{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T09:44:28Z","timestamp":1742636668842},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,4,28]],"date-time":"2013-04-28T00:00:00Z","timestamp":1367107200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1007\/s00766-013-0171-x","type":"journal-article","created":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T02:33:22Z","timestamp":1367375602000},"page":"321-341","source":"Crossref","is-referenced-by-count":18,"title":["A framework for enabling trust requirements in social cloud applications"],"prefix":"10.1007","volume":"18","author":[{"given":"Francisco","family":"Moyano","sequence":"first","affiliation":[]},{"given":"Carmen","family":"Fernandez-Gago","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,28]]},"reference":[{"key":"171_CR1","doi-asserted-by":"crossref","unstructured":"Abawajy J (2009) Determining service trustworthiness in intercloud computing environments. In: Proceedings of the 2009 10th international symposium on pervasive systems, algorithms, and networks, ISPAN \u201909. Washington, DC, USA, IEEE Computer Society, pp 784\u2013788","DOI":"10.1109\/I-SPAN.2009.155"},{"key":"171_CR2","doi-asserted-by":"crossref","unstructured":"Agudo I, Fernandez-Gago C, Lopez J (2008) A model for trust metrics analysis. In: 5th international conference on trust, privacy and security in digital business (TrustBus\u201908), volume 5185 of LNCS. Springer, Berlin, pp 28\u201337","DOI":"10.1007\/978-3-540-85735-8_4"},{"key":"171_CR3","doi-asserted-by":"crossref","unstructured":"Blaze M, Feigenbaum J, Lacy J (1996) Decentralized trust management. In: IEEE symposium on security and privacy, pp 164\u2013173","DOI":"10.1109\/SECPRI.1996.502679"},{"issue":"6","key":"171_CR4","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R Buyya","year":"2009","unstructured":"Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599\u2013616","journal-title":"Future Gener Comput Syst"},{"key":"171_CR5","unstructured":"Cadzow S (2008) Making better security standards: a review of the security update to MBS and a new ETSI deliverable. Technical report, ETSI TISPAN"},{"issue":"3","key":"171_CR6","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MPRV.2003.1228527","volume":"2","author":"V Cahill","year":"2003","unstructured":"Cahill V, Gray E, Seigneur J-M, Jensen CD, Chen Y, Shand B, Dimmock N, Twigg A, Jean B, Colin E, Waleed W, Sotirios T, Paddy N, Giovannadi MS, Ciaran B, Marco C, Karl K, Mogens N (2003) Using trust for secure collaboration in uncertain environments. IEEE Pervasive Comput 2(3):52\u201361","journal-title":"IEEE Pervasive Comput"},{"key":"171_CR7","doi-asserted-by":"crossref","DOI":"10.1002\/9780470519851","volume-title":"Trust theory: a socio-cognitive and computational model","author":"C Castelfranchi","year":"2010","unstructured":"Castelfranchi C, Falcone R (2010) Trust theory: a socio-cognitive and computational model. Wiley Series in Agent Technology, London"},{"key":"171_CR8","doi-asserted-by":"crossref","unstructured":"Chard K, Caton S, Rana O, Bubendorfer K (2010) Social cloud: cloud computing in social networks. In: Proceedings of the 3rd international conference on cloud computing IEEE cloud 2010","DOI":"10.1109\/CLOUD.2010.28"},{"key":"171_CR9","doi-asserted-by":"crossref","unstructured":"Christianson B, Harbison WS (1997) Why isn\u2019t trust transitive? In: Proceedings of the international workshop on security protocols. Springer, London, pp 171\u2013176","DOI":"10.1007\/3-540-62494-5_16"},{"key":"171_CR10","volume-title":"Building application frameworks: object-oriented foundations of framework design","author":"ME Fayad","year":"1999","unstructured":"Fayad ME, Schmidt DC, Johnson RE (1999) Building application frameworks: object-oriented foundations of framework design. Wiley, London"},{"key":"171_CR11","volume-title":"Building web reputation systems, 1st edn","author":"R Farmer","year":"2010","unstructured":"Farmer R, Glass B (2010) Building web reputation systems, 1st edn. Yahoo! Press, USA"},{"key":"171_CR12","unstructured":"Gambetta D (1988) Can we trust trust? In: Trust: making and breaking cooperative