{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:41:41Z","timestamp":1725550901244},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_42","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:11:44Z","timestamp":1270062704000},"page":"258-262","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Approach for Building a Dynamically Reconfigurable Trustworthy Distributed System"],"prefix":"10.1007","author":[{"given":"Shakti","family":"Mishra","sequence":"first","affiliation":[]},{"given":"D. S.","family":"Kushwaha","sequence":"additional","affiliation":[]},{"given":"A. K.","family":"Misra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"42_CR1","first-page":"112","volume":"46","author":"Y. Sun","year":"2008","unstructured":"Sun, Y., Han, Z., Ray Liu, K.J.: Defense of Trust Management Vulnerabilities in Distributed Networks. IEEE Communications Magazine, Feature Topic on Security in Mobile Ad Hoc and Sensor Networks\u00a046(2), 112\u2013119 (2008)","journal-title":"IEEE Communications Magazine, Feature Topic on Security in Mobile Ad Hoc and Sensor Networks"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Chapin, P.C., Christian, S., Wang, X.S.: Authorization in Trust Management: Features and Foundations. ACM Computing Surveys\u00a040(3) (2008)","DOI":"10.1145\/1380584.1380587"},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Yu, Z.: Decentralized Trust Management based on the Reputation of Information Sources. In: The Proceedings of 2007 IEEE International Conference on Networking, Sensing and Control, London (2007)","DOI":"10.1109\/ICNSC.2007.372779"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Sun, Y.L., et al.: A Trust Evaluation framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. In: The Proceedings of 25th IEEE International Conference on Computer Communication: INFOCOM (2006)","DOI":"10.1109\/INFOCOM.2006.154"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Wu, Y., et al.: Automatically Constructing Trusted Cluster Computing Environment. The Journal of Supercomputing (July 2009)","DOI":"10.1007\/s11227-009-0315-4"},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Zou, D., et al.: Building an Automated Trust Negotiation Architecture in Virtual Computing Environment. The Journal of Supercomputing (2009)","DOI":"10.1007\/s11227-009-0358-6"},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Sirbu, M.A., Chuang, J.C.-I.: Distributed Authentication in Kerberos using Public Key Cryptography. In: Symposium on Network and Distributed System Security, p. 134 (1997)","DOI":"10.1109\/NDSS.1997.579231"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Skakun, S., Kussul, N.: An Agent Approach for providing Security in Distributed Systems: TCSET (2006)","DOI":"10.1109\/TCSET.2006.4404498"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Mishra, S., Kushwaha, D.S., Misra, A.K.: Jingle-Mingle: A Hybrid Reliable load Balancing approach for Load Balancing in a Trusted Distributed Environment. In: IEEE Proceedings of 5th International Joint Conference on INC, IMS & IDC, NCM 2009, pp. 117\u2013122 (2009)","DOI":"10.1109\/NCM.2009.361"},{"key":"42_CR10","unstructured":"Mishra, S., Kushwaha, D.S., Misra, A.K.: A Cooperative Trust Management framework for Load Balancing in Cluster based Distributed System. In: IEEE International Conference on Recent Trends in Telecommunication, Information and Computing (accepted, 2010)"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:51:43Z","timestamp":1606186303000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_42","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}