taherian","sequence":"first","affiliation":[]},{"given":"Rasool","family":"Jalili","sequence":"additional","affiliation":[]},{"given":"Morteza","family":"Amini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Swrl: A semantic web rule language combining owl and ruleml, \n                      \n                        http:\/\/www.w3.org\/Submission\/SWRL"},{"key":"6_CR2","unstructured":"Ubisec project, pervasive trust management model (ptm), \n                      \n                        http:\/\/www.it.uc3m.es\/~florina\/ptm"},{"key":"6_CR3","first-page":"48","volume-title":"New Security Paradigms Workshop","author":"A. Abdul-Rahman","year":"1998","unstructured":"Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: New Security Paradigms Workshop, pp. 48\u201360. ACM Press, New York (1998)"},{"key":"6_CR4","unstructured":"Almenarez, F., Marin, A., Campo, C., Garcia, C.: Ptm: A pervasive trust management model for dynamic open environments. In: First Workshop on Pervasive Security, Privacy and Trust PSPT (2004)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Almenarez, F., Marin, A., Diaz, D., Sanchez, J.: Developing a model for trust management in pervasive devices. In: Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshop (PERCOMW 2006) (2006)","DOI":"10.1109\/PERCOMW.2006.41"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Keromyts, A.D.: The role of trust management in distributed systems security. In: Secure Internet Programming, pp. 185\u2013210 (1999)","DOI":"10.1007\/3-540-48749-2_8"},{"key":"6_CR7","unstructured":"English, C., Nixon, P., Terzis, S., McGettrick, A., Lowe, H.: Dynamic trust models for ubiquitous computing environments. In: Ubicomp Security Workshop (2002)"},{"key":"6_CR8","unstructured":"Golbeck, G.A.: Computing and Applying Trust in Web-Based Social Networks. PhD thesis, University of Maryland (2005)"},{"issue":"4","key":"6_CR9","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1145\/1183463.1183470","volume":"6","author":"G.A. Golbeck","year":"2005","unstructured":"Golbeck, G.A., James, H.: Inferring binary trust relationships in web-based social networks. ACM Transactions on Internet Technology\u00a06(4), 497\u2013529 (2005)","journal-title":"ACM Transactions on Internet Technology"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/ICDCSW.2006.57","volume-title":"P2P Data and Knowledge Sharing Workshop (P2P\/DAKS 2006), at the 26th International Conference on Distributed Computing Systems (ICDCS 2006)","author":"N. Griffiths","year":"2006","unstructured":"Griffiths, N., Chao, K.M., Younas, M.: Fuzzy trust for peer-to-peer systems. In: P2P Data and Knowledge Sharing Workshop (P2P\/DAKS 2006), at the 26th International Conference on Distributed Computing Systems (ICDCS 2006), Lisbon, Portugal, pp. 73\u201373. IEEE Computer Society Press, Los Alamitos (2006)"},{"issue":"1-2","key":"6_CR11","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/S0004-3702(02)00259-X","volume":"142","author":"A. Josang","year":"2002","unstructured":"Josang, A.: The consensus operator for combining beliefs. Artificial Intelligence Journal\u00a0142(1-2), 157\u2013170 (2002)","journal-title":"Artificial Intelligence Journal"},{"key":"6_CR12","unstructured":"Josang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Australasian Computer Science Conference (ACSC 2006), Hobart, Australia, pp. 85\u201394 (2006)"},{"issue":"12","key":"6_CR13","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/2.970591","volume":"34","author":"L. Kagal","year":"2001","unstructured":"Kagal, L., Finin, T., Joshi, A.: Trust-based security in pervasive computing environments. IEEE Computer\u00a034(12), 154\u2013157 (2001)","journal-title":"IEEE Computer"},{"key":"6_CR14","unstructured":"Kagal, L., Finin, T., Joshi, A.: Moving from security to distributed trust in ubiquitous computing environments. IEEE Computer (2001)"},{"issue":"4","key":"6_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/98.943998","volume":"8","author":"M. Satyanarayanan","year":"2001","unstructured":"Satyanarayanan, M.: Pervasive computing: Vision and challenges. IEEE Personal Communications\u00a08(4), 10\u201317 (2001)","journal-title":"IEEE Personal Communications"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/PTP.2003.1231515","volume-title":"3rd International Conference on Peer-to-Peer Computing (P2P 2003)","author":"Y. Wang","year":"2003","unstructured":"Wang, Y., Vassileva, J.: Trust and reputation model in peer-to-peer networks. In: 3rd International Conference on Peer-to-Peer Computing (P2P 2003), pp. 150\u2013157. IEEE Computer Society, Los Alamitos (2003)"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69295-9_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:34:11Z","timestamp":1620016451000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69295-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540692942","9783540692959"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69295-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}