{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T21:54:23Z","timestamp":1770155663403,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819564187","type":"print"},{"value":"9789819564194","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6419-4_2","type":"book-chapter","created":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:14Z","timestamp":1770109094000},"page":"21-41","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Layered Trustworthiness Assessment Model (ALTAM) for\u00a05G Services Deployment"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5852-4956","authenticated-orcid":false,"given":"Samra","family":"Bouakkaz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7831-9252","authenticated-orcid":false,"given":"Luis","family":"Su\u00e1rez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8792-0413","authenticated-orcid":false,"given":"Nora","family":"Boulahia-Cuppens","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1124-2200","authenticated-orcid":false,"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,4]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Abacha, F.Z., Teo, S.G., Cordeiro, L.C., Mustafa, M.A.: Synthetic data aided federated learning using foundation models. In: International Workshop on Trustworthy Federated Learning, pp. 106\u2013118. Springer (2024)","DOI":"10.1007\/978-3-031-82240-7_8"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Abusitta, A., Bellaiche, M., Dagenais, M.: A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments. In: 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), pp.\u00a01\u20138. IEEE (2018)","DOI":"10.1109\/ICIN.2018.8401625"},{"issue":"3","key":"2_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s10207-020-00531-6","volume":"21","author":"SA Alghamdi","year":"2022","unstructured":"Alghamdi, S.A.: Novel trust-aware intrusion detection and prevention system for 5g manet-cloud. Int. J. Inf. Secur. 21(3), 469\u2013488 (2022)","journal-title":"Int. J. Inf. Secur."},{"key":"2_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110197","volume":"241","author":"B Ali","year":"2024","unstructured":"Ali, B., Gregory, M.A., Li, S., Dib, O.A.: Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in multi-access edge computing. Comput. Netw. 241, 110197 (2024)","journal-title":"Comput. Netw."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Aliev, R.A., Aliev, R.A.: A generalized fuzzy logic-based decision theory. Fundamentals of the Fuzzy Logic-Based Generalized Theory of Decisions, pp. 127\u2013189 (2013)","DOI":"10.1007\/978-3-642-34895-2_4"},{"key":"2_CR6","unstructured":"Amazon Web Services, Inc.: AWS Security, Compliance, Performance, and Reliability Resources (2025). https:\/\/aws.amazon.com\/ , includes CSE-CIC-IDS2018 Dataset, AWS Artifact, Security Bulletins, CloudPing, RIPE Atlas, Health Dashboard, and Downdetector; Accessed: 2025-05-09"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Bampatsikos, M., Politis, I., Ioannidis, T., Xenakis, C.: Trust score prediction and management in IOT ecosystems using markov chains and madm techniques. IEEE Trans. Cons. Electr. (2025)","DOI":"10.1109\/TCE.2025.3531045"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"B\u00e1rcena, J.L.C., et al.: Federated tsk models for predicting quality of experience in b5g\/6g networks. In: 2023 IEEE International Conference on Fuzzy Systems (FUZZ), pp.\u00a01\u20138. IEEE (2023)","DOI":"10.1109\/FUZZ52849.2023.10309758"},{"issue":"05","key":"2_CR9","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1142\/S0218488524500181","volume":"32","author":"K Belmessous","year":"2024","unstructured":"Belmessous, K., Sebbak, F., Mataoui, M., Senouci, M.R., Cherifi, W.: Dempster-shafer theory in recommender systems: a survey. Internat. J. Uncertain. Fuzziness Knowl. Based Syst. 32(05), 747\u2013780 (2024)","journal-title":"Internat. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"131382","DOI":"10.1109\/ACCESS.2021.3114645","volume":"9","author":"A C\u00e1rdenas","year":"2021","unstructured":"C\u00e1rdenas, A., Fern\u00e1ndez, D., Lentisco, C.M., Moyano, R.F., Bellido, L.: Enhancing a 5g network slicing management model to improve the support of mobile virtual network operators. IEEE Access 9, 131382\u2013131399 (2021)","journal-title":"IEEE Access"},{"issue":"3654","key":"2_CR11","first-page":"398","volume":"2024","author":"O Deineka","year":"2024","unstructured":"Deineka, O., Harasymchuk, O., Partyka, A., Obshta, A., Korshun, N.: Designing data classification and secure store policy according to soc 2 type ii. Cybersecur. Prov. Inf. Telecommun. Syst. 2024(3654), 398\u2013409 (2024)","journal-title":"Cybersecur. Prov. Inf. Telecommun. Syst."