{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:28:33Z","timestamp":1725593313992},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642221996"},{"type":"electronic","value":"9783642222009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22200-9_7","type":"book-chapter","created":{"date-parts":[[2011,6,25]],"date-time":"2011-06-25T23:52:53Z","timestamp":1309045973000},"page":"51-66","source":"Crossref","is-referenced-by-count":3,"title":["Composing Trust Models towards Interoperable Trust Management"],"prefix":"10.1007","author":[{"given":"Rachid","family":"Saadi","sequence":"first","affiliation":[]},{"given":"Mohammad Ashiqur","family":"Rahaman","sequence":"additional","affiliation":[]},{"given":"Val\u00e9rie","family":"Issarny","sequence":"additional","affiliation":[]},{"given":"Alessandra","family":"Toninelli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/283699.283739","volume-title":"NSPW: New Security Paradigms Workshop","author":"A. Abdul-Rahman","year":"1997","unstructured":"Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: NSPW: New Security Paradigms Workshop, pp. 48\u201360. ACM Press, New York (1997)"},{"doi-asserted-by":"crossref","unstructured":"Ahamed, S., Monjur, M., Islam, M.: CCTB: Context correlation for trust bootstrapping in pervasive environment. In: 2008 IET 4th International Conference on Intelligent Environments, pp. 1\u20138 (2008)","key":"7_CR2","DOI":"10.1109\/PST.2008.19"},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Transactions on Information and System Security\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1145\/1082473.1082551","volume-title":"Conference on Autonomous Agents and Multiagent Systems","author":"K. Fullam","year":"2005","unstructured":"Fullam, K., Klos, T., Muller, G., Sabater, J., Schlosser, A., Topol, Z., Barber, K., Rosenschein, J., Vercouter, L., Voss, M.: A specification of the Agent Reputation and Trust (ART) testbed. In: Conference on Autonomous Agents and Multiagent Systems, pp. 512\u2013518. ACM, New York (2005)"},{"issue":"4","key":"7_CR5","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T. Grandison","year":"2009","unstructured":"Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys & Tutorials\u00a03(4), 2\u201316 (2009)","journal-title":"IEEE Communications Surveys & Tutorials"},{"doi-asserted-by":"crossref","unstructured":"Haque, M., Ahamed, S.: An omnipresent formal trust model (FTM) for pervasive computing environment. In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, vol.\u00a01 (2007)","key":"7_CR6","DOI":"10.1109\/COMPSAC.2007.69"},{"key":"7_CR7","first-page":"59","volume-title":"APCCM: 2nd Asia-Pacific Conference on Conceptual Modelling","author":"A. J\u00f8sang","year":"2005","unstructured":"J\u00f8sang, A., Pope, S.: Semantic constraints for trust transitivity. In: APCCM: 2nd Asia-Pacific Conference on Conceptual Modelling, pp. 59\u201368. Australian Computer Society, Inc., Newcastle (2005)"},{"unstructured":"Jsang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference, pp. 17\u201319 (2002)","key":"7_CR8"},{"doi-asserted-by":"crossref","unstructured":"Kaffille, S., Wirtz, G.: Engineering Autonomous Trust-Management Requirements for Software Agents: Requirements and Concepts. Innovations and Advances in Computer Sciences and Engineering, 483\u2013489 (2010)","key":"7_CR9","DOI":"10.1007\/978-90-481-3658-2_85"},{"issue":"3","key":"7_CR10","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/245108.245123","volume":"40","author":"H. Kautz","year":"1997","unstructured":"Kautz, H., Selman, B., Shah, M.: Referral Web: combining social networks and collaborative filtering. Communications of the ACM\u00a040(3), 63\u201365 (1997)","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Kim, Y., Doh, K.: Trust Type based Semantic Web Services Assessment and Selection. In: Proceedings of ICACT, IEEE Computer, pp. 2048\u20132053 (2008)","key":"7_CR11","DOI":"10.1109\/ICACT.2008.4494190"},{"unstructured":"Marsh, S.: Formalising Trust as a Computational Concept. PhD thesis, University of Stirling, Scotland (1994)","key":"7_CR12"},{"unstructured":"Mui, L., Mohtashemi, M., Ang, C., Szolovits, P., Halberstadt, A.: Ratings in distributed systems: A bayesian approach. In: Proceedings of the Workshop on Information Technologies and Systems (WITS), pp. 1\u20137. Citeseer (2001)","key":"7_CR13"},{"doi-asserted-by":"crossref","unstructured":"Nurmi, P.: A bayesian framework for online reputation systems. In: International Conference on Internet and Web Applications and Services\/Advanced International Conference on AICT-ICIW 2006, p. 121 (February 2006)","key":"7_CR14","DOI":"10.1109\/AICT-ICIW.2006.2"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1109\/ICWS.2009.106","volume-title":"Proceedings of the 2009 IEEE International Conference on Web Services","author":"S. Paradesi","year":"2009","unstructured":"Paradesi, S., Doshi, P., Swaika, S.: Integrating Behavioral Trust in Web Service Compositions. In: Proceedings of the 2009 IEEE International Conference on Web Services, pp. 453\u2013460. IEEE Computer Society, Los Alamitos (2009)"},{"doi-asserted-by":"crossref","unstructured":"Quercia, D., Hailes, S., Capra, L.: TRULLO-local trust bootstrapping for ubiquitous devices. In: Proc. of IEEE Mobiquitous (2007)","key":"7_CR16","DOI":"10.1109\/MOBIQ.2007.4451015"},{"unstructured":"Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: IEEE Hawaii International Conference on System Sciences, p. 6007 (2000)","key":"7_CR17"},{"key":"7_CR18","volume-title":"ACM SAC: Trust, Reputation, Evidence and other Collaboration Know-how track","author":"R. Saadi","year":"2010","unstructured":"Saadi, R., Pierson, J.M., Brunie, L.: Establishing trust beliefs based on a uniform disposition to trust. In: ACM SAC: Trust, Reputation, Evidence and other Collaboration Know-how track. ACM Press, New York (2010)"},{"key":"7_CR19","first-page":"221","volume-title":"Software Architecture, WICSA 2004","author":"G. Suryanarayana","year":"2004","unstructured":"Suryanarayana, G., Erenkrantz, J., Hendrickson, S., Taylor, R.: PACE: an architectural style for trust management in decentralized applications. In: Software Architecture, WICSA 2004, pp. 221\u2013230. IEEE, Los Alamitos (2004)"},{"unstructured":"Suryanarayana, G., Taylor, R.: SIFT: A Simulation Framework for Analyzing Decentralized Reputation-based Trust Models. Technical Report UCI-ISR-07-5 (2007)","key":"7_CR20"},{"unstructured":"Vercouter, L., Casare, S., Sichman, J., Brandao, A.: An experience on reputation models interoperability based on a functional ontology. In: Proceedings of 20th International Joint Conference on Artificial Intelligence, IJCAI 2007 (2007)","key":"7_CR21"},{"issue":"3","key":"7_CR22","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.121508","volume":"25","author":"G. Wiederhold","year":"2002","unstructured":"Wiederhold, G.: Mediators in the architecture of future information systems. Computer\u00a025(3), 38\u201349 (2002)","journal-title":"Computer"},{"doi-asserted-by":"crossref","unstructured":"Zhou, R., Hwang, K., Cai, M.: Gossiptrust for fast reputation aggregation in peer-to-peer networks. IEEE Transactions on Knowledge and Data Engineering, 1282\u20131295 (2008)","key":"7_CR23","DOI":"10.1109\/TKDE.2008.48"},{"key":"7_CR24","volume-title":"The official PGP user\u2019s guide","author":"P.R. Zimmermann","year":"1995","unstructured":"Zimmermann, P.R.: The official PGP user\u2019s guide. MIT Press, Cambridge (1995)"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22200-9_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:06:49Z","timestamp":1606187209000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22200-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642221996","9783642222009"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22200-9_7","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}