{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T04:05:00Z","timestamp":1727323500355},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679386","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Trust Management Delegation Protocol for Fog Computing Applications"],"prefix":"10.1109","author":[{"given":"Phongsathon","family":"Fongta","sequence":"first","affiliation":[{"name":"University of Strathclyde,Department of Computer and Information Sciences,Glasgow,United Kingdom"}]},{"given":"Sotirios","family":"Terzis","sequence":"additional","affiliation":[{"name":"University of Strathclyde,Department of Computer and Information Sciences,Glasgow,United Kingdom"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.future.2018.04.057"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/2757384.2757397"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ACCESS.2019.2958355"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ACCESS.2020.2972968"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.jpdc.2019.10.006"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.jksuci.2021.10.006"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1186\/s13677-023-00416-8"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/JIOT.2023.3242126"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3171592.3171606"},{"volume-title":"FogTrust: Fog-Integrated Multi-Leveled Trust Management Mechanism for Internet of Things","year":"2023","author":"Wong","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.future.2019.12.045"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.11591\/ijeecs.v29.i2.pp808-815"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.future.2018.05.049"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/3171592.3171606"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TETC.2019.2957394"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/LCOMM.2017.2740279"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/JSEN.2021.3052009"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.11591\/eei.v12i6.6110"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/WF-IoT.2019.8767170"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2024,9,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679386.pdf?arnumber=10679386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:24:14Z","timestamp":1727241854000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679386\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679386","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}