{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:09:46Z","timestamp":1761707386844},"reference-count":14,"publisher":"Elsevier BV","issue":"7","license":[{"start":{"date-parts":[[2001,10,1]],"date-time":"2001-10-01T00:00:00Z","timestamp":1001894400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2001,10]]},"DOI":"10.1016\/s0167-4048(01)00710-6","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T09:46:56Z","timestamp":1027590416000},"page":"592-611","source":"Crossref","is-referenced-by-count":20,"title":["Evaluating Trust in a Public Key Certification Authority"],"prefix":"10.1016","volume":"20","author":[{"given":"David W","family":"Chadwick","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Basden","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(01)00710-6_BIB1","unstructured":"ISO\/ITU-T Rec. X.509 (1997) The Directory: Authentication Framework"},{"key":"10.1016\/S0167-4048(01)00710-6_BIB2","doi-asserted-by":"crossref","unstructured":"Chokhani, S., Ford, W. \u201cInternet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework\u201d. RFC 2527. March 1999.","DOI":"10.17487\/rfc2527"},{"key":"10.1016\/S0167-4048(01)00710-6_BIB3","doi-asserted-by":"crossref","unstructured":"Attarwala, F.T., Basden, A., \u201cA methodology for constructing Expert Systems\u201d, R&D Management, v.15, n.2, pp.141\u2013149. 1985","DOI":"10.1111\/j.1467-9310.1985.tb00531.x"},{"key":"10.1016\/S0167-4048(01)00710-6_BIB4","unstructured":"Basden, A., Watson, I. D., Brandon, P. S. \u201cClient Centred: an approach to developing knowledge based systems\u201d, Council for the Central Laboratory of the Research Councils, U.K. 1995."},{"key":"10.1016\/S0167-4048(01)00710-6_BIB5","doi-asserted-by":"crossref","unstructured":"Winograd, T. \u201cFrom programming environments to environments for designing\u201d, Comm. ACM., v.38, n.6, pp.65\u201374. 1995","DOI":"10.1145\/203241.203259"},{"key":"10.1016\/S0167-4048(01)00710-6_BIB6","doi-asserted-by":"crossref","unstructured":"Basden, A., Hibberd, P., R. \u201cUser interface issues raised by knowledge refinement\u201d, Int. J. Human Computer Studies, v.45, pp.135\u2013155. 1996","DOI":"10.1006\/ijhc.1996.0046"},{"key":"10.1016\/S0167-4048(01)00710-6_BIB7","doi-asserted-by":"crossref","unstructured":"Basden, A.; Evans, J. B.; Chadwick, D. W.; Young, A. \u201cCoping with Poorly Understood Domains: The Example of Internet Trust\u201d, Research And Development In Expert Systems \u2014 1998 ; Issue 15 ; Pages: 114\u2013132, presented at Expert Systems 98 conference, December 1998.","DOI":"10.1007\/978-1-4471-0835-1_8"},{"key":"10.1016\/S0167-4048(01)00710-6_BIB8","doi-asserted-by":"crossref","unstructured":"Hines, J.G., Basden, A. \u201cExperience with the use of computers to handle corrosion knowledge\u201d, Br. Corros. J., v.21, n.3, pp.151\u2013156. (1986)","DOI":"10.1179\/000705986798272109"},{"key":"10.1016\/S0167-4048(01)00710-6_BIB9","unstructured":"Hickman, F., Killin, J., Land, L., Mulhall, T., Porter, D., Taylor, R. \u201cAnalysis for Knowledge-Based Systems, a practical guide to the KADS methodology\u201d, Ellis Horwood. (1989)"},{"key":"10.1016\/S0167-4048(01)00710-6_BIB10","unstructured":"The Post Office (a British Statutory Corporation). \u201cViacode Certificate Policy for Medium Assurance Certificates\u201d, Version 2, 11th August 1999. Available from http:\/\/www.royalmail.com\/atwork\/viacode\/serviceinfo\/policy.pdf"},{"key":"10.1016\/S0167-4048(01)00710-6_BIB11","unstructured":"Jarvenpaa, S.,L., Leidner, D. \u201cDo You Read Me? The Development and Maintenance of Trust in Global Virtual Teams\u201d. Journal of Computer-Mediated Communication, 1998."},{"key":"10.1016\/S0167-4048(01)00710-6_BIB12","doi-asserted-by":"crossref","unstructured":"Kuosa, T., Basden, A. \u201cPredispositions as determinants of the future\u201d. Futures, 32:833\u2013852, 2000.","DOI":"10.1016\/S0016-3287(00)00034-3"},{"key":"10.1016\/S0167-4048(01)00710-6_BIB13","doi-asserted-by":"crossref","unstructured":"Santesson,S., Polk, W., Barzin, P., Nystrom, M. \u201cInternet X.509 Public Key Infrastructure Qualified Certificates Profile\u201d, <draft-ietf-pkix-qc-06.txt>, August 2000","DOI":"10.17487\/rfc3039"},{"key":"10.1016\/S0167-4048(01)00710-6_BIB14","doi-asserted-by":"crossref","unstructured":"Collins, H., M. \u201cThe TEA-Set: Tacit knowledge and scientific networks\u201d, Science Studies, 4, pp. 165\u2013186. 1974","DOI":"10.1177\/030631277400400203"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404801007106?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404801007106?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T23:40:48Z","timestamp":1578440448000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404801007106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,10]]},"references-count":14,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2001,10]]}},"alternative-id":["S0167404801007106"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(01)00710-6","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2001,10]]}}}