{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:21:48Z","timestamp":1743006108678,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642173479"},{"type":"electronic","value":"9783642173486"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-17348-6_15","type":"book-chapter","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T11:53:32Z","timestamp":1315828412000},"page":"379-403","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Trust Management"],"prefix":"10.1007","author":[{"given":"Jean-Marc","family":"Seigneur","sequence":"first","affiliation":[]},{"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[]},{"given":"Bob","family":"Hulsebosch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"15_CR1","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MSP.2006.101","volume":"4","author":"S.M. Belovin","year":"2006","unstructured":"Belovin, S.M.: On the brittleness of software and the infeasibility of secure metric. IEEE Secur. Priv. 4(4), 96 (2006)","journal-title":"IEEE Secur. Priv."},{"key":"15_CR2","volume-title":"Access Control Systems: Security, Identity Management and Trust Models","author":"M. Benantar","year":"2006","unstructured":"Benantar, M.: Access Control Systems: Security, Identity Management and Trust Models. Springer, Berlin (2006)"},{"issue":"1","key":"15_CR3","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10619-005-1075-7","volume":"18","author":"R. Bhatti","year":"2005","unstructured":"Bhatti, R., Bertino, E., Ghafoor, A.: A trust-based context-aware access control model for web-services. Distrib. Parallel Databases 18(1), 83\u2013105 (2005)","journal-title":"Distrib. Parallel Databases"},{"key":"15_CR4","volume-title":"Proceedings of the Semantic Web and Policy Workshop","author":"C. Bizer","year":"2005","unstructured":"Bizer, C., Cyganiak, R., Gauss, T., Maresh, O.: The TriQL.P browser: filtering information using context, content and rating-based trust policies. In: Proceedings of the Semantic Web and Policy Workshop (2005)"},{"key":"15_CR5","volume-title":"Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems","author":"S. Buchegger","year":"2004","unstructured":"Buchegger, S., Boudec, J.L.: A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems (2004)"},{"key":"15_CR6","volume-title":"First International Workshop on Multimedia Intelligent Storage and Retrieval Management","author":"P. Castro","year":"1999","unstructured":"Castro, P.: Using context to assist in multimedia object retrieval. In: First International Workshop on Multimedia Intelligent Storage and Retrieval Management (1999). citeseer.ist.psu.edu\/article\/castro99using.html"},{"issue":"1","key":"15_CR7","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1147\/sj.421.0107","volume":"42","author":"D.M. Chess","year":"2003","unstructured":"Chess, D.M., Palmer, C.C., White, R.S.: Security in an autonomic computing environment. IBM Syst. J. 42(1), 107\u2013118 (2003)","journal-title":"IBM Syst. J."},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1007\/978-3-540-30108-0_17","volume-title":"Proc. of the 9th European Symposium on Research in Computer Security","author":"M.J. Covington","year":"2004","unstructured":"Covington, M.J., Ahamad, M., Essa, I., Venkateswaran, H.: Parameterized authentication. In: Samarati, P., Rayan, P., Gollmann, D., Molva, R. (eds.) Proc. of the 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, 13\u201315 September 2004. Lecture Notes in Computer Science, vol. 3193, pp. 276\u2013292. Springer, Berlin (2004)"},{"doi-asserted-by":"crossref","unstructured":"Dey, A.K., Abowd, G.D.: Towards a better understanding of context and context-awareness. Tech. Rep., Georgia Institute of Technology, College of Computing (1999). http:\/\/citeseer.ist.psu.edu\/context\/1190105\/0","key":"15_CR9","DOI":"10.1007\/3-540-48157-5_29"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/11429760_25","volume-title":"Trust Management","author":"N. Dimmock","year":"2005","unstructured":"Dimmock, N., Bacon, J., Ingram, D., Moody, K.: