{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T05:21:09Z","timestamp":1739942469042,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":72,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_33","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T16:44:00Z","timestamp":1266857040000},"page":"719-746","source":"Crossref","is-referenced-by-count":6,"title":["Security via Trusted Communications"],"prefix":"10.1007","author":[{"given":"Zheng","family":"Yan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"4","key":"33_CR1","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T. Grandison","year":"2000","unstructured":"T.\u00a0Grandison, M.\u00a0Sloman: A survey of trust in internet applications, IEEE Commun. Surv. 3(4), 2\u201316 (2000)","journal-title":"IEEE Commun. Surv."},{"issue":"1","key":"33_CR2","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avizienis","year":"2004","unstructured":"A.\u00a0Avizienis, J.-C.\u00a0Laprie, B.\u00a0Randell, C.\u00a0Landwehr: Basic concepts and taxonomy of dependable and secure computing, IEEE Trans. Dependable Secure Comput. 1(1), 11\u201333 (2004)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"33_CR3","first-page":"190","volume-title":"Cooperation and Prosocial Behaviour","author":"S. Boon","year":"1991","unstructured":"S.\u00a0Boon, J.\u00a0Holmes: The dynamics of interpersonal trust: resolving uncertainty in the face of risk. In: Cooperation and Prosocial Behaviour, ed. by R.\u00a0Hinde, J.\u00a0Groebel (Cambridge University Press, Cambridge, UK 1991) pp.\u00a0190\u2013211"},{"issue":"6","key":"33_CR4","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1016\/S1071-5819(03)00041-7","volume":"58","author":"C.L. Corritore","year":"2003","unstructured":"C.L.\u00a0Corritore, B.\u00a0Kracher, S.\u00a0Wiedenbeck: On-line trust: concepts, evolving themes, a model, Int. J. Human-Comput. Stud. Trust Technol. 58(6), 737\u2013758 (2003)","journal-title":"Int. J. Human-Comput. Stud. Trust Technol."},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"D.E. Denning: A new paradigm for trusted systems, Proc. IEEE New Paradigms Workshop (1993)","DOI":"10.1145\/283751.283772"},{"key":"33_CR6","doi-asserted-by":"crossref","first-page":"2534","DOI":"10.4018\/978-1-59140-553-5.ch449","volume-title":"Encyclopedia of Information Science and Technology","author":"R. Falcone","year":"2005","unstructured":"R.\u00a0Falcone, C.\u00a0Castelfranchi: Socio-cognitive model of trust. In: Encyclopedia of Information Science and Technology, ed. by M.\u00a0Khosrow-Pour (Idea Group Reference, Hershey, PA 2005) pp. 2534\u20132538"},{"key":"33_CR7","unstructured":"D.\u00a0Gambetta: Can we trust trust?. In: Trust: Making and Breaking Cooperative Relations, by D.\u00a0Gambetta (WileyBlackwell, Oxford 1990)"},{"key":"33_CR8","unstructured":"Z. Liu, A.W. Joy, R.A. Thompson: A dynamic trust model for mobile ad hoc networks, Proc. 10th IEEE Int. Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004) (2004) pp. 80\u201385"},{"key":"33_CR9","unstructured":"D.H. McKnight, N.L. Chervany: What is trust? A conceptual analysis and an interdisciplinary model, Proc. 2000 Americas Conference on Information Systems (2000)"},{"key":"33_CR10","unstructured":"D.H. McKnight, N.L. Chervany: The meanings of trust, UMN University Report, available at http:\/\/www.misrc.umn.edu\/wpaper\/wp96-04.htm (2003)"},{"issue":"3","key":"33_CR11","doi-asserted-by":"publisher","first-page":"709","DOI":"10.2307\/258792","volume":"20","author":"R.C. Mayer","year":"1995","unstructured":"R.C.\u00a0Mayer, J.H.\u00a0Davis, F.D.