{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T23:35:22Z","timestamp":1718494522828},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2008,1,29]],"date-time":"2008-01-29T00:00:00Z","timestamp":1201564800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2009,2]]},"DOI":"10.1007\/s10844-007-0049-9","type":"journal-article","created":{"date-parts":[[2008,1,28]],"date-time":"2008-01-28T06:57:20Z","timestamp":1201503440000},"page":"75-104","source":"Crossref","is-referenced-by-count":37,"title":["An interoperable context sensitive model of trust"],"prefix":"10.1007","volume":"32","author":[{"given":"Indrakshi","family":"Ray","sequence":"first","affiliation":[]},{"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Sudip","family":"Chakraborty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,1,29]]},"reference":[{"key":"49_CR1","first-page":"1769","volume-title":"Proceedings of the 33rd Annual Hawaii International Conference on System Sciences","author":"A. Abdul-Rahman","year":"2000","unstructured":"Abdul-Rahman, A., & Hailes, S. (2000). Supporting trust in virtual communities. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (pp. 1769\u20131777). Maui, HI, USA: IEEE Computer Society, January."},{"key":"49_CR2","unstructured":"Bacharach, M., & Gambetta, D. (2000). Trust as type identification. In C. Castelfranchi & Y. Tan (Eds.), Trust and Deception in Virtual Societies (pp. 1\u201326). Kluwer."},{"key":"49_CR3","first-page":"3","volume-title":"Proceedings of the 3rd European Symposium on Research in Computer Security, volume 875 of Lecture Notes in Computer Science","author":"T. Beth","year":"1994","unstructured":"Beth, T., Borcherding, M., & Klein, B. (1994). Valuation of trust in open networks. In D. Gollmann (Ed.), Proceedings of the 3rd European Symposium on Research in Computer Security, volume 875 of Lecture Notes in Computer Science (pp. 3\u201318). Brighton, UK: Springer, November."},{"issue":"1","key":"49_CR4","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., & Needham, R. M. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1), 18\u201336, February.","journal-title":"ACM Transactions on Computer Systems"},{"key":"49_CR5","unstructured":"Cohen, M. S., Parasuraman, R., Serfaty, R. S., & Andes, R. C. (1997). Trust in decision aids: A model and a training strategy. Technical Report USAATCOM TR 97-D-4. Fort Eustis, VA, USA: Cognitive Technologies Inc."},{"issue":"4","key":"49_CR6","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T. Grandison","year":"2000","unstructured":"Grandison, T., & Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications Surveys and Tutorials, 3(4), 2\u201316, Fourth Quarter.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"2","key":"49_CR7","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1006\/knac.1993.1008","volume":"5","author":"T. R. Gruber","year":"1993","unstructured":"Gruber, T. R. (1993). A translation approach to portable ontology specifications. Knowledge Acquisition, 5(2), 199\u2013220.","journal-title":"Knowledge Acquisition"},{"key":"49_CR8","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/SECPRI.1997.601312","volume-title":"Proceedings of the 1997 IEEE Symposium on Security and Privacy","author":"S. Jajodia","year":"1997","unstructured":"Jajodia, S., Samarati, P., & Subrahmanian, V. (1997). A logical language for expressing authorizations. In Proceedings of the 1997 IEEE Symposium on Security and Privacy (pp. 31\u201342). Oakland, CA, USA: IEEE Computer Society, May."},{"key":"49_CR9","unstructured":"Jones, A. J. I., & Firozabadi, B. S. (2000). On the characterization of a trusting agent\u2014aspects of a formal approach. In C. Castelfranchi & Y. Tan (Eds.), Trust and Deception in Virtual Societies (pp. 163\u2013174). Kluwer."},{"key":"49_CR10","unstructured":"J\u00f8sang, A. (1997). Artificial reasoning with subjective logic. In Proceedings of the Second Australian Workshop on Commonsense Reasoning. Perth, Australia, December."},{"key":"49_CR11","first-page":"329","volume-title":"Proceedings of the 5th European Symposium on Research in Computer Security, volume 1485 of Lecture Notes in Computer Science","author":"A. J\u00f8sang","year":"1998","unstructured":"J\u00f8sang, A. (1998). A subjective metric of authentication. In J.-J. Quisquater, et al. (Eds.), Proceedings of the 5th European Symposium on Research in Computer Security, volume 1485 of Lecture Notes in Computer Science (pp. 329\u2013344). Louvain-la-Neuve, Belgium: Springer, September."},{"key":"49_CR12","volume-title":"Proceedings of Network and Distributed Systems Security Symposium","author":"A. J\u00f8sang","year":"1999","unstructured":"J\u00f8sang, A. (1999). An algebra for assessing trust in certification chains. In Proceedings of Network and Distributed Systems Security Symposium. San Diego, CA, USA: Internet Society, February."