relations. Basil Blackwell, Oxford, pp 213\u2013237"},{"issue":"4","key":"171_CR13","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T Grandison","year":"2000","unstructured":"Grandison T, Sloman M (2000) A survey of trust in internet applications. Commun Surv Tutor IEEE 3(4):2\u201316","journal-title":"Commun Surv Tutor IEEE"},{"key":"171_CR14","doi-asserted-by":"crossref","unstructured":"Habib SM, Ries S, Muhlhauser M (2010) Cloud computing landscape and research challenges regarding trust and reputation. In: Proceedings of the 2010 symposia and workshops on ubiquitous, autonomic and trusted computing, UIC-ATC \u201910, IEEE Computer Society. Washington, DC, USA, pp 410\u2013415","DOI":"10.1109\/UIC-ATC.2010.48"},{"key":"171_CR15","unstructured":"Har YC (2011) Architecture supporting computational trust formation. PhD thesis. University of Western Ontario, London, Ontario"},{"key":"171_CR16","unstructured":"Huynh TD (2008) A personalized framework for trust assessment. ACM symposium on applied computing\u2014trust, reputation, evidence and other collaboration know-how track, vol 2, pp 1302\u20131307"},{"issue":"3","key":"171_CR17","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A J\u00f8sang","year":"2001","unstructured":"J\u00f8sang A (2001) A logic for uncertain probabilities. Int J Uncertain Fuzziness Knowl Based Syst 9(3):279\u2013311","journal-title":"Int J Uncertain Fuzziness Knowl Based Syst"},{"issue":"2","key":"171_CR18","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618\u2013644","journal-title":"Decis Support Syst"},{"key":"171_CR19","unstructured":"Kiefhaber R, Siefert F, Anders G, Ungerer T, Reif W (2011) The trust-enabling middleware: introduction and application. Technical Report 2011\u20132010, Universittsbibliothek der Universitt Augsburg, Universittsstr. 22, 86159 Augsburg, http:\/\/opus.bibliothek.uni-augsburg.de\/volltexte\/2011\/1733\/"},{"key":"171_CR20","doi-asserted-by":"crossref","unstructured":"Lee AJ, Winslett M, Perano KJ (2009) TrustBuilder2: a reconfigurable framework for trust negotiation. In: Ferrari E, Li N, Bertino E, Karabulut Y (eds) IFIPTM, volume 300 of IFIP conference proceedings. Springer, Berlin, pp 176\u2013195","DOI":"10.1007\/978-3-642-02056-8_12"},{"key":"171_CR21","unstructured":"Levien R (2004) Attack resistant trust metrics. PhD thesis, University of California at Berkeley"},{"issue":"4","key":"171_CR22","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/TSE.2010.2","volume":"36","author":"N Limam","year":"2010","unstructured":"Limam N, Boutaba R (2010) Assessing software service quality and trustworthiness at selection time. IEEE Trans Softw Eng 36(4):559\u2013574","journal-title":"IEEE Trans Softw Eng"},{"key":"171_CR23","unstructured":"Marsh S (1994) Formalising trust as a computational concept. PhD thesis, University of Stirling"},{"key":"171_CR24","unstructured":"Moyano F, Fernandez-Gago C, Lopez J (2012) A conceptual framework for trust models. In: Fischer-H\u00fcbner S, Katsikas S, Quirchmayr G (eds) Proceedings of 9th international conference on trust, privacy and security in digital business (TrustBus 2012), vol 7449, pp 93\u2013104. Springer Verlag, Vienna"},{"key":"171_CR25","unstructured":"McKnight DH, Chervany NL (1996) The meanings of trust. Technical report, University of Minnesota, Management Information Systems Research Center"},{"key":"171_CR26","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1109\/MC.2010.289","volume":"43","author":"KW Miller","year":"2010","unstructured":"Miller KW, Voas J, Laplante P (2010) In trust we trust. Computer 43:85\u201387","journal-title":"Computer"},{"issue":"2","key":"171_CR27","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H Mouratidis","year":"2007","unstructured":"Mouratidis H, Giorgini P (2007) Secure tropos: a security-oriented extension of the tropos methodology. Int J Softw Eng Knowl Eng 17(2):285\u2013309","journal-title":"Int J Softw Eng Knowl Eng"},{"key":"171_CR28","unstructured":"Olmedilla D, Rana OF, Matthews B, Nejdl W (2005) Security and trust issues in semantic grids. In: Proceedings of the dagstuhl seminar, semantic grid: the convergence of technologies 