{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T05:13:01Z","timestamp":1768281181336,"version":"3.49.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T00:00:00Z","timestamp":1754438400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T00:00:00Z","timestamp":1754438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Fundamental Research Funds for the Central Universities","award":["no. 2242022k30007"],"award-info":[{"award-number":["no. 2242022k30007"]}]},{"DOI":"10.13039\/100019929","name":"Purple Mountain Laboratories","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100019929","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science Foundation","award":["no.61601113"],"award-info":[{"award-number":["no.61601113"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10207-025-01108-x","type":"journal-article","created":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:30:38Z","timestamp":1754487038000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive trust evaluation model based on container security analysis in the Docker platform"],"prefix":"10.1007","volume":"24","author":[{"given":"Tao","family":"Li","sequence":"first","affiliation":[]},{"given":"Yanyi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,6]]},"reference":[{"key":"1108_CR1","unstructured":"Merkel, D.: Docker: lightweight Linux containers for consistent development and deployment. Linux J. 2 (2014)"},{"key":"1108_CR2","doi-asserted-by":"crossref","unstructured":"Alyas,Tahir, et al.: Container performance and vulnerability management for container security using docker engine. Secur. Commun.Netw. 1\u201315 (2022)","DOI":"10.1155\/2022\/6819002"},{"key":"1108_CR3","doi-asserted-by":"crossref","unstructured":"Patra, M.K., et al.: Docker security: threat model and best practices to secure a docker container. IEEE 2nd International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC), 1\u20136 (2022)","DOI":"10.1109\/iSSSC56467.2022.10051481"},{"key":"1108_CR4","unstructured":"Blaze, M., et al.: Decentralized trust management. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy: 164\u2013173 (1996)"},{"key":"1108_CR5","doi-asserted-by":"crossref","unstructured":"Sun, N., et al.: A network state based reliability evaluation model for WSNs. Proceedings of the 18th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing, 303\u2013308 (2017)","DOI":"10.1109\/SNPD.2017.8022737"},{"key":"1108_CR6","doi-asserted-by":"crossref","unstructured":"Song, S., et al.: On the value of sequence-based system call filtering for container security. IEEE 16th International Conference on Cloud Computing (CLOUD), 296\u2013307 (2023)","DOI":"10.1109\/CLOUD60044.2023.00043"},{"key":"1108_CR7","doi-asserted-by":"publisher","first-page":"3717","DOI":"10.52783\/tjjpt.v44.i3.2091","volume":"44","author":"V Mahavaishnavi","year":"2023","unstructured":"Mahavaishnavi, V., et al.: Container security intelligence: Leveraging machine learning for anomaly detection in containerized applications. Tuijin Jishu\/Journal Propuls. Technol. 44, 3717\u20133730 (2023)","journal-title":"Tuijin Jishu\/Journal Propuls. Technol."},{"key":"1108_CR8","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.55214\/25768484.v9i1.4382","volume":"9","author":"Z Mori\u0107","year":"2025","unstructured":"Mori\u0107, Z., et al.: The role of container security in application development. Edelweiss Appl. Sci. Technol. 9, 1243\u20131261 (2025)","journal-title":"Edelweiss Appl. Sci. Technol."},{"key":"1108_CR9","doi-asserted-by":"crossref","unstructured":"Klooster, T., et al.: Effectiveness and scalability of fuzzing techniques in CI\/CD pipelines. ArXiv abs\/2205.14964 (2022)","DOI":"10.1109\/SBFT59156.2023.00015"},{"key":"1108_CR10","doi-asserted-by":"publisher","first-page":"2626","DOI":"10.30574\/wjarr.2024.24.3.4003","volume":"24","author":"R Molleti","year":"2024","unstructured":"Molleti, R.: Container runtime security detection and prevention techniques. World J. Adv. Res. Reviews. 24, 2626\u20132639 (2024)","journal-title":"World J. Adv. Res. Reviews"},{"key":"1108_CR11","doi-asserted-by":"crossref","unstructured":"Mycek, A., and Maryna, L.: Security of containerization platforms: threat modelling, vulnerability analysis, and riskmitigation. Euro. Conf. Model. Simul. 38 (2024)","DOI":"10.7148\/2024-0585"},{"key":"1108_CR12","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/TDSC.2018.2879605","volume":"18","author":"X Gao","year":"2018","unstructured":"Gao, X., et al.: A study on the security implications of information leakages in container clouds. IEEE Trans. Dependable Secur. Comput. 18, 174\u2013191 (2018)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"1108_CR13","doi-asserted-by":"crossref","unstructured":"Xu, S., et al.: Condo: enhancing container isolation through kernel permission data protection. IEEE Trans. Inf. Forensics Secur. 