},{"issue":"3","key":"49_CR13","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A. J\u00f8sang","year":"2001","unstructured":"J\u00f8sang, A. (2001). A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3), 279\u2013311, June.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"2","key":"49_CR14","first-page":"139","volume":"4","author":"A. J\u00f8sang","year":"2006","unstructured":"J\u00f8sang, A., Gray, E., & Kinateder, M. (2006). Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems Journal, 4(2), 139\u2013161.","journal-title":"Web Intelligence and Agent Systems Journal"},{"issue":"6","key":"49_CR15","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1016\/S0167-4048(01)00605-8","volume":"20","author":"S. Purser","year":"2001","unstructured":"Purser, S. (2001). A simple graphical tool for modelling trust. Computers and Security, 20(6), 479\u2013484, September.","journal-title":"Computers and Security"},{"key":"49_CR16","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1109\/SECPRI.1988.8112","volume-title":"Proceedings of the 1988 IEEE Symposium on Security and Privacy","author":"P. V. Rangan","year":"1988","unstructured":"Rangan, P. V. (1988). An axiomatic basis of trust in distributed systems. In Proceedings of the 1988 IEEE Symposium on Security and Privacy (pp. 204\u2013211). Oakland, CA, USA: IEEE Computer Society, April."},{"key":"49_CR17","first-page":"260","volume-title":"Proceedings of the 9th European Symposium on Research in Computer Security, volume 3193 of Lecture Notes In Computer Science","author":"I. Ray","year":"2004","unstructured":"Ray, I., & Chakraborty, S. (2004). A vector model of trust for developing trustworthy systems. In P. Samarati, P. Ryan, D. Gollmann, & R. Molva (Eds.), Proceedings of the 9th European Symposium on Research in Computer Security, volume 3193 of Lecture Notes In Computer Science (pp. 260\u2013275). Sophia Antipolis, Frech Riviera, France: Springer, September."},{"key":"49_CR18","first-page":"91","volume-title":"Proceedings of 1st International Conference on Information Systems Security, volume 3803 of Lecture Notes in Computer Science","author":"I. Ray","year":"2005","unstructured":"Ray, I., Chakraborty, S., & Ray, I. (2005). VTrust: A trust management system based on a vector model of trust. In S. Jajodia, & C. Mazumdar (Eds.), Proceedings of 1st International Conference on Information Systems Security, volume 3803 of Lecture Notes in Computer Science (pp. 91\u2013105). Kolkata, India: Springer, December."},{"key":"49_CR19","doi-asserted-by":"crossref","unstructured":"Stevens, M., & Williams, P. D. (2007). Use of trust vectors for cybercraft and the limits of usable data history for trust vectors. In 2007 IEEE Computational Intelligence for Security and Defense Applications. Honolulu, HI, USA, April.","DOI":"10.1109\/CISDA.2007.368153"},{"issue":"2","key":"49_CR20","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1017\/S0269888900007797","volume":"11","author":"M. Uschold","year":"1996","unstructured":"Uschold, M., & Gr\u00fcninger, M. (1996). Ontologies: Principles, methods, and applications. Knowledge Engineering Review, 11(2), 93\u2013155.","journal-title":"Knowledge Engineering Review"},{"key":"49_CR21","first-page":"275","volume-title":"Proceedings of IEEE Conference on E-Commerce","author":"L. Xiong","year":"2003","unstructured":"Xiong, L., & Liu, L. (2003). A reputation-based trust model for peer-to-peer ecommerce communities. In Proceedings of IEEE Conference on E-Commerce (pp. 275\u2013284). Newport Beach, CA, USA: IEEE Computer Society, June."},{"issue":"1","key":"49_CR22","first-page":"45","volume":"7","author":"R. Yahalom","year":"1994","unstructured":"Yahalom, R., & Klein, B. (1994). Trust-based navigation in distributed systems. Computing Systems, 7(1), 45\u201373, Winter.","journal-title":"Computing Systems"},{"key":"49_CR23","first-page":"150","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"R. Yahalom","year":"1993","unstructured":"Yahalom, R., Klein, B., & Beth, T. (1993). Trust relationship in secure systems: A distributed authentication perspective. In Proceedings of the IEEE Symposium on Security and Privacy, (pp. 150\u2013164). Oakland, CA, USA: IEEE Computer Society, May."}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-007-0049-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-007-0049-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-007-0049-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T22:10:47Z","timestamp":1559254247000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-007-0049-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,29]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,2]]}},"alternative-id":["49"],"URL":"https:\/\/doi.org\/10.1007\/s10844-007-0049-9","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,1,29]]}}}