{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:36:49Z","timestamp":1778344609335,"version":"3.51.4"},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,9,9]],"date-time":"2023-09-09T00:00:00Z","timestamp":1694217600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,9]],"date-time":"2023-09-09T00:00:00Z","timestamp":1694217600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s13198-023-02112-x","type":"journal-article","created":{"date-parts":[[2023,9,9]],"date-time":"2023-09-09T15:01:17Z","timestamp":1694271677000},"page":"2559-2578","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Provisioning trust-oriented role-based access control for maintaining data integrity in cloud"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0419-4530","authenticated-orcid":false,"given":"Urvashi Rahul","family":"Saxena","sequence":"first","affiliation":[]},{"given":"Taj","family":"Alam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,9]]},"reference":[{"key":"2112_CR1","unstructured":"Accenture (2022) Elevating the cybersecurity discussion: why CEOs need to get more involved in securing the business. [Online]. Available: https:\/\/www.accenture.com\/content\/dam\/accenture\/final\/acom-migration\/custom\/us-en\/invest-cyber-resilience\/pdf\/AccentureElevating-the-Cybersecurity-Discussion.pdf#zoom=40"},{"key":"2112_CR2","doi-asserted-by":"crossref","unstructured":"Aftab MU, Qin Z, Quadri SF, Zakria Javed A, Nie X (2019) Role-based ABAC model for implementing least privileges. In: Proceedings of the 2019 8th international conference on software and computer applications. pp. 467\u2013471","DOI":"10.1145\/3316615.3316667"},{"issue":"1","key":"2112_CR3","doi-asserted-by":"publisher","first-page":"tyy006","DOI":"10.1093\/cybsec\/tyy006","volume":"4","author":"I Agrafiotis","year":"2018","unstructured":"Agrafiotis I, Nurse JR, Goldsmith M, Creese S, Upton D (2018) A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate. J Cybersecur 4(1):tyy006","journal-title":"J Cybersecur"},{"issue":"4","key":"2112_CR4","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/382912.382913","volume":"3","author":"J Ahng","year":"2000","unstructured":"Ahng J, Sandhu R (2000) Role-based authorization constraints specification. ACM Trans Inf Syst Secur 3(4):207\u2013226","journal-title":"ACM Trans Inf Syst Secur"},{"key":"2112_CR5","unstructured":"Aivazpour Z, Valecha R, Chakraborty R (2018) The impact of data breach severity on post-breach online shopping intention"},{"issue":"2","key":"2112_CR6","doi-asserted-by":"publisher","first-page":"202","DOI":"10.14419\/jacst.v3i2.3588","volume":"3","author":"MM Alani","year":"2014","unstructured":"Alani MM (2014) Securing the cloud: threats, attacks and mitigation techniques. J Adv Comput Sci Technol 3(2):202","journal-title":"J Adv Comput Sci Technol"},{"key":"2112_CR7","doi-asserted-by":"crossref","unstructured":"Alshammari A, Alhaidari S, Alharbi A, Zohdy M (2017) Security threats and challenges in cloud computing. In: 2017 IEEE 4th international conference on cyber security and cloud computing (CS Cloud). pp. 46\u201351. IEEE","DOI":"10.1109\/CSCloud.2017.59"},{"key":"2112_CR8","doi-asserted-by":"crossref","unstructured":"Ateniese G, Berns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proc. Of CCS\u201907. pp. 598\u2013609","DOI":"10.1145\/1315245.1315318"},{"issue":"3","key":"2112_CR9","first-page":"309","volume":"33","author":"RD Banker","year":"2019","unstructured":"Banker RD, Feng C (2019) The impact of information security breach incidents on CIO turnover. J Inf Syst 33(3):309\u2013329","journal-title":"J Inf Syst"},{"issue":"12","key":"2112_CR10","doi-asserted-by":"publisher","first-page":"2375","DOI":"10.1109\/TPDS.2012.337","volume":"24","author":"A Barsoum","year":"2012","unstructured":"Barsoum A, Hasan A (2012) Enabling