5271"},{"issue":"2","key":"171_CR29","first-page":"36","volume":"3","author":"M Pavlidis","year":"2012","unstructured":"Pavlidis M, Mouratidis H, Islam S (2012) Modelling security using trust based concepts. IJSSE 3(2):36\u201353","journal-title":"IJSSE"},{"key":"171_CR30","doi-asserted-by":"crossref","unstructured":"Pavlidis M, Mouratidis H, Islam S, Kearney P (2012) Dealing with trust and control: a meta-model for trustworthy information systems development. In: Sixth international conference on research challenges in information science, pp 1\u20139","DOI":"10.1109\/RCIS.2012.6240441"},{"key":"171_CR31","doi-asserted-by":"crossref","unstructured":"Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: empirical analysis of eBay\u2019s reputation system. In: Baye MR (eds) The economics of the internet and E-commerce, volume 11 of advances in applied microeconomics. Elsevier Science, Amsterdam, pp 127\u2013157","DOI":"10.1016\/S0278-0984(02)11030-3"},{"key":"171_CR32","doi-asserted-by":"crossref","unstructured":"Ruohomaa S, Kutvonen L (2005) Trust management survey. In: Proceedings of the third international conference on trust management, iTrust\u201905. Springer, Berlin, pp 77\u201392","DOI":"10.1007\/11429760_6"},{"key":"171_CR33","unstructured":"Suryanarayana G, Diallo M, Taylor RN (2006) A generic framework for modeling decentralized reputation-based trust models. In: The fourteenth ACM SigSoft symposium on foundations of software engineering"},{"key":"171_CR34","doi-asserted-by":"crossref","unstructured":"Suryanarayana G, Diallo MH, Erenkrantz JR, Taylor RN (2006) Architectural support for trust models in decentralized applications. In: Proceeding of the 28th international conference. ACM Press, New York, pp 52\u201361","DOI":"10.1145\/1134285.1134295"},{"issue":"6","key":"171_CR35","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H Takabi","year":"2010","unstructured":"Takabi H, Joshi JBD, Ahn G-J (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Privacy 8(6):24\u201331","journal-title":"IEEE Secur Priv"},{"issue":"4","key":"171_CR36","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/1327512.1327513","volume":"11","author":"A Weiss","year":"2007","unstructured":"Weiss A (2007) Computing in the clouds. NetWorker 11(4):16\u201325","journal-title":"NetWorker"},{"key":"171_CR37","unstructured":"Windley PJ, Tew K, Daley D (2006) A framework for building reputation systems. http:\/\/www.windley.com\/essays\/2006\/dim2006\/framework_for_building_reputation_systems"},{"issue":"6","key":"171_CR38","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MIC.2002.1067734","volume":"6","author":"M Winslett","year":"2002","unstructured":"Winslett M, Yu T, Seamons KE, Hess A, Jacobson J, Jarvis R, Smith B, Yu L (2002) Negotiating trust on the web. IEEE Internet Comput 6(6):30\u201337","journal-title":"IEEE Internet Comput"},{"key":"171_CR39","doi-asserted-by":"crossref","unstructured":"Xiao Y, Lin C, Jiang Y, Chu X, Shen X (2010) Reputation-based QoS provisioning in cloud computing via dirichlet multinomial model. In: IEEE international conference on communications. IEEE, pp 1\u20135","DOI":"10.1109\/ICC.2010.5502407"},{"key":"171_CR40","doi-asserted-by":"crossref","unstructured":"Yan Z, Holtmanns S (2008) Trust modeling and management: from social trust to digital trust. Computer security, privacy and politics: current issues, challenges and solutions","DOI":"10.4018\/978-1-59904-804-8.ch013"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-013-0171-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-013-0171-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-013-0171-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T03:14:09Z","timestamp":1562987649000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-013-0171-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,28]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,11]]}},"alternative-id":["171"],"URL":"https:\/\/doi.org\/10.1007\/s00766-013-0171-x","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"value":"0947-3602","type":"print"},{"value":"1432-010X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,28]]}}}