{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T02:47:04Z","timestamp":1777690024849,"version":"3.51.4"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2007,2,21]],"date-time":"2007-02-21T00:00:00Z","timestamp":1172016000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2007,3,19]]},"DOI":"10.1007\/s10207-007-0014-1","type":"journal-article","created":{"date-parts":[[2007,2,20]],"date-time":"2007-02-20T09:01:24Z","timestamp":1171962084000},"page":"153-181","source":"Crossref","is-referenced-by-count":12,"title":["Trust structures"],"prefix":"10.1007","volume":"6","author":[{"given":"Karl","family":"Krukow","sequence":"first","affiliation":[]},{"given":"Mogens","family":"Nielsen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,2,21]]},"reference":[{"key":"14_CR1","unstructured":"Abdul-Rahman, A.: A framework for decentralised trust reasoning. Ph.D. thesis, University of London, Department of Computer Science, University College London, England (2005)"},{"key":"14_CR2","unstructured":"Bertsekas, D.P., Tsitsiklis, J.N.: Parallel and Distributed Computation: Numerical Methods. Prentice-Hall International Editions. Prentice-Hall, Inc., Englewood Cliffs (1989)"},{"key":"14_CR3","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-48749-2_8","volume-title":"Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Lecture Notes in Computer Science, vol 1603","author":"M. Blaze","year":"1999","unstructured":"Blaze M., Feigenbaum J., Ioannidis J. and Keromytis A.D. (1999). The role of trust management in distributed systems security. In: Vitek, J. and Jensen, C.D. (eds) Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Lecture Notes in Computer Science, vol 1603, pp 185\u2013210. Springer, Heidelberg"},{"key":"14_CR4","unstructured":"Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: trust management for public-key infrastructures. In: Proceedings from Security Protocols: 6th International Workshop, Cambridge, 1998, vol. 1550, pp. 59\u201363 (1999)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings from the 17th Symposium on Security and Privacy, pp. 164\u2013173. IEEE Computer Society Press, Newyork (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Strauss, M.: Compliance checking in the policymaker trust management system. In: Proceedings from Financial Cryptography: Second International Conference (FC\u201998), Anguilla, British West Indies, pp. 254\u2013274 (1998)","DOI":"10.1007\/BFb0055488"},{"issue":"3","key":"14_CR7","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MPRV.2003.1228527","volume":"2","author":"V. Cahill","year":"2003","unstructured":"Cahill V. and Gray E. (2003). Using trust for secure collaboration in uncertain environments. IEEE Pervasive Comput. 2(3): 52\u201361","journal-title":"IEEE Pervasive Comput."},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Carbone, M., Nielsen, M., Sassone, V.: A formal model for trust in dynamic networks. In: Proceedings from Software Engineering and Formal Methods (SEFM\u201903). IEEE Computer Society Press, Newyork (2003)","DOI":"10.1109\/SEFM.2003.1236207"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomsa, B., Ylonen, T.: SPKI Certificate Theory. RFC 2693, ftp-site: ftp:\/\/ftp.rfc-editor.org\/in-notes\/rfc2693.txt (1999)","DOI":"10.17487\/rfc2693"},{"key":"14_CR10","first-page":"285","volume-title":"Foundations of Component-Based Systems","author":"S.J. Garland","year":"2000","unstructured":"Garland S.J. and Lynch N.A. (2000). Using I\/O automata for developing distributed systems. In: Leavens, G.T. and Sitaraman, M. (eds) Foundations of Component-Based Systems, pp 285\u2013312. Cambridge University Press, NewYork"},{"key":"14_CR11","unstructured":"Garland, S.J., Lynch, N.A., Tauber, J., Vaziri, M.: IOA user guide and reference manual. Tech. Rep. MIT-LCS-TR-961, MIT Computer Science and Artificial Intelligence Laboratory (CSAIL), Cambridge (2004)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems, (to appear, reprint available online: http:\/\/sky.fit.qut.edu.au\/~josang\/) (2006)","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"14_CR13","unstructured":"Krukow, K.: An operational semantics for trust policies. Tech. Rep. RS-05-30, BRICS, University of Aarhus (2005) Available online: http:\/\/www.brics.dk\/RS\/05\/30"},{"key":"14_CR14","unstructured":"Krukow, K., Towards a theory of trust for the global ubiquitous computer. Ph.D. Thesis, University of Aarhus, Denmark (2006), available online (submitted): http:\/\/www.brics.dk\/~krukow"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Krukow, K., Nielsen, M.: From simulations to theorems: a position paper on research in the field of computational trust. In: To be published in Proceedings from Formal Aspects