},{"key":"2_CR12","unstructured":"ETSI: zero-touch network and service management (ZSM); reference architecture. Tech. Rep. ETSI GS ZSM 002 V1.1.1, ETSI (2020). https:\/\/www.etsi.org\/deliver\/etsi_gs\/ZSM\/001_099\/002\/01.01.01_60\/gs_ZSM002v010101p.pdf"},{"key":"2_CR13","unstructured":"Google cloud: google cloud platform security, compliance, performance, and reliability resources (2025). https:\/\/cloud.google.com\/, includes Compliance Center, Bug Hunters Program, GCPing, PerfKit Benchmarker, Status Dashboard, and Downdetector; Accessed: 09 May 2025"},{"issue":"1","key":"2_CR14","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1007\/s00500-023-08264-z","volume":"28","author":"M Hosseinnezhad","year":"2024","unstructured":"Hosseinnezhad, M., Azgomi, M.A., Dishabi, M.R.E.: A probabilistic trust model for cloud services using bayesian networks. Soft. Comput. 28(1), 509\u2013526 (2024)","journal-title":"Soft. Comput."},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Hua, P.: Neural networks with tensorflow and keras: training, generative models, and reinforcement learning. In: Advances in Artificial Intelligence. Springer (2025)","DOI":"10.1007\/979-8-8688-1020-6"},{"key":"2_CR16","unstructured":"Initiative, J.T.F.T., et\u00a0al.: SP 800-39. managing information security risk: organization, mission, and information system view (2011)"},{"issue":"1","key":"2_CR17","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s10922-021-09623-7","volume":"30","author":"JM Jorquera Valero","year":"2022","unstructured":"Jorquera Valero, J.M., et al.: Design of a security and trust framework for 5g multi-domain scenarios. J. Netw. Syst. Manage. 30(1), 7 (2022)","journal-title":"J. Netw. Syst. Manage."},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Kai, Z., Youyu, L., Qi, L., Hao, S.C., Liping, Z.: Building a private cloud platform based on open source software openstack. In: 2020 International Conference on Big Data and Social Sciences (ICBDSS), pp. 84\u201387. IEEE (2020)","DOI":"10.1109\/ICBDSS51270.2020.00027"},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"1781","DOI":"10.1007\/s10586-020-03218-8","volume":"24","author":"J Kaur","year":"2021","unstructured":"Kaur, J., Kaur, S.: Novel trust evaluation using NSGA-iii based adaptive neuro-fuzzy inference system. Clust. Comput. 24, 1781\u20131792 (2021)","journal-title":"Clust. Comput."},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"KN, A., Nagaraj, R.: Secure vehicle-to-vehicle communication using routing protocol based on trust authentication secure sugeno fuzzy inference system scheme. Recent Pat. Eng. 19(1), E230224227390 (2025)","DOI":"10.2174\/0118722121269253240214075231"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Lechevalier, P.M., Busnel, Y., Ludinard, R., Texier, G.: A fuzzy reputation system for radio access network sharing. In: 2024 22nd International Symposium on Network Computing and Applications (NCA), pp. 45\u201352. IEEE (2024)","DOI":"10.1109\/NCA61908.2024.00019"},{"issue":"3","key":"2_CR22","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCOM.001.2000730","volume":"59","author":"X Li","year":"2021","unstructured":"Li, X., et al.: 5growth: an end-to-end service platform for automated deployment and management of vertical services over 5g networks. IEEE Commun. Mag. 59(3), 84\u201390 (2021)","journal-title":"IEEE Commun. Mag."},{"key":"2_CR23","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.700","volume":"7","author":"MB Mansour","year":"2021","unstructured":"Mansour, M.B., Abdelkader, T., Hashem, M., El-Horbaty, E.S.M.: An integrated three-tier trust management framework in mobile edge computing using fuzzy logic. PeerJ Comput. Sci. 7, e700 (2021)","journal-title":"PeerJ Comput. Sci."},{"key":"2_CR24","unstructured":"Microsoft corporation: microsoft azure security, compliance, performance, and reliability resources (2025). https:\/\/azure.microsoft.com\/ , includes Microsoft Trust Center, MSRC, Azure Speed Test, Azure Monitor, Service Health History, and Downdetector; Accessed 09 May 2025"},{"key":"2_CR25","unstructured":"ONAP project: ONAP policy framework overview (2022)"},{"key":"2_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117116","volume":"199","author":"S Porebski","year":"2022","unstructured":"Porebski, S.: Evaluation of fuzzy membership functions for linguistic rule-based classifier focused on explainability, interpretability and reliability. Expert Syst. Appl. 199, 117116 (2022)","journal-title":"Expert Syst. Appl."