{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T21:17:29Z","timestamp":1764019049727,"version":"3.40.4"},"reference-count":27,"publisher":"Informa UK Limited","issue":"8","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2025,4,18]]},"DOI":"10.1080\/10447318.2024.2352221","type":"journal-article","created":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T10:10:37Z","timestamp":1717409437000},"page":"4583-4593","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Development of Trustworthiness for Cloud Service Providers Using DBN-Based Trust Model in Cloud Computing Environment"],"prefix":"10.1080","volume":"41","author":[{"given":"Ajil","family":"A","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, The Oxford College of Engineering, Visvesvaraya Technological University","place":["Belagavi, India"]},{"name":"School of Computer Science and Engineering, REVA University","place":["Bengaluru, India"]}]},{"given":"Saravana Kumar","family":"E","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Oxford College of Engineering, Visvesvaraya Technological University","place":["Belagavi, India"]}]}],"member":"301","published-online":{"date-parts":[[2024,6,3]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101722"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2015.2388577"},{"key":"e_1_3_2_4_1","doi-asserted-by":"crossref","unstructured":"Firdhous M. Ghazali O. & Hassan S. (2012). Trust management in cloud computing: A critical review. arXiv preprint arXiv:1211.3979.","DOI":"10.4038\/icter.v4i2.4674"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07796-z"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03233-3"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.748"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.129"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978452"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08876-4"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3341875"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07691-7"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.11.001"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03775-8"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-011-0583-3"},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2109382"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2020.12.003"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2022.200131"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522980"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24434-6_27"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10665-1_63"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.11.019"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES.2011.20"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6629449"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00354-008-0081-5"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5730"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.3969\/j.issn.0372-2112.2013.02.026"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2024.2352221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T10:14:11Z","timestamp":1744366451000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2024.2352221"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":27,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,4,18]]}},"alternative-id":["10.1080\/10447318.2024.2352221"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2024.2352221","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"type":"print","value":"1044-7318"},{"type":"electronic","value":"1532-7590"}],"subject":[],"published":{"date-parts":[[2024,6,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-12-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-03-25","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-30","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-06-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}