{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:19Z","timestamp":1761401899927,"version":"3.37.3"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/access.2017.2764955","type":"journal-article","created":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T18:08:39Z","timestamp":1509386919000},"page":"24376-24388","source":"Crossref","is-referenced-by-count":6,"title":["TrustCall: A Trust Computation Model for Web Conversational Services"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7030-5200","authenticated-orcid":false,"given":"Ibrahim Tariq","family":"Javed","sequence":"first","affiliation":[]},{"given":"Khalifa","family":"Toumi","sequence":"additional","affiliation":[]},{"given":"Noel","family":"Crespi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.47"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1183614.1183678"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851804"},{"article-title":"Security considerations for WebRTC","year":"2013","author":"rescorla","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.115"},{"article-title":"Additional use-cases and requirements for WebRTC identity architecture","year":"2015","author":"beltran","key":"ref13"},{"article-title":"Requirements for trust and privacy in WebRTC peer-to-peer authentication","year":"2016","author":"copeland","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.102"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.105"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1021"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935195"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2017.7980642"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2013.6670893"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4597108"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-017-0587-2"},{"article-title":"The pagerank citation ranking: Bringing order to the Web","year":"1999","author":"page","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2017.7980649"},{"article-title":"WebRTC security architecture","year":"2016","author":"rescorla","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.87"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2015.7073833"},{"article-title":"WebRTC 1.0: Real-time communication between browsers","year":"2016","author":"bergkvist","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.128"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2010.5484757"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.112"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2011.84"},{"key":"ref23","first-page":"30","article-title":"Personalizing applications through integration of inferred trust values in semantic Web-based social networks","author":"golbeck","year":"2005","journal-title":"Proc Semantic Netw Anal Workshop 4th Int Semantic Web Conf"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_16"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.011"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7859429\/08089344.pdf?arnumber=8089344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:59:41Z","timestamp":1633921181000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8089344\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2764955","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2017]]}}}