{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:05:48Z","timestamp":1737435948493,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540735465"},{"type":"electronic","value":"9783540735472"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73547-2_24","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T14:54:52Z","timestamp":1186844092000},"page":"226-238","source":"Crossref","is-referenced-by-count":12,"title":["An Adaptive Trust Control Model for a Trustworthy Component Software Platform"],"prefix":"10.1007","author":[{"given":"Zheng","family":"Yan","sequence":"first","affiliation":[]},{"given":"Christian","family":"Prehofer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Denning, D.E.: A New Paradigm for Trusted Systems. In: Proceedings of the IEEE New Paradigms Workshop (1993)","DOI":"10.1145\/283751.283772"},{"key":"24_CR2","unstructured":"TCG TPM Specification v1.2 (2003), http:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/"},{"issue":"4","key":"24_CR3","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T. Grandison","year":"2000","unstructured":"Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications and Survey, Forth Quarter\u00a03(4), 2\u201316 (2000)","journal-title":"IEEE Communications and Survey, Forth Quarter"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Banerjee, S., Mattmann, C.A., Medvidovic, N., Golubchik, L.: Leveraging Architectural Models to Inject Trust into Software Systems. ACM SIGSOFT Software Engineering Notes. In: Proceedings of the 2005 workshop on software engineering for secure systems\u2014building trustworthy applications SESS 2005, vol. 30(4) (2005)","DOI":"10.1145\/1083200.1083213"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Wang, X., Wang, Y.: A P2P Global Trust Model Based on Recommendation. In: Proceedings of 2005 International Conference on Machine Learning and Cybernetics, vol. 7, pp. 3975\u20133980 (2005)","DOI":"10.1109\/ICMLC.2005.1527632"},{"key":"24_CR6","unstructured":"Lin, C., Varadharajan, V., Wang, Y., Pruthi, V.: Enhancing Grid Security with Trust Management. In: Proceedings of IEEE International Conference on Services Computing, pp. 303\u2013310 (2004)"},{"issue":"2","key":"24_CR7","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","volume":"24","author":"Y. Sun","year":"2006","unstructured":"Sun, Y., Yu, W., Han, Z., Liu, K.J.R.: Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. IEEE Journal on Selected Area in Communications\u00a024(2), 305\u2013317 (2006)","journal-title":"IEEE Journal on Selected Area in Communications"},{"key":"24_CR8","unstructured":"Zhou, M., Mei, H., Zhang, L.: A Multi-Property Trust Model for Reconfiguring Component Software. In: The Fifth International Conference on Quality Software QAIC 2005, pp. 142\u2013149 (2005)"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44875-6_6","volume-title":"Trust Management","author":"P. Herrmann","year":"2003","unstructured":"Herrmann, P.: Trust-Based Protection of Software Component Users and Designers. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol.\u00a02692, Springer, Heidelberg (2003)"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/11839569_27","volume-title":"Autonomic and Trusted Computing","author":"Z. Yan","year":"2006","unstructured":"Yan, Z., MacLaverty, R.: Autonomic Trust Management in a Component Based Software System. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol.\u00a04158, pp. 279\u2013292. Springer, Heidelberg (2006)"},{"key":"24_CR11","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/S0020-7373(86)80040-2","volume":"24","author":"B. Kosko","year":"1986","unstructured":"Kosko, B.: Fuzzy Cognitive Maps. International Journal Man-Machine Studies\u00a024, 65\u201375 (1986)","journal-title":"International Journal Man-Machine Studies"},{"key":"24_CR12","unstructured":"Robocop, Space4U and Trust4All website: http:\/\/nlsvr2.ehv.campus.philips.com\/"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73547-2_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T08:27:38Z","timestamp":1737361658000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73547-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540735465","9783540735472"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73547-2_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}