},{"key":"2_CR27","doi-asserted-by":"publisher","first-page":"117218","DOI":"10.1109\/ACCESS.2020.3004738","volume":"8","author":"FH Rahman","year":"2020","unstructured":"Rahman, F.H., Newaz, S.S., Au, T.W., Suhaili, W.S., Lee, G.M.: Off-street vehicular fog for catering applications in 5g\/b5g: a trust-based task mapping solution and open research issues. IEEE Access 8, 117218\u2013117235 (2020)","journal-title":"IEEE Access"},{"key":"2_CR28","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.fss.2018.11.010","volume":"368","author":"S Rajab","year":"2019","unstructured":"Rajab, S.: Handling interpretability issues in anfis using rule base simplification and constrained learning. Fuzzy Sets Syst. 368, 36\u201358 (2019)","journal-title":"Fuzzy Sets Syst."},{"key":"2_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110501","volume":"248","author":"G Rathee","year":"2024","unstructured":"Rathee, G., Kumar, A., Kerrache, C.A., Calafate, C.T.: A trust management solution for 5g-based future generation internet of vehicles. Comput. Netw. 248, 110501 (2024)","journal-title":"Comput. Netw."},{"issue":"3","key":"2_CR30","doi-asserted-by":"publisher","first-page":"3549","DOI":"10.1109\/TNSM.2023.3234319","volume":"20","author":"M Shafi","year":"2023","unstructured":"Shafi, M., Jha, R.K., Jain, S.: Intelligent trust ranking security preserving model for b5g\/6g. IEEE Trans. Netw. Serv. Manage. 20(3), 3549\u20133561 (2023)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Sharma, V.: Managing multi-cloud deployments on kubernetes with istio, prometheus and grafana. In: 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS). vol.\u00a01, pp. 525\u2013529. IEEE (2022)","DOI":"10.1109\/ICACCS54159.2022.9785124"},{"issue":"1","key":"2_CR32","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1109\/TII.2022.3174718","volume":"19","author":"SA Soleymani","year":"2022","unstructured":"Soleymani, S.A., et al.: Truth: Trust and authentication scheme in 5g-IIOT. IEEE Trans. Industr. Inf. 19(1), 880\u2013889 (2022)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"2_CR33","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.comcom.2023.09.010","volume":"211","author":"JMJ Valero","year":"2023","unstructured":"Valero, J.M.J., S\u00e1nchez, P.M.S., P\u00e9rez, M.G., Celdr\u00e1n, A.H., P\u00e9rez, G.M.: Trust-as-a-service: a reputation-enabled trust framework for 5g network resource provisioning. Comput. Commun. 211, 229\u2013238 (2023)","journal-title":"Comput. Commun."},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Wang, C., Liu, G., Jiang, T.: Malicious node detection in wireless weak-link sensor networks using dynamic trust management. IEEE Trans. Mobile Comput. (2024)","DOI":"10.1109\/TMC.2024.3418826"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Wong, S.: The fifth generation (5g) trust model. In: 2019 IEEE Wireless Communications and Networking Conference (WCNC), pp.\u00a01\u20135. IEEE (2019)","DOI":"10.1109\/WCNC.2019.8885697"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Xiao, A., et al.: DNFS-VNE: deep neuro fuzzy system driven virtual network embedding. IEEE Internet of Things J. (2024)","DOI":"10.1109\/JIOT.2024.3514700"},{"issue":"12","key":"2_CR37","doi-asserted-by":"publisher","first-page":"8864","DOI":"10.1109\/TII.2021.3128954","volume":"18","author":"L Yang","year":"2021","unstructured":"Yang, L., et al.: An intelligent trust cloud management method for secure clustering in 5g enabled internet of medical things. IEEE Trans. Industr. Inf. 18(12), 8864\u20138875 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Zhiming, D., et al.: 5g intelligent network trust model based on subjective logic. In: 2021 IEEE International Conference on Power Electronics, Computer Applications (ICPECA), pp. 541\u2013545. IEEE (2021)","DOI":"10.1109\/ICPECA51329.2021.9362539"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6419-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T08:58:21Z","timestamp":1770109101000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6419-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819564187","9789819564194"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6419-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"4 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nsclab.org\/nss-socialsec2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}