{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:24:34Z","timestamp":1758273874793},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642246050"},{"type":"electronic","value":"9783642246067"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24606-7_9","type":"book-chapter","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T01:19:30Z","timestamp":1319505570000},"page":"104-117","source":"Crossref","is-referenced-by-count":5,"title":["Sociotechnical Trust: An Architectural Approach"],"prefix":"10.1007","author":[{"given":"Amit K.","family":"Chopra","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elda","family":"Paja","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Paolo","family":"Giorgini","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Credit card accountability responsibility and disclosure act of (2009), \n                    \n                      http:\/\/www.govtrack.us\/congress\/bill.xpd?bill=h111-627"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Asnar, Y., Giorgini, P., Massacci, F., Zannone, N.: From trust to dependability through risk analysis. In: Proceedings of the Second International Conference on Availability, Reliability and Security, pp. 19\u201326 (2007)","DOI":"10.1109\/ARES.2007.93"},{"issue":"3","key":"9_CR3","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/B:AGNT.0000018806.20944.ef","volume":"8","author":"P. Bresciani","year":"2004","unstructured":"Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Tropos: An agent-oriented software development methodology. Autonomous Agents and Multi-Agent Systems\u00a08(3), 203\u2013236 (2004)","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"issue":"3","key":"9_CR4","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1080\/10864415.2002.11044243","volume":"6","author":"C. Castelfranchi","year":"2002","unstructured":"Castelfranchi, C., Tan, Y.-H.: The role of trust and deception in virtual societies. International Journal of Electronic Commerce\u00a06(3), 55\u201370 (2002)","journal-title":"International Journal of Electronic Commerce"},{"key":"9_CR5","unstructured":"Standing Committee on The\u00a0Food Chain and Animal Health. Food law implementation guidelines. World Wide Web electronic publication, January 2010, Lastchecked (December 2010)"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-642-13094-6_10","volume-title":"Advanced Information Systems Engineering","author":"A.K. Chopra","year":"2010","unstructured":"Chopra, A.K., Dalpiaz, F., Giorgini, P., Mylopoulos, J.: Modeling and reasoning about service-oriented applications via goals and commitments. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol.\u00a06051, pp. 113\u2013128. Springer, Heidelberg (2010)"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-642-13094-6_10","volume-title":"Advanced Information Systems Engineering","author":"A.K. Chopra","year":"2010","unstructured":"Chopra, A.K., Dalpiaz, F., Giorgini, P., Mylopoulos, J.: Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol.\u00a06051, pp. 113\u2013128. Springer, Heidelberg (2010)"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-540-39878-3_9","volume-title":"Computer Safety, Reliability, and Security","author":"G. Dewsbury","year":"2003","unstructured":"Dewsbury, G., Sommerville, I., Clarke, K., Rouncefield, M.: A Dependability Model for Domestic Systems. In: Anderson, S., Felici, M., Littlewood, B. (eds.) SAFECOMP 2003. LNCS, vol.\u00a02788, pp. 103\u2013115. Springer, Heidelberg (2003)"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10207-006-0005-7","volume":"5","author":"P. Giorgini","year":"2006","unstructured":"Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Requirements engineering for trust management: Model, methodology, and reasoning. International Journal of Information Security\u00a05, 257\u2013274 (2006)","journal-title":"International Journal of Information Security"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/s00766-005-0023-4","volume":"11","author":"C. Haley","year":"2006","unstructured":"Haley, C., Laney, R., Moffett, J., Nuseibeh, B.: Using trust assumptions with security requirements. Requirements Engineering\u00a011, 138\u2013151 (2006)","journal-title":"Requirements Engineering"},{"issue":"12","key":"9_CR11","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/355112.355128","volume":"43","author":"S. Jones","year":"2000","unstructured":"Jones, S., Wilikens, M., Morris, P., Masera, M.: Trust requirements in e-business. Communications of the ACM\u00a043(12), 81\u201387 (2000)","journal-title":"Communications of the ACM"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Lipner, S.: The trustworthy computing security development lifecycle. In: Proceedings of the 20th Annual Computer Security Applications Conference, pp. 2\u201313 (December 2004)","DOI":"10.1109\/CSAC.2004.41"},{"issue":"9","key":"9_CR13","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MC.2010.247","volume":"43","author":"N.R. Mead","year":"2010","unstructured":"Mead, N.R., Jarzombek, J.: Advancing software assurance with public-private collaboration. IEEE Computer\u00a043(9), 21\u201330 (2010)","journal-title":"IEEE Computer"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-642-16373-9_7","volume-title":"Conceptual Modeling \u2013 ER 2010","author":"A. Siena","year":"2010","unstructured":"Siena, A., Armellin, G., Mameli, G., Mylopoulos, J., Perini, A., Susi, A.: Establishing regulatory compliance for information system requirements: An experience report from the health care domain. In: Parsons, J., Saeki, M., Shoval, P., Woo, C., Wand, Y. (eds.) ER 2010. LNCS, vol.\u00a06412, pp. 90\u2013103. Springer, Heidelberg (2010)"},{"issue":"11","key":"9_CR15","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MC.2009.347","volume":"42","author":"M.P. Singh","year":"2009","unstructured":"Singh, M.P., Chopra, A.K., Desai, N.: Commitment-based service-oriented architecture. Computer\u00a042(11), 72\u201379 (2009)","journal-title":"Computer"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1023\/A:1008319631231","volume":"7","author":"M.P. Singh","year":"1999","unstructured":"Singh, M.P.: An ontology for commitments in multiagent systems: Toward a unification of normative concepts. Artificial Intelligence and Law\u00a07, 97\u2013113 (1999)","journal-title":"Artificial Intelligence and Law"},{"key":"9_CR17","unstructured":"Singh, M.P.: Trust as a basis for social computing (2010), \n                    \n                      http:\/\/www.csc.ncsu.edu\/faculty\/mpsingh\/papers\/positions\/Trust-formal-architecture-talk.pdf"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Strens, R., Dobson, J.: How responsibility modelling leads to security requirements. In: Proceedings of the New Security Paradigms Workshop, pp. 143\u2013149 (1993)","DOI":"10.1145\/283751.283828"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-540-39800-4_2","volume-title":"Formal Methods for Software Architectures","author":"A. Lamsweerde van","year":"2003","unstructured":"van Lamsweerde, A.: From system goals to software architecture. In: Bernardo, M., Inverardi, P. (eds.) SFM 2003. LNCS, vol.\u00a02804, pp. 25\u201343. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling \u2013 ER 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24606-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T02:21:20Z","timestamp":1555208480000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24606-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642246050","9783642246067"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24606-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}