Risk models for trust-based access control(tbac). In: Trust Management. Lecture Notes in Computer Science, vol. 3477, pp. 364\u2013371. Springer, Berlin (2005)"},{"unstructured":"Ganger, G.R.: Authentication confidences. Tech. Rep. CMU-CS-01-23, Carnegie Mellon University, School of Computer Science (2001)","key":"15_CR11"},{"key":"15_CR12","series-title":"LNCS","volume-title":"Proceedings of the 3rd International Semantic Web Conference","author":"J. Golbeck","year":"2004","unstructured":"Golbeck, J., Parsia, B.: Trusting claims from trusted sources: trust network based filtering of aggregated claims. In: Proceedings of the 3rd International Semantic Web Conference. LNCS, vol. 3298. Springer, Berlin (2004). http:\/\/www.mindswap.org\/papers\/Jen-ISWC04.pdf"},{"unstructured":"Guha, R.: Open rating systems. Techn. Rep., Stanford University (2004)","key":"15_CR13"},{"unstructured":"http:\/\/www.freeband.nl","key":"15_CR14"},{"unstructured":"Hulsebosch, R.J., Bargh, M.S., Lenzini, G., Ebben, P.W.G., Jacob, S.M.: Context sensitive adaptive authentication. In: Proc. of the 2nd European Conference on Smart Sensing and Context, Kendal, UK, 23\u201325 October 2007. Lecture Notes in Computer Science, Springer, Berlin (2007, to appear)","key":"15_CR15"},{"issue":"1","key":"15_CR16","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"A.K. Jain","year":"2004","unstructured":"Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4\u201320 (2004). http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=1262027","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"15_CR17","volume-title":"Proceedings of the New Security Paradigms Workshop","author":"A. J\u00f8sang","year":"1996","unstructured":"J\u00f8sang, A.: The right type of trust for distributed systems. In: Proceedings of the New Security Paradigms Workshop. ACM, New York (1996). http:\/\/citeseer.nj.nec.com\/47043.html"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1007\/BFb0055873","volume-title":"Proc. of the 5th European Symposium on Research in Computer Security (ESORICS 98)","author":"A. J\u00f8sang","year":"1998","unstructured":"J\u00f8sang, A.: A subjective metric of authentication. In: Quisquater, J.J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) Proc. of the 5th European Symposium on Research in Computer Security (ESORICS 98), Louvain-la-Neuve, Belgium, 16\u201318 September 1998. Lecture Notes in Computer Science, vol. 1485, pp. 329\u2013344. Springer, Berlin (1998)"},{"issue":"3","key":"15_CR19","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A. J\u00f8sang","year":"2001","unstructured":"J\u00f8sang, A.: A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 9(3), 279\u2013312 (2001)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"unstructured":"Krukow, K.: Towards a theory of trust for the global ubiquitous computer. Ph.D. thesis, Dept. of Computer Science, Univ. of Aarhus, Denmark (2006)","key":"15_CR20"},{"unstructured":"Lenzini, G., Hulsebosch, R.J., Bargh, M.S.: Trust-enhanced security in location-based adaptive authentication. In: Proc. of the ESORICS 3rd International Workshop on Security and Trust Management (STM 07), Dresden, Germany, 27 September 2007. Electronic Notes in Theoretical Computer Science. Elsevier, Amsterdam (2007, to appear)","key":"15_CR21"},{"key":"15_CR22","volume-title":"Quality of Security Service: Adaptive Security. Handbook of Information Security. Threats, Vulnerabilities, Prevention, Detection and Management","author":"T.E. Levin","year":"2005","unstructured":"Levin, T.E., Irvine, C.E., Spyropoulou, E.: Quality of Security Service: Adaptive Security. Handbook of Information Security. Threats, Vulnerabilities, Prevention, Detection and Management, vol.