dynamic data and indirect mutual trust for cloud computing storage systems. IEEE Trans Parallel Distrib Syst 24(12):2375\u20132385","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2112_CR11","doi-asserted-by":"crossref","unstructured":"Bassett G, Hylender CD, Langlois P, Pinto A, Widup S (2021) Data breach investigations report. Verizon Business","DOI":"10.1016\/S1361-3723(21)00061-0"},{"issue":"3","key":"2112_CR12","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1145\/501978.501979","volume":"4","author":"E Bertino","year":"2001","unstructured":"Bertino E, Bonatti PA, Ferrari E (2001) TRBAC: a temporal role-based access control model. ACM Trans Inf Syst Secur 4(3):191\u2013233","journal-title":"ACM Trans Inf Syst Secur"},{"issue":"6","key":"2112_CR13","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1142\/S0218194018500225","volume":"28","author":"T Bhattasali","year":"2018","unstructured":"Bhattasali T, Chaki R, Chaki N, Saeed K (2018) An adaptation of context and trust aware workflow-oriented access control for remote health care. Int J Softw Eng Knowl Eng 28(6):781\u2013810","journal-title":"Int J Softw Eng Knowl Eng"},{"key":"2112_CR14","unstructured":"BlazeM, Feigenbaum J, Lacy J (1996) Decentralized trust management. In: Proc. IEEE conference on security and privacy. pp. 164--171. Los alamitos, CA:IEEE Computer Society"},{"key":"2112_CR15","doi-asserted-by":"crossref","unstructured":"Chakraborty S, Ray I (2006) TrustBAC: integrating trust relation-ships into the RBAC model for access control in open systems. In: Proc. 11th ACM symp. access control models technol. pp. 49\u201358","DOI":"10.1145\/1133058.1133067"},{"issue":"1","key":"2112_CR16","first-page":"59","volume":"11","author":"P Choong","year":"2017","unstructured":"Choong P, Hutton E, Richardson PS, Rinaldo V (2017) Protecting the brand: evaluating the cost of security breach from a marketer\u2019s perspective. J Mark Dev Compet 11(1):59","journal-title":"J Mark Dev Compet"},{"key":"2112_CR17","doi-asserted-by":"publisher","first-page":"121759","DOI":"10.1109\/ACCESS.2021.3107426","volume":"9","author":"HN Chua","year":"2021","unstructured":"Chua HN, Teh JS, Herbland A (2021) Identifying the effect of data breach publicity on information security awareness using hierarchical regression. IEEE Access 9:121759\u2013121770","journal-title":"IEEE Access"},{"key":"2112_CR18","doi-asserted-by":"crossref","unstructured":"Deng W, Zhou Z (2012) A flexible RBAC model based on trust in open system. In: Intelligent Systems (GCIS), third global congress on Nov 2012. pp. 400\u2013404","DOI":"10.1109\/GCIS.2012.79"},{"issue":"6","key":"2112_CR19","doi-asserted-by":"publisher","first-page":"3694","DOI":"10.1109\/TEM.2020.3008827","volume":"69","author":"O Durowoju","year":"2020","unstructured":"Durowoju O, Chan HK, Wang X (2020) Investigation of the effect of e-platform information security breaches: a small and medium enterprise supply chain perspective. IEEE Trans Eng Manag 69(6):3694\u20133709","journal-title":"IEEE Trans Eng Manag"},{"key":"2112_CR20","doi-asserted-by":"crossref","unstructured":"Feng F, Lin C, Peng D, Li J (2008) A trust and context-based access control model for distributed systems. In: HPCC 2008. IEEE, September 25\u201327 2008, pp. 629\u2013634","DOI":"10.1109\/HPCC.2008.37"},{"issue":"1","key":"2112_CR21","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1108\/WJE-04-2021-0218","volume":"20","author":"T Garg","year":"2023","unstructured":"Garg T, Kagalwalla N, Puthran S, Churi P, Pawar A (2023) A novel approach of privacy-preserving data sharing system through data-tagging with role-based access control. World J Eng 20(1):12\u201328","journal-title":"World J Eng"},{"issue":"04","key":"2112_CR22","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1109\/TPDS.2018.2870652","volume":"30","author":"M