{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:01:54Z","timestamp":1725534114166},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642029615"},{"type":"electronic","value":"9783642029622"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02962-2_43","type":"book-chapter","created":{"date-parts":[[2009,6,30]],"date-time":"2009-06-30T09:27:57Z","timestamp":1246354077000},"page":"342-349","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Information Propagation in Service Routing for Next Generation Network"],"prefix":"10.1007","author":[{"given":"David","family":"Lai","sequence":"first","affiliation":[]},{"given":"Zhongwei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/11603771_47","volume-title":"Distributed Computing \u2013 IWDC 2005","author":"C. Cao","year":"2005","unstructured":"Cao, C., Yang, J., Zhang, G.: Semantic overlay based services routing between MPLS domains. In: Pal, A., Kshemkalyani, A.D., Kumar, R., Gupta, A. (eds.) IWDC 2005. LNCS, vol.\u00a03741, pp. 416\u2013427. Springer, Heidelberg (2005)"},{"key":"43_CR2","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol. RFC 3261 (June 2002)","DOI":"10.17487\/rfc3261"},{"key":"43_CR3","doi-asserted-by":"crossref","unstructured":"Willis, D., Hoeneisen, B.: Session Initiation Protocol (SIP) Extension Header Field for Registering Non-Adjacent Contacts. RFC 3608 (October 2003)","DOI":"10.17487\/rfc3608"},{"key":"43_CR4","unstructured":"X.509 (03\/00). International Telecommunication Union ITU-T Recommendations X series (september 2003), http:\/\/www.itu.int\/rec\/recommendation.asp"},{"key":"43_CR5","doi-asserted-by":"crossref","unstructured":"Rahman, A.A., Halles, S.: A Distributed Trust Model. In: Proceedings of the New Security Paradigms Workshops 1997 (1997)","DOI":"10.1145\/283699.283739"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Denning, D.: A new paradigm for trusted systems. In: Proceedings of 1992-1993 ACM SIGSAC New Security Paradigms Workshop (1993)","DOI":"10.1145\/283751.283772"},{"key":"43_CR7","doi-asserted-by":"crossref","unstructured":"Montaner, M., Lopez, B., Rosa, J.L.: Developing Trust in Recommender Agents. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems (2002)","DOI":"10.1145\/544741.544811"},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"Robles, S., Borrell, J., Bigham, J., Tokarchuk, L., Cuthbert, L.: Design of a Trust Model for a Secure Multi-Agent Marketplace. In: Proceedings of the Fifth International Conference on Autonomous Agents (2001)","DOI":"10.1145\/375735.376002"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Beth, T., Borcherding, M., Klien, B.: Valuation of Trust in Open Networks. In: Proceedings of the Conference on Computer Security, 1994 (1994)","DOI":"10.1007\/3-540-58618-0_53"},{"key":"43_CR10","doi-asserted-by":"crossref","unstructured":"Reiter, M., Stubblebine, S.: Authentication Metric Analysis and Desig. ACM Transactions on Information and System Security\u00a02(2) (1999)","DOI":"10.1145\/317087.317088"},{"key":"43_CR11","unstructured":"Rahman, A.A., Hailes, S.: Using Recommendations for Managing Trust in Distributed Systems. In: Proceedings of the IEEE Malaysia International Conference on Communication 1997 (MICC 1997), Kuala Lumpur, Malaysia (1997)"},{"key":"43_CR12","unstructured":"Rahman, A.A., Hailes, S.: Supporting Trust in Virtual Communities. In: Conference on System Sciences, Maui, Hawaii, January 2000, vol.\u00a033 (2000)"},{"key":"43_CR13","doi-asserted-by":"crossref","unstructured":"Au, A.R., Looi, M., Ashley, P.: Automated cross organisational trust establishment on extranets. In: Proceedings of the Workshop on Information Technology for Virtual Enterprises, 2001, January 2001, vol.\u00a0(7), pp. 3\u201311 (2001)","DOI":"10.1109\/ITVE.2001.904483"},{"key":"43_CR14","unstructured":"IETF, IESG: The Kerberos Network Authentication Service (V5). Proposed Standard, RFC1510 (September 1993)"},{"key":"43_CR15","unstructured":"Lai, D., Zhang, Z., Wang, H.: Towards an Authentication Protocol for Service Outsourcing Over IP Networks. In: Proceedings of the 2005 International Conference on Security and Management, June 2005, vol.\u00a07 (2005)"},{"issue":"8","key":"43_CR16","first-page":"537","volume":"4","author":"D. Lai","year":"2005","unstructured":"Lai, D., Zhang, Z.: An Infrastructure for Service Authentication and Authorization Revocation in a Dynamic Aggregation of Networks. WSEAS Transactions on Communications\u00a04(8), 537\u2013547 (2005)","journal-title":"WSEAS Transactions on Communications"},{"key":"43_CR17","unstructured":"Lai, D., Zhang, Z.: Network Service Sharing Infrastructure: Service Authentication and Authorization Revocation. In: Proceedings of the 9thWSEAS International Conference on Communications (July 2005)"},{"key":"43_CR18","unstructured":"Lai, D., Zhang, Z., Shen, C.: Achieving Secure Service Sharing Over IP Networks. In: Proceedings of the ASEE Mid-Atlantic Section Spring 2006 Conference (April 2006)"},{"key":"43_CR19","doi-asserted-by":"crossref","unstructured":"Lai, D., Zhang, Z.: Secure Service Sharing over Networks for Mobile Users Using Service Network Graphs. In: Proceedings of the Wireless Telecommunication Syposium 2006 (April 2006)","DOI":"10.1109\/WTS.2006.334524"},{"key":"43_CR20","series-title":"Lecture Notes in Computer Science","first-page":"163","volume-title":"Network and Parallel Computing","author":"D. Lai","year":"2008","unstructured":"Lai, D., Zhang, Z.: Self-Authentication of Encrypted Channels in Service Network Graph. In: Cao, J., Li, M., Wu, M.-Y., Chen, J. (eds.) NPC 2008. LNCS, vol.\u00a05245, p. 163. Springer, Heidelberg (2008)"},{"key":"43_CR21","doi-asserted-by":"crossref","unstructured":"Lai, D., Zhang, Z.: Improving Efficiency and Scalability of Service Network Graph by Re-routing Service Routes. In: Proceedings of the First Asian Conference on Intelligent Information and Data Base Systems, Vietnam (2009)","DOI":"10.1109\/ACIIDS.2009.31"}],"container-title":["Lecture Notes in Computer Science","Rough Sets and Knowledge Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02962-2_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:27:37Z","timestamp":1558398457000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02962-2_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642029615","9783642029622"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02962-2_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}