{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T04:27:17Z","timestamp":1747801637745},"reference-count":12,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/enabl.2003.1231420","type":"proceedings-article","created":{"date-parts":[[2004,1,23]],"date-time":"2004-01-23T23:33:03Z","timestamp":1074900783000},"page":"275-280","source":"Crossref","is-referenced-by-count":11,"title":["Attack-resistance of computational trust models"],"prefix":"10.1109","author":[{"given":"A.","family":"Twigg","sequence":"first","affiliation":[]},{"given":"N.","family":"Dimmock","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-58618-0_53","article-title":"Valuation of trust in open networks","author":"beth","year":"1994","journal-title":"Proceedings of 3rd European Symposium on Research in Computer Security - ESORICS '94"},{"year":"2000","author":"levien","article-title":"An attack-resistant, scalable name service","key":"ref10"},{"year":"2001","author":"johnson","article-title":"DSR: A dynamic source routing protocol for multihop wireless ad hoc networks","key":"ref6"},{"key":"ref11","article-title":"Modelling a public-key infrastructure","author":"maurer","year":"1996","journal-title":"European symposium on research in computer security"},{"key":"ref5","article-title":"Trust management and proof-carrying code in secure mobile-code applications","author":"feigenbaum","year":"1997","journal-title":"DARPA Workshop on Foundations for Secure Mobile Code"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/SECPRI.1997.601308"},{"year":"2002","author":"levien","article-title":"Attack-resistant trust metrics","key":"ref8"},{"year":"1999","author":"josang","article-title":"An algebra for assessing trust in certification chains","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/502585.502638"},{"key":"ref9","first-page":"229","article-title":"Attack-resistant trust metrics for public key certification","author":"levien","year":"1998","journal-title":"7th USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/283699.283739"}],"event":{"acronym":"ENABL-03","name":"Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","location":"Linz, Austria"},"container-title":["WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8713\/27586\/01231420.pdf?arnumber=1231420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T23:18:32Z","timestamp":1497568712000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1231420\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/enabl.2003.1231420","relation":{},"subject":[]}}