\u00a0III. Wiley, New York (2005)"},{"key":"15_CR23","first-page":"23","volume-title":"Proc. of the Int. Workshop on Requirements High Assurance Systems (RHAS)","author":"L. Marcus","year":"2003","unstructured":"Marcus, L.: Local and global requirements in an adaptive security infrastructure. In: Proc. of the Int. Workshop on Requirements High Assurance Systems (RHAS), Monterey Bay, CA, USA, 9 Sept. 2003, pp. 23\u201329. Carnegie Mellon University Press, Pittsburg (2003)"},{"unstructured":"Marsh, S.: Formalising trust as a computational concept. Ph.D. dissertation, University of Stirling, Department of Mathematics and Computer Science (1994). http:\/\/citeseer.nj.nec.com\/marsh94formalising.html","key":"15_CR24"},{"key":"15_CR25","volume-title":"Proceedings of EuroPKI","author":"N. Mezzetti","year":"2004","unstructured":"Mezzetti, N.: A socially inspired reputation model. In: Proceedings of EuroPKI (2004)"},{"key":"15_CR26","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MASSUR.2005.1507050","volume-title":"Proc. of the 2nd IEEE Symposium on Multi-Agent Security and Survivability (MAS&S 2005)","author":"R. Montanari","year":"2005","unstructured":"Montanari, R., Toninelli, A., Bradshaw, J.M.: Context-based security management for multi-agent systems. In: Proc. of the 2nd IEEE Symposium on Multi-Agent Security and Survivability (MAS&S 2005), 30\u201331 Aug. 2005, Philadelphia, USA, pp. 75\u201384. IEEE Computer Society, Los Alamitos (2005)"},{"key":"15_CR27","series-title":"Lecture Notes in Artificial Intelligence","first-page":"204","volume-title":"Proc. of the 4th Int. and Interdisciplinary Conference on Modeling and Using Context (CONTEXT 2003)","author":"G.K. Most\u00e9faoui","year":"2003","unstructured":"Most\u00e9faoui, G.K., Br\u00e9zillon, P.: A generic framework for context-based distributed authorizations. In: Proc. of the 4th Int. and Interdisciplinary Conference on Modeling and Using Context (CONTEXT 2003), 23\u201325 June 2003, Stanford, CA, USA. Lecture Notes in Artificial Intelligence, vol. 2680, pp. 204\u2013217. Springer, Berlin (2003)"},{"key":"15_CR28","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/1133373.1133377","volume-title":"Proc. of the 10th ACM SIGOPS European Workshop: Beyond the PC","author":"B. Noble","year":"2002","unstructured":"Noble, B., Corner, M.: The case for transient authentication. In: Proc. of the 10th ACM SIGOPS European Workshop: Beyond the PC, Saint-Emillion, France, September 2002, pp.\u00a024\u201329. ACM, New York (2002)"},{"unstructured":"Presti, S.L., Cusack, M., Booth, C.: Trust issues in pervasive environments. Techn. Rep., University of Southampton (2003)","key":"15_CR29"},{"unstructured":"Rahman, A.F.: A framework for decentralised trust reasoning. Ph.D. dissertation, University of London (2005)","key":"15_CR30"},{"issue":"2","key":"15_CR31","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MPRV.2004.1316821","volume":"3","author":"A. Ranganathan","year":"2004","unstructured":"Ranganathan, A., Al-Muhtadi, J., Campbell, R.H.: Reasoning about uncertain contexts in pervasive computing environments. Pervasive Comput. 3(2), 62\u201370 (2004)","journal-title":"Pervasive Comput."},{"key":"15_CR32","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/1063979.1064004","volume-title":"Proc. of the 10th ACM Symposium on Access Control Models and Technologies (SACMAT05)","author":"T. Ryutov","year":"2005","unstructured":"Ryutov, T., Zhou, L., Neuman, C., Leithead, T., Seamons, K.E.: Adaptive trust negotiation and access control. In: Proc. of the 10th ACM Symposium on Access Control Models and Technologies (SACMAT05), 1\u20133 June 2005, Stockholm, Sweden, pp. 139\u2013146. ACM, New York (2005)"},{"doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., Samarati, P.: Access control: principles and practise. IEEE Commun. Mag. 9(32) (1994)","key":"15_CR33","DOI":"10.1109\/35.312842"},{"doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29 (1996)","key":"15_CR34","DOI":"10.1109\/2.485845"},{"key":"15_CR35","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/IWQOS.1998.675229","volume-title":"Proc. of the 6th IEEE\/IFIP Int. Workshop on Quality of Service (IWQoS 98)","author":"P.A. Schneck","year":"1998","unstructured":"Schneck, P.A., Schwan, K.: Dynamic authentication for high-performance networked applications. In: Proc. of the 6th IEEE\/IFIP Int. Workshop on Quality of Service (IWQoS 98), Napa, CA, USA, 18\u201320 May 1998, pp. 127\u2013136. IEEE Computer Society, Los Alamitos (1998)"},{"unstructured":"Seigneur, J.M.: Trust, security and privacy in global computing. Ph.D. dissertation, Trinity College Dublin (2005)","key":"15_CR36"},{"key":"15_CR37","volume-title":"IEEE Computer Vision and Pattern Recognition","author":"G. Shakhnarovich","year":"2001","unstructured":"Shakhnarovich, G., Lee, L., Darrell, T.: Integrated face and gait recognition from multiple views. In: IEEE Computer Vision and Pattern Recognition (2001). citeseer.ist.psu.edu\/shakhnarovich01integrated.html"},{"key":"15_CR38","volume-title":"Proc. of the Models of Trust for the Web Workshop (MTW\u201906), held with the 15th International World Wide Web Conference (WWW2006), 22 May 2006, Edinburgh, Scotland, CEUR Workshop Proceedings, CEUR-WS","author":"S. Toivonen","year":"2006","unstructured":"Toivonen, S., Lenzini, G., Uusitalo, I.: Context-aware trust evaluation functions for dynamic reconfigurable systems. In: Proc. of the Models of Trust for the Web Workshop (MTW\u201906), held with the 15th International World Wide Web Conference (WWW2006), 22 May 2006, Edinburgh, Scotland, CEUR Workshop Proceedings, CEUR-WS (2006)"},{"key":"15_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1007\/11926078_34","volume-title":"Proc. of the Fifth International Semantic Web Conference (ISWC)","author":"A. Toninelli","year":"2006","unstructured":"Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: A semantic context-aware access control framework for secure collaborations in pervasive computing environments. In: Proc. of the Fifth International Semantic Web Conference (ISWC), Athens, GA, 5\u20139 Nov. 2006. Lecture Notes in Computer Science, vol. 4273, pp. 473\u2013486. Springer, Berlin (2006)"},{"unstructured":"Ver\u00edssimo, P.E., Neves, N.F., Correia, M.P.: Intrusion-tolerant architectures: concepts and design. In: Architecting Dependable Systems. citeseer.ist.psu.edu\/561906.html","key":"15_CR40"},{"unstructured":"Viswanathan, P.: Security architecture in gaia. Techn. Rep. 2215, Urbana, Illinois (2001). citeseer.ist.psu.edu\/viswanathan01security.html","key":"15_CR41"},{"unstructured":"Weiser, M., Brown, J.S.: Designing calm technology. Techn. Rep., Xerox PARC (1995). http:\/\/nano.xerox.com\/hypertext\/weiser\/calmtech\/calmtech.htm","key":"15_CR42"},{"key":"15_CR43","first-page":"907","volume-title":"Proc. of 20th IEEE Instrumentation and Measurement Technology Conference (IMTC 2003)","author":"H. Wu","year":"2003","unstructured":"Wu, H., Siegel, M., Ablay, S.: Sensor fusion using Dempster\u2013Shafer theory II: static weighting and Kalman filter-like dynamic weighting. In: Proc. of 20th IEEE Instrumentation and Measurement Technology Conference (IMTC 2003), 20\u201322 May 2003, Vail, CO, USA, vol.\u00a02, pp.\u00a0907\u2013912. IEEE Computer Society, Los Alamitos (2003)"},{"key":"15_CR44","volume-title":"Proc. of the 2005 IFIP International Conference on Intelligence in Communication Systems","author":"G. Yee","year":"2005","unstructured":"Yee, G., Korba, L.: Context-aware security policy agent for mobile Internet services. In: Proc. of the 2005 IFIP International Conference on Intelligence in Communication Systems, Montr\u00e9al, Qu\u00e9bec, Canada, 17\u201319 October 2005"}],"container-title":["Natural Computing Series","Self-organising Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17348-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T13:31:15Z","timestamp":1674826275000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-17348-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642173479","9783642173486"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17348-6_15","relation":{},"ISSN":["1619-7127"],"issn-type":[{"type":"print","value":"1619-7127"}],"subject":[],"published":{"date-parts":[[2011]]}}}