{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:32:42Z","timestamp":1743143562492,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662459164"},{"type":"electronic","value":"9783662459171"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-45917-1_12","type":"book-chapter","created":{"date-parts":[[2014,12,22]],"date-time":"2014-12-22T14:34:17Z","timestamp":1419258857000},"page":"176-191","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Trust-Based Enforcement of Security Policies"],"prefix":"10.1007","author":[{"given":"Roberto","family":"Vigo","sequence":"first","affiliation":[]},{"given":"Alessandro","family":"Celestini","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Tiezzi","sequence":"additional","affiliation":[]},{"given":"Rocco","family":"De Nicola","sequence":"additional","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"Hanne Riis","family":"Nielson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,23]]},"reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-642-15640-3_23","volume-title":"Trustworthly Global Computing","author":"C Hankin","year":"2010","unstructured":"Hankin, C., Nielson, F., Nielson, H.R.: Probabilistic Aspects: Checking Security in an Imperfect World. In: Wirsing, M., Hofmann, M., Rauschmayer, A. (eds.) TGC 2010. LNCS, vol. 6084, pp. 348\u2013363. Springer, Heidelberg (2010)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., Ismailb, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618\u2013644 (2007)","DOI":"10.1016\/j.dss.2005.05.019"},{"issue":"4","key":"12_CR3","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.comnet.2005.07.003","volume":"50","author":"Z Despotovic","year":"2006","unstructured":"Despotovic, Z., Aberer, K.: P2P reputation management: Probabilistic estimation vs. social networks. Computer Networks 50(4), 485\u2013500 (2006)","journal-title":"Computer Networks"},{"issue":"1","key":"12_CR4","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/963927.963930","volume":"5","author":"R De Nicola","year":"2004","unstructured":"De Nicola, R., Loreti, M.: A modal logic for mobil agents. ACM Trans. Comput. Log. 5(1), 79\u2013128 (2004)","journal-title":"ACM Trans. Comput. Log."},{"issue":"1","key":"12_CR5","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.tcs.2007.05.008","volume":"382","author":"R De Nicola","year":"2007","unstructured":"De Nicola, R., Katoen, J.P., Latella, D., Loreti, M., Massink, M.: Model checking mobile stochastic logic. Theoretical Computer Science 382(1), 42\u201370 (2007)","journal-title":"Theoretical Computer Science"},{"key":"12_CR6","unstructured":"Loreti, M.: Stochastic Analyser for Mobility (2010). http:\/\/rap.dsi.unifi.it\/SAM\/"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/BFb0053381","volume-title":"ECOOP \u201997 - Object-Oriented Programming","author":"G Kiczales","year":"1997","unstructured":"Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.-M., Irwin, J.: Aspect-Oriented Programming. In: Ak\u015fit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220\u2013242. Springer, Heidelberg (1997)"},{"key":"12_CR8","unstructured":"Georg, G., Ray, I., France, R.B.: Using Aspects to Design a Secure System. In: IEEE 8th International Conference on Engineering of Complex Computer Systems (ICECCS 2002) (2002)"},{"key":"12_CR9","unstructured":"Win, B.D., Joosen, W., Piessens, F.: Developing Secure Applications through Aspect-Oriented Programming. In: Aspect-Oriented Software Development, pp. 633\u2013650 (2004)"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-68265-3_10","volume-title":"Coordination Models and Languages","author":"C Hankin","year":"2008","unstructured":"Hankin, C., Nielson, F., Riis Nielson, H., Yang, F.: Advice for Coordination. In: Lea, D., Zavattaro, G. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 153\u2013168. Springer, Heidelberg (2008)"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-40042-4_4","volume-title":"Global Computing. Programming Environments, Languages, Security, and Analysis of Systems","author":"L Bettini","year":"2003","unstructured":"Bettini, L., Kannan, R., De Nicola, R., Ferrari, G.-L., Gorla, D., Loreti, M., Moggi, E., Pugliese, R., Tuosto, E., Venneri, B.: The Klaim Project: Theory and Practice. In: Priami, C. (ed.) GC 2003. LNCS, vol. 2874, pp. 88\u2013150. Springer, Heidelberg (2003)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Celestini, A., De Nicola, R., Tiezzi, F.: Specifying and Analysing Reputation Systems with a Coordination Language. In: 28th Annual ACM Symposium on Applied Computing (SAC 2013), pp. 1363\u20131368. ACM (2013)","DOI":"10.1145\/2480362.2480618"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Legay, A., Delahaye, B.: Statistical Model Checking : An Overview. ArXiv (2010)","DOI":"10.1007\/978-3-642-16612-9_11"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-13414-2_9","volume-title":"Coordination Models and Languages","author":"F Calzolai","year":"2010","unstructured":"Calzolai, F., Loreti, M.: Simulation and Analysis of Distributed Systems in Klaim. In: Clarke, D., Agha, G. (eds.) COORDINATION 2010. LNCS, vol. 6116, pp. 122\u2013136. Springer, Heidelberg (2010)"},{"key":"12_CR15","unstructured":"Gambetta, D.: Can We Trust Trust? Basil Blackwell (1988)"},{"key":"12_CR16","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-642-38323-6_5","volume-title":"Trust Management VII","author":"H Alzaid","year":"2013","unstructured":"Alzaid, H., Alfaraj, M., Ries, S., J\u00f8sang, A., Albabtain, M., Abuhaimed, A.: Reputation-based trust systems for wireless sensor networks: A comprehensive review. In: Fern\u00e1ndez-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) Trust Management VII. IFIP AICT, vol. 401, pp. 66\u201382. Springer, Heidelberg (2013)"},{"key":"12_CR17","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML) Version 3.0 (2013). http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html"},{"issue":"5","key":"12_CR18","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/32.685256","volume":"24","author":"R De Nicola","year":"1998","unstructured":"De Nicola, R., Ferrari, G.L., Pugliese, R.: KLAIM: A Kernel Language for Agents Interaction and Mobility. IEEE Trans. Software Eng. 24(5), 315\u2013330 (1998)","journal-title":"IEEE Trans. Software Eng."},{"key":"12_CR19","unstructured":"Linda: User\u2019s Guide and Reference Manual. Scientific Computing Associates (1995)"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-642-35861-6_12","volume-title":"Formal Aspects of Component Software","author":"HR Nielson","year":"2013","unstructured":"Nielson, H.R., Nielson, F., Vigo, R.: A Calculus for Quality. In: P\u0103s\u0103reanu, C.S., Sala\u00fcn, G. (eds.) FACS 2012. LNCS, vol. 7684, pp. 188\u2013204. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Trustworthy Global Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-45917-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T13:58:48Z","timestamp":1675259928000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-45917-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662459164","9783662459171"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-45917-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"23 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}