{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:20:42Z","timestamp":1726042842113},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662599570"},{"type":"electronic","value":"9783662599587"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-662-59958-7_5","type":"book-chapter","created":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T18:03:30Z","timestamp":1567015410000},"page":"77-95","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Trust Computation in VANET Cloud"],"prefix":"10.1007","author":[{"given":"Brijesh Kumar","family":"Chaurasia","sequence":"first","affiliation":[]},{"given":"Kapil","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,29]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MIS.2005.73","volume":"20","author":"L Li","year":"2005","unstructured":"Li, L., Song, J., Wang, F.-Y., Niehsen, W., Zheng, N.-N.: IVS 05: new developments and research trends for intelligent vehicles. IEEE Intell. Syst. 20, 10\u201314 (2005)","journal-title":"IEEE Intell. Syst."},{"issue":"1","key":"5_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/JSAC.2011.110103","volume":"29","author":"M Boban","year":"2011","unstructured":"Boban, M., Vinhoza, T.T.V., Ferreira, M., Barros, J., Tonguz, O.K.: Impact of vehicles as obstacles in vehicular ad hoc networks. IEEE J. Sel. Areas Commun. 29(1), 15\u201328 (2011)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1109\/TITS.2012.2213595","volume":"14","author":"M Khabazian","year":"2013","unstructured":"Khabazian, M., Aissa, S., Ali, M.M.: Performance modeling of safety messages broadcast in vehicular ad hoc networks. IEEE Trans. Intell. Trans. Syst. 14(1), 360\u2013387 (2013)","journal-title":"IEEE Trans. Intell. Trans. Syst."},{"key":"5_CR4","series-title":"Springer Proceedings in Physics","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/978-81-322-2367-2_53","volume-title":"Advances in Optical Science and Engineering","author":"S Soni","year":"2015","unstructured":"Soni, S., Sharma, K., Chaurasia, B.K.: Trust based scheme for location finding in VANETs. In: Lakshminarayanan, V., Bhattacharya, I. (eds.) Advances in Optical Science and Engineering. SPP, vol. 166, pp. 425\u2013432. Springer, New Delhi (2015). https:\/\/doi.org\/10.1007\/978-81-322-2367-2_53"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Wei, Y.C., Chen, Y.M.: Adaptive decision making for improving trust establishment in VANET. In: 16th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 1\u20134 (2014)","DOI":"10.1109\/APNOMS.2014.6996523"},{"key":"5_CR6","unstructured":"Cho, J.-H., Swami, A.: Towards trust-based cognitive networks: a survey of trust management for mobile ad hoc networks. In: Proceedings of the 14th International Command and Control Research and Technology Symposium, pp. 1\u201316 (2009)"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Gerlach, M.: Trust for vehicular applications. In: Eighth International Symposium on Autonomous Decentralized Systems, pp. 295\u2013304. IEEE Computer Society (2007)","DOI":"10.1109\/ISADS.2007.76"},{"issue":"5","key":"5_CR8","doi-asserted-by":"publisher","first-page":"313","DOI":"10.14257\/ijgdc.2016.9.5.27","volume":"9","author":"K Sharma","year":"2016","unstructured":"Sharma, K., Chaurasia, B.K., Verma, S., Tomar, G.S.: Token based trust computation in VANET. Int. J. Grid Distrib. Comput. 9(5), 313\u2013320 (2016)","journal-title":"Int. J. Grid Distrib. Comput."},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"934","DOI":"10.1016\/j.jnca.2011.03.028","volume":"35","author":"FG Marmol","year":"2012","unstructured":"Marmol, F.G., Perez, G.M.: TRIP, a trust and reputation infrastructure based proposal for vehicular ad hoc networks. J. Netw. Comput. Appl. 35, 934\u2013941 (2012)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"5_CR10","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.pmcj.2010.09.002","volume":"7","author":"A Benslimane","year":"2011","unstructured":"Benslimane, A., Barghi, S., Assi, C.: An efficient routing protocol for connecting vehicular networks to the internet. Pervasive Mob. Comput. 7(1), 98\u2013113 (2011)","journal-title":"Pervasive Mob. Comput."},{"key":"5_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84996-241-4","volume-title":"Cloud Computing: Principles, Systems and Applications","year":"2010","unstructured":"Gillam, L., et al. (eds.): Cloud Computing: Principles, Systems and Applications. Springer, London (2010). https:\/\/doi.org\/10.1007\/978-1-84996-241-4"},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MITS.2013.2240041","volume":"23","author":"K Mershad","year":"2013","unstructured":"Mershad, K., Artail, H.: Finding a STAR in a vehicular cloud. IEEE Intell. Transp. Syst. Mag. 23, 55\u201368 (2013)","journal-title":"IEEE Intell. Transp. Syst. Mag."