{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:01:35Z","timestamp":1740096095484,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642148583"},{"type":"electronic","value":"9783642148590"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14859-0_13","type":"book-chapter","created":{"date-parts":[[2011,2,10]],"date-time":"2011-02-10T06:40:25Z","timestamp":1297320025000},"page":"161-177","source":"Crossref","is-referenced-by-count":1,"title":["A Practical Approach to Identity on Digital Ecosystems Using Claim Verification and Trust"],"prefix":"10.1007","author":[{"given":"Mark","family":"McLaughlin","sequence":"first","affiliation":[]},{"given":"Paul","family":"Malone","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"OpenSAML v2.0, https:\/\/spaces.internet2.edu\/display\/OpenSAML\/Home"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Briscoe, G.: Digital Ecosystems. Ph.D. thesis, Imperial College London (2009)","DOI":"10.1145\/1643823.1643832"},{"key":"13_CR3","volume-title":"Conference on Bio Inspired Models of Network, Information and Computing Systems","author":"G. Briscoe","year":"2006","unstructured":"Briscoe, G., De Wilde, P.: Digital Ecosystems: Evolving service-oriented architectures. In: Conference on Bio Inspired Models of Network, Information and Computing Systems. IEEE Press, Los Alamitos (2006), http:\/\/arxiv.org\/abs\/0712.4102"},{"key":"13_CR4","unstructured":"Cameron, K.: The laws of identity, http:\/\/www.identityblog.com\/?p=354"},{"issue":"6","key":"13_CR5","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MIC.2003.1250581","volume":"7","author":"E. Damiani","year":"2003","unstructured":"Damiani, E., di Vimercati, S.D.C., Samarati, P.: Managing multiple and depend\u00acable identities. IEEE Internet Computing\u00a07(6), 29\u201337 (2003)","journal-title":"IEEE Internet Computing"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Glasser, U., Vajihollahi, M.: Identity management architecture. In: IEEE International Conference on Intelligence and Security Informatics ISI 2008, pp. 137\u2013144 (2008)","DOI":"10.1109\/ISI.2008.4565043"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Halperin, R., Backhouse, J.: A roadmap for research on identity in the information society. Identity in the Information Society (2008)","DOI":"10.1007\/s12394-008-0004-0"},{"issue":"1","key":"13_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/S1363-4127(04)00014-7","volume":"9","author":"M. Hansen","year":"2004","unstructured":"Hansen, M., Berlich, P., Camenisch, J., Clau, S., Pfitzmann, A., Waidner, M.: Privacy-enhancing identity management. Information Security Technical Report\u00a09(1), 35\u201344 (2004)","journal-title":"Information Security Technical Report"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Ion, M., Danzi, A., Koshutanski, H., Telesca, L.: A peer-to-peer multidimensional trust model for digital ecosystems. In: 2nd IEEE International Conference on Digital Ecosystems and Technologies, DEST 2008, pp. 461\u2013469 (2008)","DOI":"10.1109\/DEST.2008.4635150"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A.: Trust and reputation systems. In: Foundations of Security Analysis and Design IV (2007)","DOI":"10.1109\/ARES.2007.71"},{"key":"13_CR11","first-page":"99","volume-title":"Proceedings of the 2005 Australasian workshop on Grid computing and e-research","author":"A. J\u00f8sang","year":"2005","unstructured":"J\u00f8sang, A., Fabre, J., Hay, B., Dalziel, J., Pope, S.: Trust requirements in identity management. In: Proceedings of the 2005 Australasian workshop on Grid computing and e-research, vol.\u00a044, pp. 99\u2013108. Australian Computer Society, Inc., Newcastle (2005)"},{"key":"13_CR12","first-page":"85","volume-title":"Proceedings of the 29th Australasian Computer Science Conference","author":"A. J\u00f8sang","year":"2006","unstructured":"J\u00f8sang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Proceedings of the 29th Australasian Computer Science Conference, vol.\u00a048, pp. 85\u201394. Australian Computer Society, Inc., Hobart (2006)"},{"issue":"2","key":"13_CR13","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007); emerging Issues in Collaborative Commerce","journal-title":"Decision Support Systems"},{"key":"13_CR14","first-page":"59","volume-title":"Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling","author":"A. J\u00f8sang","year":"2005","unstructured":"J\u00f8sang, A., Pope, S.: Semantic constraints for trust transitivity. In: Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling, vol.