19, 6168\u20136183 (2024).","DOI":"10.1109\/TIFS.2024.3411915"},{"key":"1108_CR14","doi-asserted-by":"crossref","unstructured":"Tunde-Onadele, et al.: Olufogorehan self-supervised machine learning framework for online container security attack detection. ACM Trans. Auto. Adap. Systems 18, 1\u201324 (2024)","DOI":"10.1145\/3665795"},{"key":"1108_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/1550147718776924","volume":"14","author":"Z Chen","year":"2018","unstructured":"Chen, Z., et al.: Trust evaluation model of cloud user based on behavior data. Int. J. Distrib. Sens. Netw. 14, 1\u201312 (2018)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"1108_CR16","doi-asserted-by":"crossref","unstructured":"Sagar, S., et al.: MobiQuitous. Towards a machine learning-driven trust evaluation model for social internet of things: a time-aware approach. Proceedings of the 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services: 45\u201353 (2020)","DOI":"10.1145\/3448891.3448927"},{"key":"1108_CR17","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1080\/0951192X.2019.1575982","volume":"32","author":"Yang","year":"2019","unstructured":"Yang, Xingxing, et al.: A service satisfaction-based trust evaluation model for cloud manufacturing. Int. J. Comput. Integr. Manuf. 32, 533\u2013545 (2019)","journal-title":"Int. J. Comput. Integr. Manuf."},{"key":"1108_CR18","doi-asserted-by":"publisher","first-page":"2413","DOI":"10.1109\/TIFS.2021.3054968","volume":"16","author":"Babun","year":"2021","unstructured":"Babun, Leonardo, et al.: CPS Device-Class identification via behavioral fingerprinting:from theory to practice. IEEE Trans. Inf. Forensics Secur. 16, 2413\u20132428 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1108_CR19","doi-asserted-by":"publisher","first-page":"3548","DOI":"10.1109\/JSAC.2023.3310094","volume":"41","author":"J Guo","year":"2023","unstructured":"Guo, J., et al.: TFL-DT: A trust evaluation scheme for federated learning in digital twin for mobile networks. IEEE J. Sel. Areas Commun. 41, 3548\u20133560 (2023)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"1108_CR20","doi-asserted-by":"crossref","unstructured":"Hua, Z., et al.: Trust evaluation mechanism of terminal device in industrial edge computing environment. 2024 China automation Congress (CAC): 4043\u20134047 (2024)","DOI":"10.1109\/CAC63892.2024.10864597"},{"key":"1108_CR21","first-page":"1","volume":"02967","author":"T Bui","year":"2015","unstructured":"Bui, T.: Anal. Docker Secur. ArXiv:1501. 02967, 1\u201312 (2015)","journal-title":"Anal. Docker Secur. ArXiv:1501"},{"key":"1108_CR22","doi-asserted-by":"publisher","first-page":"1532","DOI":"10.3390\/su14148374","volume":"14","author":"U Islam","year":"2022","unstructured":"Islam, U., et al.: Detection of distributed denial of service (DDoS) attacks in IoT-Based monitoring system of banking sector using machine learning models. Sustainability. 14, 1532 (2022)","journal-title":"Sustainability"},{"key":"1108_CR23","doi-asserted-by":"crossref","unstructured":"Bachiega, N., Garcia, et al.: Performance evaluation of container\u2019s shared volumes. 2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW): 114\u2013123 (2020)","DOI":"10.1109\/ICSTW50294.2020.00031"},{"key":"1108_CR24","doi-asserted-by":"crossref","unstructured":"Garcke, H., et al.: Structure-preserving parametric finite element method for curve diffusion based on Lagrange multiplier approaches. ArXiv abs\/2408.13443 (2024)","DOI":"10.2139\/ssrn.5450733"},{"key":"1108_CR25","doi-asserted-by":"publisher","first-page":"110639","DOI":"10.1016\/j.patcog.2024.110639","volume":"155","author":"J Heidari","year":"2024","unstructured":"Heidari, J., et al.: A novel K-means and K-medoids algorithms for clustering non-spherical-shape clusters non-sensitive to outliers. Pattern Recognit. 155, 110639 (2024)","journal-title":"Pattern Recognit."},{"key":"1108_CR26","doi-asserted-by":"publisher","first-page":"43679","DOI":"10.1109\/ACCESS.2019.2905550","volume":"7","author":"X Wu","year":"2019","unstructured":"Wu, X., et al.: BLTM: Beta and LQI based trust model for wireless sensor networks. IEEE Access. 7, 43679\u201343690 (2019)","journal-title":"IEEE Access."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01108-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01108-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01108-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T11:37:48Z","timestamp":1760614668000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01108-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,6]]},"references-count":26,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1108"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01108-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,6]]},"assertion":[{"value":"6 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"190"}}