},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Gerla, M.: Vehicular cloud computing. In: Proceedings of the 11th Annual Mediterranean Ad-Hoc Networking Workshop (Med-Hoc-Net), pp. 152\u2013155 (2012)","DOI":"10.1109\/MedHocNet.2012.6257116"},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1016\/j.jnca.2013.08.004","volume":"40","author":"M Whaiduzzaman","year":"2014","unstructured":"Whaiduzzaman, M., Sookhak, M., Gani, A., Buyya, R.: A survey on vehicular cloud computing. J. Netw. Comput. Appl. 40, 325\u2013344 (2014)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"5_CR15","first-page":"153","volume":"8","author":"H Mousannif","year":"2012","unstructured":"Mousannif, H., Khalil, I., Olariuc, S.: Cooperation as a service in VANET: implementation and simulation results. Mob. Inf. Syst. 8(2), 153\u2013172 (2012)","journal-title":"Mob. Inf. Syst."},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Chen, B., Curtmola, R., Ateniese, G., Burns, R.: Remote data checking for network coding- based distributed storage systems. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, pp. 31\u201342 (2010)","DOI":"10.1145\/1866835.1866842"},{"issue":"2","key":"5_CR17","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.csi.2013.08.011","volume":"36","author":"BK Chaurasia","year":"2014","unstructured":"Chaurasia, B.K., Verma, S.: Secure pay while on move toll collection through VANET. Int. Comput. Stand. Interfaces 36(2), 403\u2013411 (2014)","journal-title":"Int. Comput. Stand. Interfaces"},{"issue":"6","key":"5_CR18","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MIC.2005.136","volume":"9","author":"S Song","year":"2005","unstructured":"Song, S., Hwang, K., Zhou, R., Kwok, Y.-K.: Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Comput. 9(6), 24\u201334 (2005)","journal-title":"IEEE Internet Comput."},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Griffiths, N., Chao, K.-M., Younas, M.: Fuzzy trust for peer-to-peer systems. In: 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2006), pp. 73\u201379 (2006)","DOI":"10.1109\/ICDCSW.2006.57"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A Josang","year":"2001","unstructured":"Josang, A.: A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 9, 279\u2013311 (2001)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"5_CR21","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1111\/j.2517-6161.1968.tb00722.x","volume":"30","author":"AP Dempster","year":"1968","unstructured":"Dempster, A.P.: A generalization of Bayesian inference. J. R. Stat. Soc. Ser. B 30, 205\u2013247 (1968)","journal-title":"J. R. Stat. Soc. Ser. B"},{"key":"5_CR22","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Chen, C., Zhang, J., Cohen, R., Ho, P.-H.: A trust-based message propagation and evaluation framework in VANETs. In: Proceedings of the International Conference on Information Technology Convergence and Services, pp. 1\u20138 (2010)","DOI":"10.1109\/ITCS.2010.5581298"},{"issue":"3","key":"5_CR24","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1109\/JSAC.2011.110311","volume":"29","author":"Y Hao","year":"2011","unstructured":"Hao, Y., Cheng, Yu.: A distributed key management framework with cooperative message authentication in VANETs. IEEE J. Sel. Areas Commun. 29(3), 616\u2013629 (2011)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Rawatz, D.B., Bistax, B.B., Yan, G., Weigley, M.C.: Securing vehicular ad-hoc networks against malicious drivers: a probabilistic approach. In: International Conference on Complex, Intelligent and Software Intensive Systems, pp. 146\u2013151 (2011)","DOI":"10.1109\/CISIS.2011.30"},{"issue":"6","key":"5_CR26","first-page":"1115","volume":"10","author":"DA Rivas","year":"2012","unstructured":"Rivas, D.A., Zapata, M.G.: Chains of trust in vehicular networks: a secure points of interest dissemination strategy. J. Netw. Comput. Appl. 10(6), 1115\u20131133 (2012)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"5_CR27","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1108\/17427371111123577","volume":"7","author":"S Olariu","year":"2011","unstructured":"Olariu, S., Khalil, I., Abuelela, M.: Taking VANET to the clouds. Int. J. Pervasive Comput. Commun. 7(1), 7\u201321 (2011)","journal-title":"Int. J. Pervasive Comput. Commun."},{"key":"5_CR28","unstructured":"Hasan, R.: Cloud security. www.cs.jhu.edu\/ragib"},{"key":"5_CR29","unstructured":"opensourceforu.com\/\u2026\/cloudsim\/"},{"key":"5_CR30","unstructured":"www.vanet-sim"},{"issue":"3","key":"5_CR31","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.comcom.2010.01.023","volume":"34","author":"MK Denko","year":"2011","unstructured":"Denko, M.K., Sun, T., Woungang, I.: Trust management in ubiquitous computing: a Bayesian approach. Comput. Commun. 34(3), 398\u2013406 (2011)","journal-title":"Comput. Commun."}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Science XXXIV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-59958-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T18:12:30Z","timestamp":1721671950000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-59958-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783662599570","9783662599587"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-59958-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}