Ghafoorian","year":"2019","unstructured":"Ghafoorian M, Abbasinezhad-Mood D, Shakeri H (2019) A thorough trust and reputation based rbac model for secure data storage in the cloud. IEEE Trans Parallel Distrib Syst 30(04):778\u2013788","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"2s","key":"2112_CR23","first-page":"250","volume":"11","author":"MB Gunjal","year":"2023","unstructured":"Gunjal MB, Sonawane VR (2023) Multi authority access control mechanism for role based access control for data security in the cloud environment. Int J Intell Syst Appl Eng 11(2s):250\u2013264","journal-title":"Int J Intell Syst Appl Eng"},{"key":"2112_CR24","unstructured":"Haislip J, Kolev K, Pinsker R, Steffen T (2019) The economic cost of cybersecurity breaches: a broad-based analysis. In: Workshop on the economics of information security (WEIS). 1:37"},{"key":"2112_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3270619","author":"AR Hakim","year":"2023","unstructured":"Hakim AR, Ramli K, Gunawan TS, Windarta S (2023) A novel digital forensic framework for data breach investigation. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2023.3270619","journal-title":"IEEE Access"},{"key":"2112_CR26","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3544245","author":"C He","year":"2020","unstructured":"He C, HuangFu J, Kohlbeck MJ, Wang L (2020) The impact of customer\u2019s reported cybersecurity breaches on key supplier\u2019s relationship-specific investments and relationship duration. SSRN J. https:\/\/doi.org\/10.2139\/ssrn.3544245","journal-title":"SSRN J"},{"key":"2112_CR27","unstructured":"https:\/\/www.gartner.com\/smarterwithgartner\/6-ways-cloud-migration-costs-go-off-the-rails"},{"key":"2112_CR28","unstructured":"https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/report\/cloud-transformation"},{"key":"2112_CR29","unstructured":"https:\/\/www.ibm.com\/topics\/zero-trust"},{"key":"2112_CR30","unstructured":"https:\/\/www.mckinsey.com\/industries\/technology-media-and-telecommunications\/our-insights\/cloud-migration-opportunity-business-value-grows-but-missteps-abound"},{"key":"2112_CR61","doi-asserted-by":"crossref","unstructured":"IBM Security (2021) Cost of a data breach report 2021. Risk Quantification. 73","DOI":"10.1016\/S1361-3723(21)00082-8"},{"key":"2112_CR31","doi-asserted-by":"crossref","unstructured":"IBM Security\u2019s (2022) Cost of a data breach report 2022, IBM Corp., New York, NY, USA","DOI":"10.12968\/S1353-4858(22)70049-9"},{"issue":"4","key":"2112_CR32","first-page":"574","volume":"21","author":"I Indu","year":"2018","unstructured":"Indu I, Anand PR, Bhaskar V (2018) Identity and access management in cloud environment: Mechanisms and challenges. Eng Sci Technol Int J 21(4):574\u2013588","journal-title":"Eng Sci Technol Int J"},{"issue":"1","key":"2112_CR33","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"BD James","year":"2005","unstructured":"James BD, Bertino E, Latif U, Ghafoor A (2005) A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng 17(1):4\u201323","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"2112_CR34","doi-asserted-by":"crossref","first-page":"1056","DOI":"10.1016\/S1876-6102(14)00454-8","volume":"13","author":"C Jincui","year":"2011","unstructured":"Jincui C, Liqun J (2011) Role-based access control model of cloud computing. Energy Procedia 13:1056\u20131061","journal-title":"Energy Procedia"},{"key":"2112_CR35","doi-asserted-by":"publisher","first-page":"1966","DOI":"10.1007\/s13198-015-0411-1","volume":"8","author":"X Jing","year":"2017","unstructured":"Jing X, Liu Z, Li S, Qiao B, Tan G (2017) A cloud-user behavior assessment based dynamic access control model. Int J Syst Assur Eng Manag 8:1966\u20131975","journal-title":"Int J Syst Assur Eng Manag"},{"key":"2112_CR36","first-page":"584","volume":"07","author":"A