{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T21:19:46Z","timestamp":1714943986226},"reference-count":35,"publisher":"Elsevier","isbn-type":[{"value":"9780128015957","type":"print"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1016\/b978-0-12-801595-7.00021-5","type":"book-chapter","created":{"date-parts":[[2015,6,5]],"date-time":"2015-06-05T20:14:45Z","timestamp":1433535285000},"page":"463-493","source":"Crossref","is-referenced-by-count":6,"title":["Computational trust methods for security quantification in the cloud ecosystem"],"prefix":"10.1016","author":[{"given":"Sheikh Mahbub","family":"Habib","sequence":"first","affiliation":[]},{"given":"Florian","family":"Volk","sequence":"additional","affiliation":[]},{"given":"Sascha","family":"Hauke","sequence":"additional","affiliation":[]},{"given":"Max","family":"M\u00fchlh\u00e4user","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0010","series-title":"Cloud Audit","author":"CSA","year":"2012"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0015","series-title":"Consensus Assessments Initiative (CAI) Questionnaire","author":"CSA","year":"2011"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0020","series-title":"Security, Assurance & Trust Registry (STAR)","author":"CSA","year":"2012"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0025","series-title":"Security, Assurance & Trust Registry (STAR) FAQ","author":"CSA","year":"2013"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0030","first-page":"213","article-title":"Can we trust trust?","author":"Gambetta","year":"1990"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb9000","first-page":"213","article-title":"Can we trust trust?","author":"Gambetta","year":"2000"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0035","doi-asserted-by":"crossref","unstructured":"Grandison, T., 2007. Conceptions of Trust: Definition, Constructs, and Models, Trust in E-Services: Technologies, Practices and Challenges. IGI Global, Hershey, PA (Chapter 1), pp. 1\u201328.","DOI":"10.4018\/978-1-59904-207-7.ch001"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0040","unstructured":"Habib, S.M., 2014. Trust Establishment Mechanisms for Distributed Service Environments. Ph.D. thesis. Technische Universit\u00e4t Darmstadt."},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0045","series-title":"IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012","first-page":"109","article-title":"Fusion of opinions under uncertainty and conflict\u2014application to trust assessment for cloud marketplaces","author":"Habib","year":"2012"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0050","series-title":"IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2013","first-page":"459","article-title":"A trust-aware framework for evaluating security controls of service providers in cloud marketplaces","author":"Habib","year":"2013"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0055","first-page":"45","article-title":"Distributed trust management for validating sla choreographies","author":"Haq","year":"2010"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0060","series-title":"What\u2019s Holding Back the Cloud","author":"Intel","year":"2012"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0065","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","article-title":"A logic for uncertain probabilities","volume":"9","author":"J\u00f8sang","year":"2001","journal-title":"Int. J. Uncertainty Fuzziness Knowledge Based Syst."},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0070","series-title":"IFIPTM","first-page":"68","article-title":"Trust transitivity and conditional belief reasoning","author":"J\u00f8sang","year":"2012"},{"issue":"2","key":"10.1016\/B978-0-12-801595-7.00021-5_bb0075","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","article-title":"A survey of trust and reputation systems for online service provision","volume":"43","author":"J\u00f8sang","year":"2007","journal-title":"Decis. Support Syst."},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0080","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1093\/heapro\/dap012","article-title":"Consumer testing of the acceptability and effectiveness of front-of-pack food labelling systems for the Australian grocery market","volume":"24","author":"Kelly","year":"2009","journal-title":"Health Promot. Int."},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0085","series-title":"Proceedings of the HotCloud\u201909","first-page":"5","article-title":"Private virtual infrastructure for cloud computing","author":"Krautheim","year":"2009"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0090","series-title":"Hype Cycle for Emerging Technologies","author":"LeHong","year":"2014"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0095","series-title":"Proceedings of the 2004 IEEE International Conference on Services Computing, SCC\u20192004","first-page":"303","article-title":"Enhancing grid security with trust management","author":"Lin","year":"2004"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0100","series-title":"Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop","first-page":"103","article-title":"Benchmarking cloud security level agreements using quantitative policy trees","author":"Luna Garcia","year":"2012"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0105","series-title":"The Meanings of Trust","author":"McKnight","year":"1996"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0110","unstructured":"Nagarajan, A., 2010. Techniques for trust enhanced distributed authorisation using trusted platforms. Ph.D. thesis. Macquarie Universtiy."},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0115","series-title":"The 11th International Conference on Privacy, Security and Trust (PST)","first-page":"333","article-title":"Communicating trustworthiness using radar graphs: a detailed look","author":"Nurse","year":"2013"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0120","first-page":"97","article-title":"Trust model for optimized cloud services","volume":"374","author":"Pawar","year":"2012"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0125","series-title":"Proceedings of the ACM SAC","first-page":"1294","article-title":"Extending bayesian trust models regarding context-dependence and user friendly representation","author":"Ries","year":"2009"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0130","unstructured":"Ries, S., 2009b. Trust in Ubiquitous Computing. Doctoral thesis. Technische Universit\u00e4t Darmstadt."},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0135","first-page":"254","article-title":"Certainlogic: a logic for modeling trust and uncertainty","volume":"6740","author":"Ries","year":"2011"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0140","series-title":"International Workshop on Recommendation and Collaboration (ReColl \u201908) in Conjunction with the International Conference on Intelligent User Interfaces (IUI\u201908)","article-title":"Evaluating user representations for the trustworthiness of interaction partners","author":"Ries","year":"2008"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0145","series-title":"Proceedings of the NSPW\u201904","first-page":"67","article-title":"Property-based attestation for computing platforms: caring about properties, not mechanisms","author":"Sadeghi","year":"2004"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0150","first-page":"1","article-title":"Property-based TPM virtualization","volume":"5222","author":"Sadeghi","year":"2008"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0155","series-title":"Proceedings of the ACM CCSW\u201910","first-page":"43","article-title":"Seeding clouds with trust anchors","author":"Schiffman","year":"2010"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0160","series-title":"Proceedings of the 2011 ACM Symposium on Applied Computing","first-page":"1739","article-title":"A formal approach towards measuring trust in distributed systems","author":"Schryen","year":"2011"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0165","series-title":"The 10 biggest cloud outages of 2014 (so far)","author":"Tsidulko","year":"2014"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0170","series-title":"12th Annual Conference on Privacy, Security and Trust (PST 2014)","first-page":"391","article-title":"Communicating and visualising multicriterial trustworthiness under uncertainty","author":"Volk","year":"2014"},{"key":"10.1016\/B978-0-12-801595-7.00021-5_bb0175","doi-asserted-by":"crossref","first-page":"1130","DOI":"10.1007\/s11390-010-9394-1","article-title":"A cloud-based trust model for evaluating quality of web services","volume":"25","author":"Wang","year":"2010","journal-title":"J. Comput. Sci. Technol."}],"container-title":["The Cloud Security Ecosystem"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128015957000215?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:B9780128015957000215?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T04:26:35Z","timestamp":1537590395000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780128015957000215"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9780128015957"],"references-count":35,"URL":"https:\/\/doi.org\/10.1016\/b978-0-12-801595-7.00021-5","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}