{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:10:54Z","timestamp":1730214654199,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1109\/dictap.2012.6215349","type":"proceedings-article","created":{"date-parts":[[2012,6,21]],"date-time":"2012-06-21T08:17:03Z","timestamp":1340266623000},"page":"189-194","source":"Crossref","is-referenced-by-count":2,"title":["Towards a standard for Service Behavior Trustworthiness Management"],"prefix":"10.1109","author":[{"given":"Jorgen","family":"Boegh","sequence":"first","affiliation":[]},{"given":"Yuyu","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"69","article-title":"Consumer Acceptance of Electronic Commerce Integrating Trust and Risk with the Technology Acceptance Model","volume":"7","author":"pavlou","year":"2003","journal-title":"International Journal of Electronic Commerce"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1080\/00048409412345881"},{"key":"18","first-page":"135","article-title":"Analysing the Relationship between Risk and Trust","volume":"2995","author":"j\ufffdsang","year":"2004","journal-title":"LNCS"},{"key":"15","first-page":"49","article-title":"Trust as a Commodity","author":"dasgupta","year":"2000","journal-title":"Trust Making and Breaking Cooperative Relations"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1086\/233695"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.005"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2003.11.008"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-004-0041-5"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.07.001"},{"journal-title":"Trust Risk and Betrayal","year":"2003","author":"bohnet","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1023\/B:JOBU.0000040274.23551.1b"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-3614-5"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1995.9508080335"},{"key":"24","first-page":"213","article-title":"Can We Trust Trust?","author":"gambetta","year":"2000","journal-title":"Trust Making and Breaking Cooperative Relations"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1111\/j.1465-7295.2007.00082.x"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1080\/1366987032000123856"},{"journal-title":"ISO\/IEC 25010 2011 Software Engineering - Software Product Quality Requirements and Evaluation (SQuaRE) - Quality Mode","year":"2011","key":"27"},{"key":"28","first-page":"79","article-title":"Managing the Dynamic Nature of Trust","volume":"19","author":"dillon","year":"2004","journal-title":"IEEE Transactions on Intelligent Systems"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.2"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1038\/nn816"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.2007.19.9.1508"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1086\/292745"},{"journal-title":"ISO\/IEC 14598-5 1998 Information Technology - Software Product Evaluation - Part 5 Process for Evaluators","year":"1998","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICTTA.2006.1685003"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888904000116"},{"journal-title":"Research on Key Technologies of Software Trustworthiness","year":"2010","author":"yuan","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.92.4.909"},{"journal-title":"ISO\/IEC 15408 2009 Information Technology - Security Techniques - Evaluation Criteria for IT Security","year":"2009","key":"31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.002"},{"journal-title":"Trust and Trust Management in Cloud Computing","year":"2011","author":"firdhous","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"}],"event":{"name":"2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)","start":{"date-parts":[[2012,5,16]]},"location":"Bangkok","end":{"date-parts":[[2012,5,18]]}},"container-title":["2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6209061\/6215333\/06215349.pdf?arnumber=6215349","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T13:50:23Z","timestamp":1490104223000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6215349\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/dictap.2012.6215349","relation":{},"subject":[],"published":{"date-parts":[[2012,5]]}}}