{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:34:31Z","timestamp":1725593671948},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223648"},{"type":"electronic","value":"9783642223655"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22365-5_19","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T02:07:06Z","timestamp":1309226826000},"page":"156-165","source":"Crossref","is-referenced-by-count":0,"title":["Enhancement of Critical Financial Infrastructure Protection Using Trust Management"],"prefix":"10.1007","author":[{"given":"Hisain","family":"Elshaafi","sequence":"first","affiliation":[]},{"given":"Jimmy","family":"McGibney","sequence":"additional","affiliation":[]},{"given":"Barry","family":"Mulcahy","sequence":"additional","affiliation":[]},{"given":"Dmitri","family":"Botvich","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"CoMiFin (Communication Middleware for Monitoring Financial Critical Infrastructures), \n                  \n                    http:\/\/www.comifin.eu","key":"19_CR1"},{"doi-asserted-by":"crossref","unstructured":"Lodi, G., Querzoni, L., Baldoni, R., Marchetti, M., Colajanni, M., Bortnikov, V., Chockler, G., Dekel, E., Laventman, G., Roytman, A.: Defending Financial Infrastructures Through Early Warning Systems: The Intelligence Cloud Approach. In: Proc. 5th Annual Workshop on Cyber Security and Information Intelligence Research, Knoxville, TN, USA (2009)","key":"19_CR2","DOI":"10.1145\/1558607.1558628"},{"doi-asserted-by":"crossref","unstructured":"McGibney, J., Botvich, D.: A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam. In: Proc. 2nd Int. Conf. on Availability, Reliability, and Security (ARES), Vienna, pp. 749\u2013756 (2007)","key":"19_CR3","DOI":"10.1109\/ARES.2007.28"},{"unstructured":"Drools, \n                  \n                    http:\/\/www.jboss.org\/drools","key":"19_CR4"},{"issue":"2","key":"19_CR5","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10458-005-6825-4","volume":"13","author":"T. Huynh","year":"2006","unstructured":"Huynh, T., Jennings, N., Shadbolt, N.: An integrated trust and reputation model for open multi-agent systems. Journal of Autonomous Agents and Multi-Agent Systems\u00a013(2), 119\u2013154 (2006)","journal-title":"Journal of Autonomous Agents and Multi-Agent Systems"},{"issue":"7","key":"19_CR6","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L. Xiong","year":"2004","unstructured":"Xiong, L., Liu, L.: PeerTrust: Supporting Reputation-based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions on Knowledge and Data Engineering (TKDE)\u00a016(7), 843\u2013857 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering (TKDE)"},{"unstructured":"Singh, M.P.: Trustworthy service composition: Challenges and research questions. In: Proc. of the Autonomous Agents and Multi-Agent Systems, Workshop on Deception, Fraud and Trust in Agent Societies, pp. 117\u2013135 (2002)","key":"19_CR7"},{"issue":"4","key":"19_CR8","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/s00778-009-0138-1","volume":"18","author":"Z. Malik","year":"2009","unstructured":"Malik, Z., Bouguettaya, A.: RATEWeb: Reputation Assessment for Trust Establishment among Web services. The Int. Journal on Very Large Data Bases\u00a018(4), 885\u2013911 (2009)","journal-title":"The Int. Journal on Very Large Data Bases"},{"issue":"2","key":"19_CR9","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1111\/j.1467-6451.2007.00309.x","volume":"55","author":"D. Reiley","year":"2007","unstructured":"Reiley, D., Bryan, D., Prasad, N., Reeves, D.: Pennies from Ebay: The Determinants of Price in Online Auctions. Journal of Industrial Economics\u00a055(2), 223\u2013233 (2007)","journal-title":"Journal of Industrial Economics"},{"doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Keromytis, A.: KeyNote: Trust Management for Public-Key Infrastructures. In: Security Protocols Int. Workshop, Cambridge, England, pp. 56\u201363 (1998)","key":"19_CR10","DOI":"10.1007\/3-540-49135-X_9"},{"unstructured":"Sabater, J.: Trust and reputation for agent societies. Departament d\u2019Inform\u00e1tica, Universitat Aut\u00f3noma de Barcelona (UAB), Ph.D. Thesis (2002)","key":"19_CR11"}],"container-title":["Communications in Computer and Information Science","Secure and Trust Computing, Data Management, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22365-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T13:38:39Z","timestamp":1553866719000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22365-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223648","9783642223655"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22365-5_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}