{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:08:05Z","timestamp":1725808085568},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125671"},{"type":"electronic","value":"9783319125688"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38490-5_44","type":"book-chapter","created":{"date-parts":[[2013,6,20]],"date-time":"2013-06-20T08:50:35Z","timestamp":1371718235000},"page":"490-501","source":"Crossref","is-referenced-by-count":3,"title":["Towards Engineering Trust-Aware Future Internet Systems"],"prefix":"10.1007","author":[{"given":"Francisco","family":"Moyano","sequence":"first","affiliation":[]},{"given":"Carmen","family":"Fernandez","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","unstructured":"Initial version of two case studies, evaluating methodologies. NESSoS Deliverable 11.3 (October 2012)"},{"key":"44_CR2","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/SECPRI.1996.502679","volume-title":"Proceedings of the 1996 IEEE Symposium on Security and Privacy, SP 1996","author":"M. Blaze","year":"1996","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, SP 1996, pp. 164\u2013173. IEEE Computer Society, Washington, DC (1996)"},{"key":"44_CR3","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/1133058.1133067","volume-title":"Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, SACMAT 2006","author":"S. Chakraborty","year":"2006","unstructured":"Chakraborty, S., Ray, I.: Trustbac: integrating trust relationships into the rbac model for access control in open systems. In: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, SACMAT 2006, pp. 49\u201358. ACM, New York (2006)"},{"key":"44_CR4","volume-title":"Building Web Reputation Systems","author":"R. Farmer","year":"2010","unstructured":"Farmer, R., Glass, B.: Building Web Reputation Systems, 1st edn. Yahoo! Press, USA (2010)","edition":"1"},{"key":"44_CR5","unstructured":"Gambetta, D.: Can We Trust Trust? In: Trust: Making and Breaking Cooperative Relations, pp. 213\u2013237. Basil Blackwell (1988)"},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Grandison, T.: Trust management for internet applications. PhD thesis, University of London (July 2002)","DOI":"10.1007\/3-540-44875-6_7"},{"key":"44_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J. J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: Extending UML for Secure Systems Development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"key":"44_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"44_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12323-8","volume-title":"Model-Driven Risk Analysis - The CORAS Approach","author":"M.S. Lund","year":"2011","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis - The CORAS Approach. Springer, Heidelberg (2011)"},{"issue":"2","key":"44_CR10","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H. Mouratidis","year":"2007","unstructured":"Mouratidis, H., Giorgini, P.: Secure Tropos: a Security-Oriented Extension of the Tropos Methodology. International Journal of Software Engineering and Knowledge Engineering\u00a017(2), 285\u2013309 (2007)","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"key":"44_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-32287-7_8","volume-title":"Trust, Privacy and Security in Digital Business","author":"F. Moyano","year":"2012","unstructured":"Moyano, F., Fernandez-Gago, C., Lopez, J.: A Conceptual Framework for Trust Models. In: Fischer-H\u00fcbner, S., Katsikas, S., Quirchmayr, G. (eds.) TrustBus 2012. LNCS, vol.\u00a07449, pp. 93\u2013104. Springer, Heidelberg (2012)"},{"issue":"2","key":"44_CR12","first-page":"36","volume":"3","author":"M. Pavlidis","year":"2012","unstructured":"Pavlidis, M., Mouratidis, H., Islam, S.: Modelling Security Using Trust Based Concepts. IJSSE\u00a03(2), 36\u201353 (2012)","journal-title":"IJSSE"},{"issue":"1","key":"44_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0269888904000116","volume":"19","author":"S.D. Ramchurn","year":"2004","unstructured":"Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multi-agent systems. Knowl. Eng. Rev.\u00a019(1), 1\u201325 (2004)","journal-title":"Knowl. Eng. Rev."},{"key":"44_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/304851.304857","volume-title":"Proceedings of the 1996 Workshop on New Security Paradigms, NSPW 1996","author":"L. Rasmusson","year":"1996","unstructured":"Rasmusson, L., Jansson, S.: Simulated social control for secure internet commerce. In: Proceedings of the 1996 Workshop on New Security Paradigms, NSPW 1996, pp. 18\u201325. ACM, New York (1996)"},{"key":"44_CR15","unstructured":"Schneier, B.: Attack Trees: Modeling Security Threats. Dr. Dobb\u2019s Journal (1999)"},{"issue":"1","key":"44_CR16","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requir. Eng.\u00a010(1), 34\u201344 (2005)","journal-title":"Requir. Eng."},{"key":"44_CR17","doi-asserted-by":"crossref","unstructured":"Uddin, M.G., Zulkernine, M.: Umltrust: towards developing trust-aware software. In: Proceedings of the 2008 ACM Symposium on Applied Computing, SAC 2008, pp. 831\u2013836. ACM, New York (2008)","DOI":"10.1145\/1363686.1363875"},{"issue":"10","key":"44_CR18","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1109\/32.879820","volume":"26","author":"A. Lamsweerde van","year":"2000","unstructured":"van Lamsweerde, A., Letier, E.: Handling Obstacles in Goal-Oriented Requirements Engineering. IEEE Trans. Softw. Eng.\u00a026(10), 978\u20131005 (2000)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"44_CR19","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s12394-010-0058-7","volume":"3","author":"D. Rooy van","year":"2010","unstructured":"van Rooy, D., Bus, J.: Trust and privacy in the future internet - a research perspective. Identity in the Information Society\u00a03(2), 397\u2013404 (2010)","journal-title":"Identity in the Information Society"}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38490-5_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T05:46:26Z","timestamp":1557812786000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38490-5_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319125671","9783319125688"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38490-5_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}