{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:19:28Z","timestamp":1729613968697,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750210","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T11:20:46Z","timestamp":1395919246000},"page":"296-304","source":"Crossref","is-referenced-by-count":4,"title":["A taxonomy for securely sharing information among others in a trust domain"],"prefix":"10.1109","author":[{"given":"Nalin Asanka Gamagedara","family":"Arachchilage","sequence":"first","affiliation":[]},{"given":"Cornelius","family":"Namiluko","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Martin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Trusted Computing Group","article-title":"TCG trusted multi-Tenant infrastructure use cases","year":"2011","key":"17"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33389-7_8"},{"key":"16","article-title":"Web services architecture","author":"booth","year":"2004","journal-title":"Web Service Architecture W3C Working Group Note"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.87.4.611"},{"key":"14","article-title":"The ten page introduction to trusted computing","author":"martin","year":"2008","journal-title":"Computing Laboratory"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1111\/j.1740-8784.2007.00081.x"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.92.4.909"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1740-8784.2008.00120.x"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1080\/21515581.2011.603510"},{"key":"1","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1080\/07421222.2002.11045715","article-title":"Individual trust in online firms scale development and initial test","volume":"19","author":"bhattacherjee","year":"2002","journal-title":"J Manag In! Syst"},{"key":"10","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","article-title":"Trust and tAM in online shopping an integrated model","author":"gefen","year":"2003","journal-title":"MIS Q"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1998.926617"},{"key":"6","first-page":"213","article-title":"Can we trust trust","volume":"2000","author":"gambetta","year":"2000","journal-title":"Trust Mak Break Coop Relations"},{"key":"5","first-page":"61","article-title":"Toward a generic model of trust for electronic commerce","volume":"5","author":"tan","year":"2001","journal-title":"Int J Electron Commun"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1080\/21515581.2012.708494"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2003.11.008"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.2007.24348410"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750210.pdf?arnumber=6750210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T20:08:20Z","timestamp":1565294900000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750210\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750210","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}