{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:39:53Z","timestamp":1725622793583},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/percom.2009.4912754","type":"proceedings-article","created":{"date-parts":[[2009,5,11]],"date-time":"2009-05-11T14:19:49Z","timestamp":1242051589000},"page":"1-8","source":"Crossref","is-referenced-by-count":13,"title":["DTT: A Distributed Trust Toolkit for pervasive systems"],"prefix":"10.1109","author":[{"given":"Brent","family":"Lagesse","sequence":"first","affiliation":[]},{"given":"Mohan","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Justin Mazzola","family":"Paluska","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Wright","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"building trust in decentralized peer-to-peer electronic communitties","author":"xiong","year":"2002","journal-title":"International Conference on Electronic Commerce Research"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1080192.1080204"},{"key":"14","article-title":"experience with an object reputation system for peer-to-peer filesharing (awarded best paper)","author":"walsh","year":"2006","journal-title":"NSDI USENIX"},{"key":"11","article-title":"trust as an interaction mechanism for self-organising systems","author":"di","year":"2004","journal-title":"ICCS"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023648"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"key":"10","first-page":"343","article-title":"access control for active spaces. in agsac","author":"sampemane","year":"2002","journal-title":"IEEE Computer Society"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1039"},{"key":"5","article-title":"a security architecture based on trust management for pervasive computing systems","author":"kagal","year":"2002","journal-title":"Grace Hopper Celebration of Women in Computing"},{"key":"4","article-title":"internet x.509 public key infrastructure, certificate and crl profile. rfc 2459","author":"housley","year":"1999","journal-title":"IETF"},{"key":"9","article-title":"ubca: utility-based clustering architecture for peer-to-peer systems. in icdcs workshops","author":"lagesse","year":"2007","journal-title":"Mobile and Distributed Computing IEEE Computer Society"},{"key":"8","first-page":"260","article-title":"a framework for concrete reputation-systems with applications to history-based access control","author":"krukow","year":"2005","journal-title":"ACM Conference on Computer and Communications Security"}],"event":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications (PerCom)","start":{"date-parts":[[2009,3,9]]},"location":"Galveston, TX, USA","end":{"date-parts":[[2009,3,13]]}},"container-title":["2009 IEEE International Conference on Pervasive Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4906860\/4912739\/04912754.pdf?arnumber=4912754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T16:12:24Z","timestamp":1489767144000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4912754\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/percom.2009.4912754","relation":{},"subject":[],"published":{"date-parts":[[2009,3]]}}}