{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:00:30Z","timestamp":1730210430008,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csac.2002.1176298","type":"proceedings-article","created":{"date-parts":[[2003,6,26]],"date-time":"2003-06-26T11:35:00Z","timestamp":1056627300000},"page":"271-281","source":"Crossref","is-referenced-by-count":8,"title":["Networking in the Solar Trust Model: determining optimal trust paths in a decentralized trust network"],"prefix":"10.1109","author":[{"given":"M.","family":"Clifford","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"479","article-title":"Multipath Source Routing in Wireless Ad Hoc Networks","volume":"1","author":"wang","year":"2000","journal-title":"2000 Canadian Conference on Electrical and Computer Engineering"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VETEC.1998.686598"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832168"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CDCS.2001.918740"},{"key":"ref14","article-title":"Information Assurance &#x2018;Metrics&#x2019;","author":"bodeau","year":"2001","journal-title":"J Findings from the May 2001 Workshop on Information-Security-System Rating and Ranking as presented at the 17th Annual Computer Security Applications Conference in the tutorial on"},{"key":"ref4","article-title":"Integrity Considerations for Secure Computer Systems","author":"biba","year":"1977","journal-title":"U S Air Force Electronic Systems Division Tech Rep"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1997.579229"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NDSS.1997.579230"},{"first-page":"7","article-title":"Common Security Services Manager Trust Policy Interface (TPI) Specification Draft for Release 1.2","year":"1997","key":"ref5"},{"key":"ref8","article-title":"The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks","author":"broch","year":"1998","journal-title":"Internet draft IETF Mobile Ad Hoc Networking Working Group"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738650"},{"key":"ref2","article-title":"Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management","author":"kent","year":"1993","journal-title":"Internet Report RFC 1422"},{"key":"ref1","first-page":"7","article-title":"Information Technology - Open Systems Interconnection - The Directory: Authentication Framework","year":"1995","journal-title":"ITU-T Recommendation"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"}],"event":{"name":"Eighteenth Annual Computer Security Applications Conference","acronym":"CSAC-02","location":"Las Vegas, NV, USA"},"container-title":["18th Annual Computer Security Applications Conference, 2002. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8386\/26404\/01176298.pdf?arnumber=1176298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T19:08:27Z","timestamp":1489432107000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1176298\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/csac.2002.1176298","relation":{},"subject":[]}}