{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:26:29Z","timestamp":1743049589966,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662453902"},{"type":"electronic","value":"9783662453919"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45391-9_44","type":"book-chapter","created":{"date-parts":[[2014,10,10]],"date-time":"2014-10-10T00:01:44Z","timestamp":1412899304000},"page":"518-526","source":"Crossref","is-referenced-by-count":0,"title":["Semantics-Based Approach for Dynamic Evolution of Trust Negotiation Protocols in Cloud Collaboration"],"prefix":"10.1007","author":[{"given":"Seung Hwan","family":"Ryu","sequence":"first","affiliation":[]},{"given":"Abdelkarim","family":"Erradi","sequence":"additional","affiliation":[]},{"given":"Khaled M.","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Saleh","family":"Alhazbi","sequence":"additional","affiliation":[]},{"given":"Boualem","family":"Benatallah","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"44_CR1","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1109\/TSC.2011.39","volume":"5","author":"K. Chard","year":"2012","unstructured":"Chard, K., Bubendorfer, K., Caton, S., Rana, O.F.: Social cloud computing: A vision for socially motivated resource sharing. IEEE T. Services Computing\u00a05(4), 551\u2013563 (2012)","journal-title":"IEEE T. Services Computing"},{"key":"44_CR2","doi-asserted-by":"crossref","unstructured":"Lee, A.J., Winslett, M., Basney, J., Welch, V.: The traust authorization service. ACM Trans. Inf. Syst. Secur.\u00a011(1) (2008)","DOI":"10.1145\/1330295.1330297"},{"issue":"1","key":"44_CR3","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/2522968.2522980","volume":"46","author":"T.H. Noor","year":"2013","unstructured":"Noor, T.H., Sheng, Q.Z., Zeadally, S., Yu, J.: Trust management of services in cloud environments: Obstacles and solutions. ACM Comput. Surv.\u00a046(1), 12 (2013)","journal-title":"ACM Comput. Surv."},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Ryu, S.H., Casati, F., Skogsrud, H., Benatallah, B., Saint-Paul, R.: Supporting the dynamic evolution of web service protocols in service-oriented architectures. ACM Transactions on the Web\u00a02(2) (2008)","DOI":"10.1145\/1346337.1346241"},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"Skogsrud, H., Benatallah, B., Casati, F., Toumani, F.: Managing impacts of security protocol changes in service-oriented applications. In: ICSE (2007)","DOI":"10.1109\/ICSE.2007.49"},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Skogsrud, H., Nezhad, H.R.M., Benatallah, B., Casati, F.: Modeling trust negotiation for web services. IEEE Computer\u00a042(2) (2009)","DOI":"10.1109\/MC.2009.56"},{"issue":"2","key":"44_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/2180861.2180863","volume":"6","author":"S.D.C. Vimercati di","year":"2012","unstructured":"di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Psaila, G., Samarati, P.: Integrating trust management and access control in data-intensive web applications. TWEB\u00a06(2), 6 (2012)","journal-title":"TWEB"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45391-9_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T20:07:23Z","timestamp":1572120443000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-45391-9_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662453902","9783662453919"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45391-9_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}