\u00a043, pp. 59\u201368. Australian Computer Society, Inc., Newcastle (2005)"},{"key":"13_CR15","unstructured":"J\u00f8sang, A., Pope, S.: User centric identity management. In: Asia Pacific Information Technology Security Conference, AusCERT2005, Australia, pp. 77\u201389 (2005)"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Koshutanski, H., Ion, M., Telesca, L.: Distributed identity management model for digital ecosystems. In: The International Conference on Emerging Security Information, Systems, and Technologies, SecureWare 2007, pp. 132\u2013138 (2007)","DOI":"10.1109\/SECUREWARE.2007.4385323"},{"issue":"2","key":"13_CR17","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.50","volume":"6","author":"E. Maler","year":"2008","unstructured":"Maler, E., Reed, D.: The venn of identity - options and issues in federated identity management. IEEE Security & Privacy\u00a06(2), 16\u201323 (2008)","journal-title":"IEEE Security & Privacy"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Maliki, T.E., Seigneur, J.: A survey of user-centric identity management technologies. In: The International Conference on Emerging Security Information, Systems, and Technologies, SecureWare 2007, pp. 12\u201317 (2007)","DOI":"10.1109\/SECUREWARE.2007.4385303"},{"issue":"4","key":"13_CR19","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.comnet.2005.07.011","volume":"50","author":"S. Marti","year":"2006","unstructured":"Marti, S., Garcia-Molina, H.: Taxonomy of trust: Categorizing P2P reputation systems. Computer Networks\u00a050(4), 472\u2013484 (2006) (management in Peer-to-Peer Systems), http:\/\/www.sciencedirect.com\/science\/article\/B6VRG-4H0RYYJ-1\/2\/b6a612053c7546bd311548c2b642c541","journal-title":"Computer Networks"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-75853-2_9","volume-title":"IP Operations and Management","author":"J. McGibney","year":"2007","unstructured":"McGibney, J., Botvich, D.: Distributed dynamic protection of services on ad hoc and p2p networks. In: Medhi, D., Nogueira, J.M.S., Pfeifer, T., Wu, S.F. (eds.) IPOM 2007. LNCS, vol.\u00a04786, pp. 33\u201343. Springer, Heidelberg (2007)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"McLaughlin, M., Malone, P., Jennings, B.: A model for identity in digital ecosystems. In: Proceedings of the 3rd International Conference on Digital Ecosystems and Technologies (DEST), IEEE, Waterford Institute of Technology, Waterford, Ireland (2009)","DOI":"10.1109\/DEST.2009.5276727"},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-540-75211-0_9","volume-title":"Formal Methods and Stochastic Models for Performance Evaluation","author":"E.R.D. Mello","year":"2007","unstructured":"Mello, E.R.D., Moorsel, A.V., Silva, J.D.: Evaluation of P2P search algorithms for discovering trust paths. In: Wolter, K. (ed.) EPEW 2007. LNCS, vol.\u00a04748, pp. 112\u2013124. Springer, Heidelberg (2007)"},{"key":"13_CR23","unstructured":"Nachira, F.: Towards a network of digital business ecosystems fostering the local development. Tech. rep., Bruxelles (September 2002)"},{"key":"13_CR24","unstructured":"Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity, and identity management a consolidated proposal for terminology. version 0.26 (2005)"},{"issue":"1","key":"13_CR25","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10462-004-0041-5","volume":"24","author":"J. Sabater","year":"2005","unstructured":"Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review\u00a024(1), 33\u201360 (2005), http:\/\/dx.doi.org\/10.1007\/s10462-004-0041-5","journal-title":"Artificial Intelligence Review"},{"issue":"4","key":"13_CR26","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MIC.2007.95","volume":"11","author":"D. Weitzner","year":"2007","unstructured":"Weitzner, D.: Whose name is it, anyway? decentralized identity systems on the web. IEEE Internet Computing\u00a011(4), 72\u201376 (2007)","journal-title":"IEEE Internet Computing"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Ecosystems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14859-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,18]],"date-time":"2021-11-18T19:58:52Z","timestamp":1637265532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14859-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642148583","9783642148590"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14859-0_13","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}