{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:23:23Z","timestamp":1725791003037},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642550317"},{"type":"electronic","value":"9783642550324"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55032-4_54","type":"book-chapter","created":{"date-parts":[[2014,3,25]],"date-time":"2014-03-25T02:15:38Z","timestamp":1395713738000},"page":"526-531","source":"Crossref","is-referenced-by-count":1,"title":["On the Modelling of the Computer Security Impact on the Reputation Systems"],"prefix":"10.1007","author":[{"given":"Bogdan","family":"Ksiezopolski","sequence":"first","affiliation":[]},{"given":"Adam","family":"Wierzbicki","sequence":"additional","affiliation":[]},{"given":"Damian","family":"Rusinek","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","doi-asserted-by":"crossref","unstructured":"Hoffman, K., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. Journal ACM Computing Surveys\u00a042(1) (2009)","DOI":"10.1145\/1592451.1592452"},{"key":"54_CR2","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.cose.2006.11.002","volume":"26","author":"B. Ksiezopolski","year":"2007","unstructured":"Ksiezopolski, B., Kotulski, Z.: Adaptable security mechanism for the dynamic environments. Computers & Security\u00a026, 246\u2013255 (2007)","journal-title":"Computers & Security"},{"key":"54_CR3","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-642-02671-3_28","volume-title":"Computer Networks","author":"B. Ksiezopolski","year":"2009","unstructured":"Ksiezopolski, B., Kotulski, Z., Szalachowski, P.: Adaptive approach to network security. In: Kwiecie\u0144, A., Gaj, P., Stera, P. (eds.) CN 2009. CCIS, vol.\u00a039, pp. 233\u2013241. Springer, Heidelberg (2009)"},{"issue":"4","key":"54_CR4","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1016\/j.cose.2012.01.006","volume":"31","author":"B. Ksiezopolski","year":"2012","unstructured":"Ksiezopolski, B.: QoP-ML: Quality of Protection modelling language for cryptographic protocols. Computers & Security\u00a031(4), 569\u2013596 (2012)","journal-title":"Computers & Security"},{"key":"54_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/978-3-642-36818-9_27","volume-title":"Information and Communication Technology","author":"B. Ksiezopolski","year":"2013","unstructured":"Ksiezopolski, B., Rusinek, D., Wierzbicki, A.: On the efficiency modelling of cryptographic protocols by means of the Quality of Protection Modelling Language (QoP-ML). In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol.\u00a07804, pp. 261\u2013270. Springer, Heidelberg (2013)"},{"key":"54_CR6","unstructured":"Schlosser, A., Voss, M., Brckner, L.: On the Simulation of Global Reputation Systems. Journal of Artificial Societies and Social Simulation\u00a09(1) (2006)"},{"key":"54_CR7","unstructured":"The web page of QoP-ML project; link to the AQoPA tool: \n                      \n                        http:\/\/qopml.org\/"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55032-4_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T08:39:33Z","timestamp":1558859973000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55032-4_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642550317","9783642550324"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55032-4_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}