{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:23:29Z","timestamp":1725621809682},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642248634"},{"type":"electronic","value":"9783642248641"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24864-1_9","type":"book-chapter","created":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T16:34:47Z","timestamp":1318869287000},"page":"125-135","source":"Crossref","is-referenced-by-count":0,"title":["An Evidence-Based Trust Assessment Framework for Critical Infrastructure Decision Making"],"prefix":"10.1007","author":[{"given":"Yujue","family":"Wang","sequence":"first","affiliation":[]},{"given":"Carl","family":"Hauser","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/283699.283739","volume-title":"Proceedings of the New Security Paradigms Workshop","author":"A. Abdul-Rahman","year":"1997","unstructured":"A. Abdul-Rahman and S. Hailes, A distributed trust model, Proceedings of the New Security Paradigms Workshop, pp. 48\u201360, 1997."},{"key":"9_CR2","volume-title":"Proceedings of the Thirty-Third Annual Hawaii International Conference on System Sciences","author":"A. Abdul-Rahman","year":"2000","unstructured":"A. Abdul-Rahman and S. Hailes, Supporting trust in virtual communities, Proceedings of the Thirty-Third Annual Hawaii International Conference on System Sciences, vol. 6, 2000."},{"key":"9_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-4286-2","volume-title":"Statistical Decision Theory and Bayesian Analysis","author":"J. Berger","year":"1985","unstructured":"J. Berger, Statistical Decision Theory and Bayesian Analysis, Springer, New York, 1985."},{"key":"9_CR4","first-page":"59","volume-title":"Proceedings of the Sixth International Workshop on Security Protocols","author":"M. Blaze","year":"1998","unstructured":"M. Blaze, J. Feigenbaum and A. Keromytis, KeyNote: Trust management for public-key infrastructures, Proceedings of the Sixth International Workshop on Security Protocols, pp. 59\u201363, 1998."},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/3-540-48749-2_8","volume-title":"Secure Internet Programming","author":"M. Blaze","year":"1999","unstructured":"M. Blaze, J. Feigenbaum, and A. Keromytis, The role of trust management in distributed systems security, in Secure Internet Programming (LNCS 1603), J. Vitek and C. Jensen (Eds.), Springer, Berlin, Germany, pp. 185\u2013210, 1999."},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/11537878_17","volume-title":"Proceedings of the Second International Conference on Trust, Privacy and Security in Digital Business","author":"E. Chang","year":"2005","unstructured":"E. Chang, P. Thomson, T. Dillon and F. Hussain, The fuzzy and dynamic nature of trust, Proceedings of the Second International Conference on Trust, Privacy and Security in Digital Business, pp. 161\u2013174, 2005."},{"key":"9_CR7","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/3-540-62494-5_16","volume-title":"Proceedings of the International Workshop on Security Protocols","author":"B. Christianson","year":"1997","unstructured":"B. Christianson and W. Harbison, Why isn\u2019t trust transitive? Proceedings of the International Workshop on Security Protocols, pp. 171\u2013176, 1997."},{"issue":"8\u201313","key":"9_CR8","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1016\/S0169-7552(97)00009-3","volume":"29","author":"Y. Chu","year":"1997","unstructured":"Y. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick and M. Strauss, REFEREE: Trust management for web applications, Computer Networks and ISDN Systems, vol. 29(8\u201313), pp. 953\u2013964, 1997.","journal-title":"Computer Networks and ISDN Systems"},{"key":"9_CR9","first-page":"891","volume-title":"Proceedings of the Eighteenth International Conference on the World Wide Web","author":"W. Conner","year":"2009","unstructured":"W. Conner, A. Iyengar, T. Mikalsen, I. Rouvellou and K. Nahrstedt, A trust management framework for service-oriented environments, Proceedings of the Eighteenth International Conference on the World Wide Web, pp. 891\u2013900, 2009."},{"issue":"3","key":"9_CR10","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.comcom.2010.01.023","volume":"34","author":"M. Denko","year":"2011","unstructured":"M. Denko, T. Sun and I. Woungang, Trust management in ubiquitous computing: A Bayesian approach, Computer Communications, vol. 34(3), pp. 398\u2013406, 2011.","journal-title":"Computer Communications"},{"key":"9_CR11","volume-title":"Decision Theory: An Introduction to the Mathematics of Rationality","author":"S. French","year":"1986","unstructured":"S. French, Decision Theory: An Introduction to the Mathematics of Rationality, Ellis Horwood, New York, 1986."},{"issue":"2","key":"9_CR12","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. Josang","year":"2007","unstructured":"A. Josang, R. Ismail and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol. 43(2), pp. 618\u2013644, 2007.","journal-title":"Decision Support Systems"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1145\/775152.775242","volume-title":"Proceedings of the Twelfth International Conference on the World Wide Web","author":"S. Kamvar","year":"2003","unstructured":"S. Kamvar, M. Schlosser and H. Garcia-Molina, The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the Twelfth International Conference on the World Wide Web, pp. 640\u2013651, 2003."},{"key":"9_CR14","first-page":"21","volume-title":"Proceedings of the Sixteenth ACM Conference on Computer and Communications Security","author":"Y. Liu","year":"2009","unstructured":"Y. Liu, P. Ning and M. Reiter, False data injection attacks against state estimation in electric power grids, Proceedings of the Sixteenth ACM Conference on Computer and Communications Security, pp. 21\u201332, 2009."},{"key":"9_CR15","unstructured":"North American Electric Reliability Corporation, Cyber Security Standards CIP-002-4 through CIP-009-4, Washington, DC (www.nerc.com\/pa ge.php?cid=2|20), 2011."},{"key":"9_CR16","first-page":"31","volume-title":"Bayesian Statistics and Quality Modeling in the Agro-Food Production Chain","author":"A. O\u2019Hagan","year":"2004","unstructured":"A. O\u2019Hagan, Bayesian statistics: Principles and benefits, in Bayesian Statistics and Quality Modeling in the Agro-Food Production Chain, Volume 3, M. van Boekel, A. Stein and A. van Bruggen (Eds.), Springer, Berlin, Germany, pp. 31\u201345, 2004."},{"key":"9_CR17","volume-title":"Introduction to Statistical Decision Theory","author":"J. Pratt","year":"1995","unstructured":"J. Pratt, H. Raiffa and R. Schlaifer, Introduction to Statistical Decision Theory, MIT Press, Cambridge, Massachusetts, 1995."},{"key":"9_CR18","first-page":"18","volume-title":"Proceedings of the New Security Paradigms Workshop","author":"L. Rasmusson","year":"1996","unstructured":"L. Rasmusson and S. Jansson, Simulated social control for secure Internet commerce, Proceedings of the New Security Paradigms Workshop, pp. 18\u201325, 1996."},{"key":"9_CR19","volume-title":"The Bayesian Choice: From Decision-Theoretic Foundations to Computational Implementation","author":"C. Robert","year":"2007","unstructured":"C. Robert, The Bayesian Choice: From Decision-Theoretic Foundations to Computational Implementation, Springer, New York, 2007."}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24864-1_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T11:40:40Z","timestamp":1620042040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24864-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642248634","9783642248641"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24864-1_9","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}