\u00a0Schoorman: An integrative model of organizational trust, Acad. Manag. Rev. 20(3), 709\u2013734 (1995)","journal-title":"Acad. Manag. Rev."},{"key":"33_CR12","unstructured":"L. Mui: Computational models of trust and reputation: agents, evolutionary games, and social networks, Ph.D. Thesis (Massachusetts Institute of Technology, 2003)"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"D.E. Denning: A new paradigm for trusted systems, Proc. 1992\u20131993 Workshop on New Security Paradigms (1993) pp. 36\u201341","DOI":"10.1145\/283751.283772"},{"key":"33_CR14","unstructured":"TCG TPM Specification v1.2, available at https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/ (2003)"},{"key":"33_CR15","first-page":"209","volume-title":"Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions","author":"Z. Yan","year":"2008","unstructured":"Z.\u00a0Yan, S.\u00a0Holtmanns: Trustmodeling and management: from social trust to digital trust. In: Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions, ed. by R.\u00a0Subramanian (IGI Global, Hershey, PA, USA 2008) pp.\u00a0209\u2013323"},{"key":"33_CR16","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"A.K. Dey","year":"2001","unstructured":"A.K.\u00a0Dey: Understanding and using context, Pers. Ubiquitous Comput. J. 5, 4\u20137 (2001)","journal-title":"Pers. Ubiquitous Comput. J."},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"M. Blaze, J. Feigenbaum, J. Lacy: Decentralized trust management, Proc. IEEE Symposium on Security and Privacy (1996) pp. 164\u2013173","DOI":"10.1109\/SECPRI.1996.502679"},{"issue":"2","key":"33_CR18","first-page":"61","volume":"5","author":"Y. Tan","year":"1998","unstructured":"Y.\u00a0Tan, W.\u00a0Thoen: Toward a generic model of trust for electronic commerce, Int. J. Electron. Commer. 5(2), 61\u201374 (1998)","journal-title":"Int. J. Electron. Commer."},{"issue":"12","key":"33_CR19","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1109\/12.737682","volume":"47","author":"M.K. Reiter","year":"1998","unstructured":"M.K.\u00a0Reiter, S.G.\u00a0Stubblebine: Resilient authentication using path independence, IEEE Trans. Comput. 47(12), 1351\u20131362 (1998)","journal-title":"IEEE Trans. Comput."},{"issue":"7","key":"33_CR20","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L. Xiong","year":"2004","unstructured":"L.\u00a0Xiong, L.\u00a0Liu: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities, IEEE Trans. Knowl. Data Eng. 16(7), 843\u2013857 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"33_CR21","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","volume":"24","author":"Y. Sun","year":"2006","unstructured":"Y.\u00a0Sun, W.\u00a0Yu, Z.\u00a0Han, K.J.R.\u00a0Liu: Information theoretic framework of trust modeling and evaluation for ad hoc networks, IEEE J. Selected Areas Commun. 24(2), 305\u2013317 (2006)","journal-title":"IEEE J. Selected Areas Commun."},{"key":"33_CR22","unstructured":"M. Zhou, H. Mei, L. Zhang: A multi-property trust model for reconfiguring component software, 5th Int. Conference on Quality Software QAIC2005 (2005) pp. 142\u2013149"},{"key":"33_CR23","unstructured":"Y. Wang, V. Varadharajan: Trust2: developing trust in peer-to-peer environments, IEEE Int. Conference on Services Computing, 1 (2005) 24\u201331"},{"key":"33_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/11839569_27","volume-title":"Proceedings of the 3rd International Conference on Autonomic and Trusted Computing","author":"Z. Yan","year":"2006","unstructured":"Z.\u00a0Yan, R.\u00a0MacLaverty: Autonomic trust management in a component based software system. In: Proceedings of the 3rd International Conference on Autonomic and Trusted Computing, Lecture Notes in Computer Science, Vol. 4158, ed. by L.T.