{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:31:14Z","timestamp":1725546674631},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/icsai.2017.8248370","type":"proceedings-article","created":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T22:42:24Z","timestamp":1515451344000},"page":"655-659","source":"Crossref","is-referenced-by-count":0,"title":["The fuzzy control of trust establishment"],"prefix":"10.1109","author":[{"given":"Dongmei","family":"Xia","sequence":"first","affiliation":[]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644532"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2002.1011297"},{"key":"ref12","first-page":"1","article-title":"Negotiating Disclosure of Sensitive Credentials","author":"winsborough","year":"1999","journal-title":"Second Conference on Security in Communication Networks"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352633"},{"journal-title":"Automated trust establishment in open systems","year":"2003","author":"yu","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352620"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848442"},{"key":"ref17","article-title":"RTML: A Role-based Trust-management Markup Language","author":"ninghui","year":"2004","journal-title":"CERIAS Tech Report"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373264"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/375663.375764"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352633"},{"key":"ref3","first-page":"1","article-title":"Negotiating Disclosure of Sensitive Credentials","author":"winsborough","year":"1999","journal-title":"Second Conference on Security in Communication Networks"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067734"},{"key":"ref5","article-title":"Introduction to Game Theory","author":"osborne","year":"2005","journal-title":"Shanghai Shanghai University of Finance and Economics Press"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030104"},{"key":"ref7","first-page":"245","article-title":"A Unified Scheme for Resource Protection in Automated Trust Negotiation","author":"yu","year":"2003","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2002.1011297"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644532"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029186"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2003.1206960"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067734"},{"key":"ref21","first-page":"45","article-title":"Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation","author":"seamons","year":"2001","journal-title":"Symposium on Network and Distributed System Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2002.1011295"}],"event":{"name":"2017 4th International Conference on Systems and Informatics (ICSAI)","start":{"date-parts":[[2017,11,11]]},"location":"Hangzhou","end":{"date-parts":[[2017,11,13]]}},"container-title":["2017 4th International Conference on Systems and Informatics (ICSAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8233022\/8248252\/08248370.pdf?arnumber=8248370","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,12]],"date-time":"2018-02-12T22:54:09Z","timestamp":1518476049000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8248370\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icsai.2017.8248370","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}