{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:50:01Z","timestamp":1729623001216,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856696","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T17:16:34Z","timestamp":1487265394000},"page":"196-203","source":"Crossref","is-referenced-by-count":0,"title":["An approach for evaluating trust in X.509 certificates"],"prefix":"10.1109","author":[{"given":"Zakia El","family":"Uahhabi","sequence":"first","affiliation":[]},{"given":"Hanan El","family":"Bakkali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"6895","article-title":"The X.509 trust model needs a technical and legal expert","author":"ahmad","year":"2012","journal-title":"IEEE International Conference on Communications (ICC) Ottawa"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16441-5_2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2004.1265540"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2001.905168"},{"key":"ref14","first-page":"1","article-title":"Exponentially weighted moving average control schemes:properties and enhancements. technometrics","volume":"32","author":"james","year":"1990"},{"key":"ref15","first-page":"1","article-title":"Hybrid model for dynamic evaluation of trust in cloud services","author":"rajendran","year":"2015","journal-title":"Wireless Networks"},{"key":"ref16","first-page":"2277","article-title":"Recommendation system with detection and prevention of malicious feedback rating","author":"satyadeep","year":"2015","journal-title":"International Journal of Engineering Sciences Research"},{"article-title":"Determining sample size","year":"0","author":"glen","key":"ref17"},{"journal-title":"Common methodology for information technology security evaluation-Part 3 security assurance requirements August 2005","year":"0","key":"ref18"},{"key":"ref19","first-page":"139","article-title":"Requirements engineering in the information assurance domain: the common criteria evaluation process","volume":"753","author":"ruben","year":"2004","journal-title":"Perspectives on Software Requirements"},{"key":"ref4","first-page":"23","article-title":"A calculus oftrust and its application to PKI and identity management","author":"jingwei","year":"2009","journal-title":"IDTrust"},{"key":"ref3","first-page":"325","article-title":"Modelling a public-key infrastructure","volume":"1","author":"ueli","year":"1996","journal-title":"ESORICS"},{"key":"ref6","article-title":"A Distributed reputation system for certification authority trust management","author":"jiska","year":"2015","journal-title":"14th IEEE International Conference on Trust Security and Privacy in Computing and Communications (IEEE UbiSafe Symposium)"},{"key":"ref5","first-page":"254","article-title":"Certainlogic: A logic for modeling trust and uncertainty (short paper)","volume":"6740","author":"ries","year":"2011","journal-title":"McCune"},{"key":"ref8","article-title":"Understanding PKI: concepts, standards, and deployment considerations","author":"steve","year":"2003","journal-title":"Second Edition Addison-Wesley"},{"key":"ref7","first-page":"651","article-title":"A formal model of trust for calculating the quality of X.509 certificate. Security and Communication Networks","volume":"4","author":"wazan","year":"2011","journal-title":"Wiley"},{"key":"ref2","first-page":"368","article-title":"A predicate calculus logic for the PKI trust model analysis","author":"hanan","year":"2001","journal-title":"IEEE International Symposium on Network Computing and Applications"},{"key":"ref1","first-page":"279","article-title":"PKI trust models","author":"audun","year":"2013","journal-title":"Theory and Practice of Cryptography Solutions for Secure Information Systems"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1016\/S0167-4048(01)00710-6","article-title":"Evaluating trust in a public key certification authority","volume":"20","author":"david","year":"2001","journal-title":"Computers & Security"},{"article-title":"RFC 3647: internet X.509 public key infrastructure certificate policy and certification practices framework","year":"2003","author":"chokhani","key":"ref20"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856696.pdf?arnumber=7856696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T15:53:47Z","timestamp":1568822027000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856696\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856696","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}