\u00a0Yang, H.\u00a0Jin, J.\u00a0Ma, T.\u00a0Ungerer (Springer, Berlin Heidelberg 2006) pp. 279\u2013292"},{"key":"33_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/3-540-61770-1_45","volume-title":"Proceedings of European Symposium on Research in Computer Security","author":"U. Maurer","year":"1996","unstructured":"U.\u00a0Maurer: Modeling a public-key infrastructure. In: Proceedings of European Symposium on Research in Computer Security, Lecture Notes in Computer Science, Vol. 1146, ed. by H.\u00a0Bertino, H.\u00a0Kurth, G.\u00a0Martella, E.\u00a0Montolivo (Springer, Berlin Heidelberg 1996) pp. 325\u2013350"},{"key":"33_CR26","unstructured":"Z. Liu, A.W. Joy, R.A. Thompson: A dynamic trust model for mobile ad hoc networks, Proc. 10th IEEE Int. Workshop on Future Trends of Distributed Computing Systems (2004) pp. 80\u201385"},{"issue":"2","key":"33_CR27","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/JSAC.2005.861390","volume":"24","author":"G. Theodorakopoulos","year":"2006","unstructured":"G.\u00a0Theodorakopoulos, J.S.\u00a0Baras: On trust models and trust evaluation metrics for ad hoc networks, IEEE J. Sel. Areas Commun. 24(2), 318\u2013328 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"33_CR28","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium","author":"A. J\u00f8sang","year":"1999","unstructured":"A.\u00a0J\u00f8sang: An algebra for assessing trust in certification chains. In: Proceedings of the Network and Distributed Systems Security Symposium, ed. by J.\u00a0Kochmar (The Internet Society, Reston, VA 1999)"},{"key":"33_CR29","unstructured":"Z.\u00a0Yan: Trust Management for Mobile Computing Platforms. Ph.D. Thesis (Dept. of Electrical and Communication Eng., Helsinki University of Technology 2007)"},{"key":"33_CR30","doi-asserted-by":"crossref","unstructured":"K. Aberer, Z. Despotovic: Managing trust in a peer-to-peer information system, Proc. ACM Conf. Information and Knowledge Management (2001)","DOI":"10.1145\/502585.502638"},{"issue":"6","key":"33_CR31","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MIC.2005.136","volume":"9","author":"S. Song","year":"2005","unstructured":"S.\u00a0Song, K.\u00a0Hwang, R.\u00a0Zhou, Y.-K.\u00a0Kwok: Trusted P2P transactions with fuzzy reputation aggregation, IEEE Internet Comput. 9(6), 24\u201334 (2005)","journal-title":"IEEE Internet Comput."},{"key":"33_CR32","doi-asserted-by":"crossref","unstructured":"P.\u00a0Resnick, R.\u00a0Zeckhauser: Trust among strangers in internet transactions: empirical analysis of eBay\u2019s reputation system. In: The Economics of the Internet and E-Commerce, Advances in Applied Microeconomics, Vol. 11, ed. by M.R.\u00a0Baye (Elsevier, MO, USA 2002) pp. 127\u2013157","DOI":"10.1016\/S0278-0984(02)11030-3"},{"key":"33_CR33","unstructured":"A. Singh, L. Liu: TrustMe: anonymous management of trust relationships in decentralized P2P systems, IEEE Int. Conference on Peer-to-Peer Computing (2003) pp. 142\u2013149"},{"key":"33_CR34","doi-asserted-by":"crossref","unstructured":"R. Guha, R. Kumar: Propagation of trust and distrust, Proc. 13th International Conference on World Wide Web (ACM Press, 2004) pp. 403\u2013412","DOI":"10.1145\/988672.988727"},{"key":"33_CR35","doi-asserted-by":"crossref","unstructured":"S. Kamvar, M. Scholsser, H. Garcia-Molina: The EigenTrust algorithm for reputation management in P2P networks, Proc. 12th Int. Conference of World Wide Web (2003)","DOI":"10.1145\/775152.775242"},{"key":"33_CR36","unstructured":"Z. Liang, W. Shi: PET: A PErsonalized Trust model