Juels","year":"2007","unstructured":"Juels A, Burton J, Kaliski S (2007) PORs: proofs of retrievability for large files. Proc of CCS\u2019 07:584\u2013597","journal-title":"Proc of CCS\u2019"},{"key":"2112_CR37","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/s11747-016-0486-5","volume":"45","author":"S Kashmiri","year":"2017","unstructured":"Kashmiri S, Nicol CD, Hsu L (2017) Birds of a feather: Intra-industry spillover of the target customer data breach and the shielding role of IT, marketing, and CSR. J Acad Mark Sci 45:208\u2013228","journal-title":"J Acad Mark Sci"},{"key":"2112_CR38","doi-asserted-by":"crossref","unstructured":"Kolevski D, Michael K, Abbas R, Freeman M (2021) Cloud data breach disclosures: the consumer and their personally identifiable information (PII)? In: 2021 IEEE conference on Norbert wiener in the 21st century (21CW). pp. 1\u20139. IEEE","DOI":"10.1109\/21CW48944.2021.9532579"},{"issue":"8","key":"2112_CR39","first-page":"871","volume":"2","author":"B Kumar","year":"2015","unstructured":"Kumar B, Sumalatha G (2015) A model to prevent fooding attacks in clouds. Int Res J Eng Technol 2(8):871","journal-title":"Int Res J Eng Technol"},{"issue":"1","key":"2112_CR40","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1049\/iet-ifs.2012.0232","volume":"7","author":"X Li","year":"2013","unstructured":"Li X, Du J (2013) Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing. IET Inf Secur 7(1):39\u201350","journal-title":"IET Inf Secur"},{"issue":"5","key":"2112_CR41","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1109\/TPDS.2014.2321750","volume":"26","author":"X Li","year":"2014","unstructured":"Li X, Ma H, Zhou F, Gui X (2014) Service operator-aware trust scheme for resource matchmaking across multiple clouds. IEEE Trans Parallel Distrib Syst 26(5):1419\u20131429","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"7","key":"2112_CR42","doi-asserted-by":"publisher","first-page":"1402","DOI":"10.1109\/TIFS.2015.2413386","volume":"10","author":"X Li","year":"2015","unstructured":"Li X, Ma H, Zhou F, Yao W (2015) T-Broker: a trust-aware ser-vice brokering scheme for multiple cloud collaborative services. IEEE Trans Inf Forensics Secur 10(7):1402\u20131415","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"2112_CR43","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/CC.2014.6827577","volume":"11","author":"G Lin","year":"2014","unstructured":"Lin G, Wang D, Bie Y, Lei M (2014) MTBAC: a mutual trust-based access control model in cloud computing. China Commun 11(4):154\u2013162","journal-title":"China Commun"},{"issue":"15","key":"2112_CR44","doi-asserted-by":"publisher","first-page":"2618","DOI":"10.1016\/j.ins.2009.01.039","volume":"179","author":"J Luo","year":"2009","unstructured":"Luo J, Ni X, Yong J (2009) A trust degree-based access control in grid environments. Inf Sci 179(15):2618\u20132628","journal-title":"Inf Sci"},{"key":"2112_CR45","doi-asserted-by":"crossref","unstructured":"Malliouris D, Simpson AC (2020) Underlying and consequential costs of cyber security breaches: changes in systematic risk. In: Workshop on the Economics of Information Security","DOI":"10.1016\/S1361-3723(20)30037-3"},{"issue":"1","key":"2112_CR46","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1509\/jm.15.0497","volume":"81","author":"KD Martin","year":"2017","unstructured":"Martin KD, Borah A, Palmatier RW (2017) Data privacy: effects on customer and firm performance. J Mark 81(1):36\u201358","journal-title":"J Mark"},{"issue":"3","key":"2112_CR47","doi-asserted-by":"publisher","first-page":"63","DOI":"10.12775\/CJFA.2017.017","volume":"6","author":"M Meisner","year":"2017","unstructured":"Meisner M (2017) Financial consequences of cyber attacks leading to data breaches in healthcare sector. Copernic J