{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:13:56Z","timestamp":1729635236970,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/coginf.2010.5599687","type":"proceedings-article","created":{"date-parts":[[2010,10,12]],"date-time":"2010-10-12T11:44:17Z","timestamp":1286883857000},"page":"501-505","source":"Crossref","is-referenced-by-count":3,"title":["Access control for Web Services Based on feedback and decay"],"prefix":"10.1109","author":[{"given":"Shangzhu","family":"Jin","sequence":"first","affiliation":[]},{"given":"Jun","family":"Peng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Peer Trust: supporting reputation-based trust for peer-to-peer electronic communities","author":"xiong","year":"2004","journal-title":"IEEE Transactions on Knowledge and Data Engineering (TKDE) Special Issue on Peer-to-Peer Based Data Management"},{"journal-title":"Web Security Sourcebook","year":"1997","author":"rubin","key":"ref3"},{"key":"ref10","first-page":"24","article-title":"A Trust Model of Web Services Based on Subject Logic","volume":"33","author":"jin-dian","year":"2005","journal-title":"Journal of South China University of Technology"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1109\/ACSAC.2000.898877","article-title":"Security Architecture for Controlled Digital Information Dissemination","author":"park","year":"2000","journal-title":"Proceedings of the Sixteenth Annual Computer Security Applications Conference (ASSAC)"},{"journal-title":"Security for Web Services and Service-Oriented Architectures","year":"2009","author":"bertino","key":"ref11"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"ref7","first-page":"2057","article-title":"Research and Development of Trust Management in Web Security","author":"feng","year":"2002","journal-title":"Journal of Software"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1108\/09685220010372564"},{"key":"ref9","first-page":"127","article-title":"Trust and Reputation Evaluation Model in Web Services","author":"jin-dian","year":"2006","journal-title":"Computer Engineering and Applications"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0920-5489(04)00099-6"}],"event":{"name":"2010 9th IEEE International Conference on Cognitive Informatics (ICCI)","start":{"date-parts":[[2010,7,7]]},"location":"Beijing, China","end":{"date-parts":[[2010,7,9]]}},"container-title":["9th IEEE International Conference on Cognitive Informatics (ICCI'10)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5560187\/5599672\/05599687.pdf?arnumber=5599687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T11:00:54Z","timestamp":1497870054000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5599687\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/coginf.2010.5599687","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}