in Security and Trust (FAST 2006). Springer, Heidelberg (2006)","DOI":"10.1007\/978-3-540-75227-1_7"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Krukow, K., Twigg, A.: Distributed approximation of fixed-points in trust structures. In: Proceedings from the 25th IEEE International Conference on Distributed Computing Systems (ICDCS\u201905), pp. 805\u2013814. IEEE, New York (2005)","DOI":"10.1109\/ICDCS.2005.23"},{"key":"14_CR17","unstructured":"Krukow, K., Twigg, A.: Distributed approximation of fixed-points in trust structures. Tech. Rep. RS-05-6, BRICS, University of Aarhus (2005). Available online: http:\/\/www.brics.dk\/RS\/05\/6"},{"key":"14_CR18","unstructured":"Li, N., Feigenbaum, J., Grosof, B.: A logic-based knowledge representation for authorization with delegation. In: Proceedings of the 12th IEEE Computer Security Foundations Workshop (CSFW\u201999), pp. 162\u2013174. IEEE Computer Society Press, New York (1999)"},{"key":"14_CR19","unstructured":"Li, N., Grosof, B., Feigenbaum, J.:A logic-based knowledge representation for authorization with delegation. In: Proceedings of the 9th Computer Security Foundations Workshop (CSFW\u201999), pp. 162\u2013174. IEEE Computer Society, New York (1999)"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Li, N., Mitchell, J.: Datalog with constraints: a foundation for trust-management languages. In: Proceedings from the 5th International Symposium on Practical Aspects of Declarative Languages (PADL 2003), Springer Lecture Notes in Computer Science, vol. 2562, pp. 58\u201373. Springer, (2003)","DOI":"10.1007\/3-540-36388-2_6"},{"issue":"3","key":"14_CR21","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1145\/1066100.1066103","volume":"52","author":"N. Li","year":"2005","unstructured":"Li N., Mitchell J.C. and Winsborough W.H. (2005). Beyond proof- of-compliance: security analysis in trust management. J ACM 52(3): 474\u2013514","journal-title":"J ACM"},{"key":"14_CR22","volume-title":"Distributed algorithms","author":"N.A. Lynch","year":"1996","unstructured":"Lynch N.A. (1996). Distributed algorithms. Morgan Kaufmann Publishers, San Mateo"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Lynch, N.A., Tuttle, M.R.: Hierarchical correctness proofs for distributed algorithms. In: Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 137\u2013151. ACM Press, NewYork (1987)","DOI":"10.1145\/41840.41852"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Nielsen, M., Krukow, K.: On the formal modelling of trust in reputation-based systems. In: J. Karhum\u00e4ki, H. Maurer, G. Paun, G. Rozenberg (eds.) Theory is Forever: Essays Dedicated to Arto Salomaa on the Occasion of his 70th Birthday, Lecture Notes in Computer Science, vol. 3113, pp. 192\u2013204. Springer, Heidelberg(2004)","DOI":"10.1007\/978-3-540-27812-2_18"},{"issue":"1","key":"14_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1017\/S0269888904000116","volume":"19","author":"S.D. Ramchurn","year":"2004","unstructured":"Ramchurn S.D., Huynh D. and Jennings N.R. (2004). Trust in multi-agent systems. The Knowledge Engineering Review 19(1): 1\u201325","journal-title":"The Knowledge Engineering Review"},{"issue":"1","key":"14_CR26","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s10462-004-0041-5","volume":"24","author":"J. Sabater","year":"2005","unstructured":"Sabater J. and Sierra C. (2005). Review on computational trust and reputation models. Artificial Intelligence Review 24(1): 33\u201360","journal-title":"Artificial Intelligence Review"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Weeks, S.: Understanding trust management systems. In: Proceedings from the 2001 IEEE Symposium on Security and Privacy, pp. 94\u2013106. IEEE Computer Society Press (2001)","DOI":"10.1109\/SECPRI.2001.924290"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Winskel, G.: Formal Semantics of Programming Languages : an introduction. Foundations of computing. The MIT Press, Massachusetts Institute of Technology, Cambridge, Massachusetts (1993)","DOI":"10.7551\/mitpress\/3054.001.0001"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-007-0014-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-007-0014-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-007-0014-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T22:28:29Z","timestamp":1736807309000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-007-0014-1"}},"subtitle":["Denotational and operational semantics"],"short-title":[],"issued":{"date-parts":[[2007,2,21]]},"references-count":28,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2007,3,19]]}},"alternative-id":["14"],"URL":"https:\/\/doi.org\/10.1007\/s10207-007-0014-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,2,21]]}}}