with reputation and risk evaluation for P2P resource sharing, Proc. 38th Annual Hawaii Int. Conference on System Sciences (2005) pp. 201.2 (refer to http:\/\/portal.acm.org\/citation.cfm?id=1043109, the page is indicated like that)"},{"key":"33_CR37","doi-asserted-by":"crossref","unstructured":"S. Lee, R. Sherwood, B. Bhattacharjee: Cooperative peer groups in NICE, Proc. IEEE Conference on Computer Communications (INFOCOM 03) (IEEE CS Press, 2003) pp. 1272\u20131282","DOI":"10.1109\/INFCOM.2003.1208963"},{"key":"33_CR38","unstructured":"P. Herrmann: Trust-based procurement support for software components, Proc. 4th Int. Conference of Electronic Commerce Research (ICECR04) (2001) pp. 505\u2013514"},{"key":"33_CR39","doi-asserted-by":"crossref","unstructured":"K. Walsh, E.G. Sirer: Fighting peer-to-peer SPAM and decoys with object reputation, Proc. 3rd Workshop on the Economics of Peer-to-Peer Systems (P2PECON) (2005) 138\u2013143","DOI":"10.1145\/1080192.1080204"},{"key":"33_CR40","unstructured":"Z. Zhang, X. Wang, Y. Wang: A P2P global trust model based on recommendation, Proc. 2005 Int. Conference on Machine Learning and Cybernetics, 7 (2005) pp. 3975\u20133980"},{"key":"33_CR41","unstructured":"C. Lin, V. Varadharajan, Y. Wang, V. Pruthi: Enhancing grid security with trust management, Proc. IEEE Int. Conference on Services Computing (2004) pp. 303\u2013310"},{"key":"33_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-3-540-30079-3_2","volume-title":"Proc. 1st International Conference on Trust and Privacy in Digital Business","author":"Z. Yan","year":"2004","unstructured":"Z.\u00a0Yan, P.\u00a0Cofta: A mechanism for trust sustainability among trusted computing platforms. In: Proc. 1st International Conference on Trust and Privacy in Digital Business, Lecture Notes in Computer Science, Vol. 3184, ed. by S.K.\u00a0Katsikas, J.\u00a0Lopez, G.\u00a0Pernul (Springer, Berlin Heidelberg 2004) pp. 11\u201319"},{"issue":"4","key":"33_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1082983.1083213","volume":"30","author":"S. Banerjee","year":"2005","unstructured":"S.\u00a0Banerjee, C.A.\u00a0Mattmann, N.\u00a0Medvidovic, L.\u00a0Golubchik: Leveraging architectural models to inject trust into software systems, ACM SIGSOFT Softw. Eng. Notes 30(4), 1\u20137 (2005)","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"33_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-540-73547-2_24","volume-title":"Proceedings of the 4th International Conference on Autonomic and Trusted Computing","author":"Z. Yan","year":"2007","unstructured":"Z.\u00a0Yan, C.\u00a0Prehofer: An adaptive trust control model for a trustworthy software component platform. In: Proceedings of the 4th International Conference on Autonomic and Trusted Computing, Lecture Notes in Computer Science, Vol. 4610, ed. by B.\u00a0Xiao, L.T.\u00a0Yang, J.\u00a0Ma, C.\u00a0M\u00fcller-Schloer, Y.\u00a0Hua (Springer, Berlin Heidelberg 2007) pp. 226\u2013238"},{"key":"33_CR45","doi-asserted-by":"crossref","unstructured":"W. Xu, Y. Xin, G. Lu: A trust framework for pervasive computing environments, Int. Conference on Wireless Communications, Networking and Mobile Computing (2007) pp. 2222\u20132225","DOI":"10.1109\/WICOM.2007.554"},{"key":"33_CR46","doi-asserted-by":"crossref","unstructured":"Z. Yan: Autonomic trust management for a pervasive system, Secypt\u201908 (2008) pp.\u00a0491\u2013500","DOI":"10.5220\/0001921104910500"},{"issue":"3","key":"33_CR47","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A. J\u00f8sang","year":"2001","unstructured":"A.