{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:11:28Z","timestamp":1764785488916},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/fmec62297.2024.10710228","type":"proceedings-article","created":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T17:22:38Z","timestamp":1728926558000},"page":"228-236","source":"Crossref","is-referenced-by-count":1,"title":["Multi-Factor Trust Management in Distributed Storage Networks based on Capacity and Behavior"],"prefix":"10.1109","author":[{"given":"Ibe Van","family":"Thillo","sequence":"first","affiliation":[{"name":"University of Antwerp,Department of Applied Engineering-Electronics-ICT,Antwerp,Belgium"}]},{"given":"Zeeshan","family":"Hameed","sequence":"additional","affiliation":[{"name":"Free University of Bozen-Bolzano,Faculty of Engineering,Bolzano,Italy"}]},{"given":"Claus","family":"Pahl","sequence":"additional","affiliation":[{"name":"Free University of Bozen-Bolzano,Faculty of Engineering,Bolzano,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICETETS.2016.7603014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102656"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.42"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5243-4_79"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3565383.3566108"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC59375.2023.10305903"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2005.9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PTP.2003.1231512"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2008.76"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108013"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.07.039"},{"key":"ref15","article-title":"Trust Management for Mobile Edge Cloud Computing","volume-title":"Ph.D. dissertation","author":"Van Thanh","year":"2023"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC54266.2021.9732606"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2015.072805"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2408613"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.194"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978452"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-013-1380-x"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.029"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2010.5452742"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872365"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.154"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.942344"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13101861"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5220\/0011815500003488"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-022-00352-6"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud57274.2022.00027"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud57274.2022.00028"}],"event":{"name":"2024 9th International Conference on Fog and Mobile Edge Computing (FMEC)","start":{"date-parts":[[2024,9,2]]},"location":"Malm\u00f6, Sweden","end":{"date-parts":[[2024,9,5]]}},"container-title":["2024 9th International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10710134\/10710180\/10710228.pdf?arnumber=10710228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T04:57:00Z","timestamp":1728968220000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10710228\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/fmec62297.2024.10710228","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}