Financ Account 6(3):63\u201373","journal-title":"Copernic J Financ Account"},{"key":"2112_CR48","unstructured":"Morgan S (2020). Cybercrime to cost the World $10.5 Trillion Annually by 2025. Cybersecurity Ventures"},{"key":"2112_CR49","unstructured":"Muzatko S, Bansal G (2020) Consumer skepticism as it relates to e commerce data breaches and company efforts to enhance trust. In: Proc. MWAIS, 1\u20135"},{"key":"2112_CR50","unstructured":"LiN, Mitchell JC, Winsborough WH (2002) Design of A role-based trust management framework. In: Proc. 2002 IEEE symposium on security and privacy. pp. 114\u2013131. LosAlamitos,CA:IEEE Computer Society"},{"issue":"2","key":"2112_CR51","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/TPDS.2015.2408613","volume":"27","author":"TH Noor","year":"2015","unstructured":"Noor TH, Sheng QZ, Yao L, Dustdar S, Ngu AHH (2015) CloudArmor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27(2):367\u2013380","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2112_CR52","doi-asserted-by":"crossref","unstructured":"Oleshchuk V (2012) Trust\u2014Aware RBAC. In: Proc Int Conf. Math. Methods Models Archit. Computer Netw. Security. 97\u2013107","DOI":"10.1007\/978-3-642-33704-8_9"},{"issue":"2","key":"2112_CR53","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/354876.354878","volume":"3","author":"S Osborn","year":"2000","unstructured":"Osborn S, Sandhu R (2000) Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans Inf Syst Secur 3(2):85\u2013106","journal-title":"ACM Trans Inf Syst Secur"},{"key":"2112_CR54","doi-asserted-by":"publisher","DOI":"10.1186\/1869-0238-4-5","author":"MDH Parekh","year":"2013","unstructured":"Parekh MDH, Sridaran R (2013) An analysis of security challenges in cloud computing. Int J Adv Comput Sci Appl. https:\/\/doi.org\/10.1186\/1869-0238-4-5","journal-title":"Int J Adv Comput Sci Appl"},{"key":"2112_CR55","unstructured":"Pool JK, Akhlaghpour S, Fatehi F, Burton-Jones A (2019) Causes and impacts of personal health information (PHI) breaches: a scoping review and thematic analysis. In: Twenty-Third pacific Asia conference on information systems, China July"},{"key":"2112_CR56","doi-asserted-by":"publisher","first-page":"102508","DOI":"10.1016\/j.cose.2021.102508","volume":"112","author":"Y Roumani","year":"2022","unstructured":"Roumani Y (2022) Detection time of data breaches. Comput Secur 112:102508","journal-title":"Comput Secur"},{"key":"2112_CR57","doi-asserted-by":"crossref","unstructured":"Sandhu R, Zhang X (2005) Peer-to-peer access control architecture using trusted computing technology. In: Proc. 10th ACM symposium on access control models and technologies (SACMAT\u201905), Stockholm, Sweeden. pp. 147\u2013158","DOI":"10.1145\/1063979.1064005"},{"key":"2112_CR58","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-021-00402-1","author":"UR Saxena","year":"2021","unstructured":"Saxena UR, Alam T (2021) Role based access control using identity and broadcast based encryption for securing cloud data. J Comput Virol Hack Tech. https:\/\/doi.org\/10.1007\/s11416-021-00402-1","journal-title":"J Comput Virol Hack Tech"},{"key":"2112_CR59","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-023-01896-2","author":"UR Saxena","year":"2023","unstructured":"Saxena UR, Alam T (2023) Role-based access using partial homomorphic encryption for securing cloud data. Int J Syst Assur Eng Manag. https:\/\/doi.org\/10.1007\/s13198-023-01896-2","journal-title":"Int J Syst Assur Eng Manag"},{"issue":"4","key":"2112_CR60","doi-asserted-by":"publisher","first-page":"103638","DOI":"10.1016\/j.im.2022.103638","volume":"59","author":"F Schlackl","year":"2022","unstructured":"Schlackl F, Link N, Hoehle H (2022) Antecedents and consequences of data breaches: a systematic review. Inf Manag 59(4):103638","journal-title":"Inf