\u00a0J\u00f8sang: A logic for uncertain probabilities, Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 9(3), 279\u2013311 (2001)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"33_CR48","unstructured":"http:\/\/sky.fit.qut.edu.au\/ josang\/sl\/demo\/Op.html"},{"key":"33_CR49","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/S0020-7373(86)80040-2","volume":"24","author":"B. Kosko","year":"1986","unstructured":"B.\u00a0Kosko: Fuzzy cognitive maps, Int. J. Man-Mach. Stud. 24, 65\u201375 (1986)","journal-title":"Int. J. Man-Mach. Stud."},{"key":"33_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/3-540-44875-6_14","volume-title":"Proceedings of the First International Conference of Trust Management","author":"C. Castelfranchi","year":"2003","unstructured":"C.\u00a0Castelfranchi, R.\u00a0Falcone, G.\u00a0Pezzulo: Integrating trustfulness and decision using fuzzy cognitive maps. In: Proceedings of the First International Conference of Trust Management, Lecture Notes in Computer Science, Vol. 2692, ed. by P.\u00a0Nixon, S.\u00a0Terzis (Springer, Berlin Heidelberg 2003) pp. 195\u2013210"},{"key":"33_CR51","unstructured":"C.D. Stylios, V.C. Georgopoulos, P.P. Groumpos: The use of fuzzy cognitive maps in modeling systems, available at http:\/\/med.ee.nd.edu\/MED5\/PAPERS\/067\/067.PDF"},{"issue":"6","key":"33_CR52","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MIC.2005.136","volume":"9","author":"S. Song","year":"2005","unstructured":"S.\u00a0Song, K.\u00a0Hwang, R.\u00a0Zhou, Y.-K.\u00a0Kwok: Trusted P2P transactions with fuzzy reputation aggregation, IEEE Internet Comput. 9(6), 24\u201334 (2005)","journal-title":"IEEE Internet Comput."},{"key":"33_CR53","unstructured":"Z. Yan: A conceptual architecture of a trusted mobile environment, Proc. IEEE 2nd Int. Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU06) (2006) pp. 75\u201381"},{"issue":"3","key":"33_CR54","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MC.2003.1185209","volume":"36","author":"S.J. Vaughan-Nichols","year":"2003","unstructured":"S.J.\u00a0Vaughan-Nichols: How trustworthy is trusted computing?, IEEE Computer 36(3), 18\u201320 (2003)","journal-title":"IEEE Computer"},{"issue":"7","key":"33_CR55","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MC.2003.1212691","volume":"36","author":"P. England","year":"2003","unstructured":"P.\u00a0England, B.\u00a0Lampson, J.\u00a0Manferdelli, M.\u00a0Peinado, B.\u00a0Willman: A trusted open platform, IEEE Computer 36(7), 55\u201362 (2003)","journal-title":"IEEE Computer"},{"key":"33_CR56","unstructured":"Z. Yan, P. Zhang, T. Virtanen: Trust evaluation based security solution in ad hoc networks, Proc. 7th Nordic Workshop on Secure IT Systems (NordSec03) (2003)"},{"issue":"3","key":"33_CR57","first-page":"275","volume":"2","author":"Z. Yan","year":"2006","unstructured":"Z.\u00a0Yan, P.\u00a0Zhang: Trust collaboration in P2P systems based on trusted computing platforms, WSEAS Trans. Inf. Sci. Appl. 2(3), 275\u2013282 (2006)","journal-title":"WSEAS Trans. Inf. Sci. Appl."},{"key":"33_CR58","doi-asserted-by":"crossref","unstructured":"P. Fenkam, S. Dustdar, E. Kirda, G. Reif, H. Gall: Towards an access control system for mobile peer-to-peer collaborative environments, Proc. 11th IEEE Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (2002) 95\u2013100","DOI":"10.1109\/ENABL.2002.1029995"},{"key":"33_CR59","unstructured":"G. Kortuem, J. Schneider, D. Preuitt, T.G.C. Thompson, S. Fickas, Z. Segall: When peer-to-peer comes face-to-face: collaborative peer-to-peer computing in mobile ad hoc networks, Proc. of the 1st Int. Conference on Peer-to-Peer Computing (2001)"},{"issue":"2","key":"33_CR60","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"A.