{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:27:12Z","timestamp":1725506832803},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/icnc.2010.5582896","type":"proceedings-article","created":{"date-parts":[[2010,9,29]],"date-time":"2010-09-29T18:03:07Z","timestamp":1285783387000},"page":"248-251","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic trust model based on contexts-aware computing"],"prefix":"10.1109","author":[{"given":"Wen-Xing","family":"Sun","sequence":"first","affiliation":[]},{"given":"Feng-Ming","family":"Liu","sequence":"additional","affiliation":[]},{"family":"Xi-Yu Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"journal-title":"The SECURE Collaboration Model SECURE Deliverables D2 1 D 2 2 and D2 3","year":"2004","author":"terzis","key":"ref11"},{"journal-title":"Formalising trust as a computational concept","year":"1994","author":"marsh","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-004-0041-5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/65.313011"},{"key":"ref15","first-page":"259","article-title":"The Stick-E Document: A Framework for Creating Context Aware Applications","author":"brown","year":"1996","journal-title":"Proceedings of Electronic Publishing"},{"key":"ref16","article-title":"Exploiting Context in HCI Design for Mobile Systems","author":"rodden","year":"1998","journal-title":"Human Computer Interaction with Mobile Devices"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/98.626982"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/332040.332047"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISWC.1998.729534"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/586135.586138"},{"year":"2003","author":"chien","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"ref5","first-page":"640","article-title":"Eigenrep: Reputation Management in P2P Networks","author":"kamvar","year":"2003","journal-title":"Proc International WWW Conference"},{"key":"ref8","first-page":"xx","article-title":"The Impact of Context on the Trustworthiness of Communication: An Ontological Approach","author":"toivonen","year":"2004","journal-title":"Proc Workshop Trust Security Reputation Semantic Web"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39881-3_15"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2005.80"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1120717.1120723"},{"year":"2000","author":"chen","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s007790170019"},{"key":"ref22","first-page":"127","article-title":"Context Information vs. Sensor Information: A Model for Categorizing Context in Context-Aware Mobile Computing","author":"barkhuus","year":"2003","journal-title":"Symposium on Collaborative Technologies and Systems"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926814"}],"event":{"name":"2010 Sixth International Conference on Natural Computation (ICNC)","start":{"date-parts":[[2010,8,10]]},"location":"Yantai, China","end":{"date-parts":[[2010,8,12]]}},"container-title":["2010 Sixth International Conference on Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5564900\/5582888\/05582896.pdf?arnumber=5582896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T08:38:26Z","timestamp":1490085506000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5582896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icnc.2010.5582896","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}