Manag"},{"key":"2112_CR62","doi-asserted-by":"crossref","unstructured":"Song Z, Wang GA, Fan W (2017) Firm actions toward data breach incidents and firm equity value: an empirical study","DOI":"10.24251\/HICSS.2017.602"},{"key":"2112_CR63","doi-asserted-by":"crossref","unstructured":"Tan Z, Tang Z, Li R, Sallam A, Yang L (2011) Research on trust-based access control model in cloud computing. In: Proc. 6th IEEEJoint Int. Inf. Technol. Artif. Intell. Conf., 2011, pp. 339\u2013344","DOI":"10.1109\/ITAIC.2011.6030345"},{"key":"2112_CR64","doi-asserted-by":"crossref","unstructured":"Toahchoodee M, Abdunabi R, Ray I, Ray I (2009) A trust-based access control model for pervasive computing applications. In DBSec 2009, ser. LNCS, vol. 5645. Springer, July 12\u201315 2009. pp. 307\u2013314","DOI":"10.1007\/978-3-642-03007-9_22"},{"key":"2112_CR65","doi-asserted-by":"crossref","unstructured":"Uikey C, Bhilare DS (2017) Trust RBAC: trust role-based access control model in multi-domain cloud environments. In: Proc. Int. Conf. Inf. Commun. Instrum. Control, 2017. pp. 1\u20137","DOI":"10.1109\/ICOMICON.2017.8279087"},{"issue":"2","key":"2112_CR66","first-page":"162","volume":"20","author":"P Wang","year":"2019","unstructured":"Wang P, D\u2019Cruze H, Wood D (2019) Economic costs and impacts of business data breaches. Issues Inf Syst 20(2):162","journal-title":"Issues Inf Syst"},{"key":"2112_CR67","unstructured":"Walt Teh-Ming Yao.Fidelis (2003) A policy-driven trust management framework. In: Proc. 1st Int conference on trust mangement. LNCS 2692. Springer, Berlin"},{"issue":"10","key":"2112_CR68","doi-asserted-by":"publisher","first-page":"1755","DOI":"10.1109\/JPROC.2010.2059690","volume":"98","author":"H Yu","year":"2010","unstructured":"Yu H, Shen Z, Miao C, Leung C, Niyato D (2010) A survey of trust and reputation management systems in wireless communications. Proc IEEE 98(10):1755\u20131772","journal-title":"Proc IEEE"},{"issue":"9","key":"2112_CR69","doi-asserted-by":"publisher","first-page":"2167","DOI":"10.1109\/TIFS.2018.2812166","volume":"13","author":"P Zhang","year":"2018","unstructured":"Zhang P, Kong Y, Zhou M (2018) A domain partition-based trust model for unreliable clouds. IEEE Trans Inf Forensics Secur 13(9):2167\u20132178","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"11","key":"2112_CR70","doi-asserted-by":"publisher","first-page":"2381","DOI":"10.1109\/TIFS.2015.2455952","volume":"10","author":"L Zhou","year":"2015","unstructured":"Zhou L, Varadharajan V, Hitchens M (2015) Trust enhanced cryptographic role-based access control for secure cloud data storage. IEEE Trans Inf Forensics Secur 10(11):2381\u20132395","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"2112_CR71","first-page":"118","volume":"10","author":"C Zhu","year":"2014","unstructured":"Zhu C, Nicanfar H, Leung VCM, Yang LT (2014) An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans Inf Forensics Secur 10(1):118\u2013131","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-023-02112-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-023-02112-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-023-02112-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T14:17:48Z","timestamp":1699971468000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-023-02112-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,9]]},"references-count":71,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["2112"],"URL":"https:\/\/doi.org\/10.1007\/s13198-023-02112-x","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,9]]},"assertion":[{"value":"14 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare that this research work does not involve any participation of human or animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human or animals rights"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}