\u00a0J\u00f8sang, R.\u00a0Ismail, C.\u00a0Boyd: A survey of trust and reputation systems for online service provision, Decis. Support Syst. 43(2), 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"key":"33_CR61","unstructured":"C. Lin, V. Varadharajan, Y. Wang, V. Pruthi: Enhancing grid security with trust management, Proc. IEEE Int. Conference on Services Computing (2004) pp. 303\u2013310"},{"issue":"4","key":"33_CR62","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1002\/(SICI)1099-1190(199907\/08)9:4<213::AID-NEM328>3.0.CO;2-E","volume":"9","author":"E. Herscovitz","year":"1999","unstructured":"E.\u00a0Herscovitz: Secure virtual private networks: the future of data communications, Int. J. Netw. Manag. 9(4), 213\u2013220 (1999)","journal-title":"Int. J. Netw. Manag."},{"key":"33_CR63","unstructured":"D. Wood, V. Stoss, L. Chan-Lizardo, G.S. Papacostas, M.E. Stinson: Virtual private networks, Int. Conference on Private Switching Systems and Networks (1988) pp. 132\u2013136"},{"key":"33_CR64","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1353-4858(03)00110-7","volume":"2003","author":"K. Regan","year":"2003","unstructured":"K.\u00a0Regan: Secure VPN design considerations, Netw. Secur. 2003, 5\u201310 (2003)","journal-title":"Netw. Secur."},{"issue":"2","key":"33_CR65","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/S1389-1286(01)00256-0","volume":"38","author":"K.H. Cheung","year":"2002","unstructured":"K.H.\u00a0Cheung, J.\u00a0Misic: On virtual private network security design issues, Comput. Netw. 38(2), 165\u2013179 (2002)","journal-title":"Comput. Netw."},{"issue":"2","key":"33_CR66","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/505586.505587","volume":"5","author":"M. Blaze","year":"2002","unstructured":"M.\u00a0Blaze, J.\u00a0Ioannidis, A.D.\u00a0Keromytis: Trust management for IPSec, ACM Trans. Inf. Syst. Secur. 5(2), 95\u2013118 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"33_CR67","unstructured":"R. Shan, S. Li, M. Wang, J. Li: Network security policy for large-scale VPN, Proc. Int. Conference on Communication Technology, 1 (2003) pp. 217\u2013220"},{"key":"33_CR68","doi-asserted-by":"crossref","unstructured":"H. Hamed, E. Al-Shaer, W. Marrero: Modeling and verification of IPSec and VPN security policies, 13th IEEE Int. Conference on Network Protocols (2005) pp. 259\u2013278","DOI":"10.1109\/ICNP.2005.25"},{"issue":"5","key":"33_CR69","first-page":"854","volume":"5","author":"Z. Yan","year":"2006","unstructured":"Z.\u00a0Yan, P.\u00a0Zhang: A trust management system in mobile enterprise networking, WSEAS Trans. Commun. 5(5), 854\u2013861 (2006)","journal-title":"WSEAS Trans. Commun."},{"key":"33_CR70","doi-asserted-by":"crossref","unstructured":"Z. Yan: A comprehensive trust model for component software, SecPerU\u201908 (2008) pp. 1\u20136","DOI":"10.1145\/1387329.1387330"},{"issue":"10","key":"33_CR71","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MC.2002.1039525","volume":"35","author":"A.B. Huang","year":"2002","unstructured":"A.B.\u00a0Huang: The trusted OC: skin-deep security, IEEE Computer 35(10), 103\u2013105 (2002)","journal-title":"IEEE Computer"},{"key":"33_CR72","unstructured":"N. Asokan, J. Ekberg: A platform for OnBoard credentials, Proc. Financial Cryptography and Data Security (2008)"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T18:57:59Z","timestamp":1739905079000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":72,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_33","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}