{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:49:26Z","timestamp":1725666566769},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/perser.2005.1506561","type":"proceedings-article","created":{"date-parts":[[2005,9,12]],"date-time":"2005-09-12T11:19:24Z","timestamp":1126523964000},"page":"433-436","source":"Crossref","is-referenced-by-count":2,"title":["Trust and authorization in the grid: a recommendation model"],"prefix":"10.1109","author":[{"family":"Huu Tran","sequence":"first","affiliation":[]},{"given":"P.","family":"Watters","sequence":"additional","affiliation":[]},{"given":"M.","family":"Hitchens","sequence":"additional","affiliation":[]},{"given":"V.","family":"Varadharajan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Essential COM","year":"1998","author":"box","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.194"},{"journal-title":"Computer Security Art and Science","year":"2003","author":"bishop","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1228527"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2002.1040858"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-58618-0_53","article-title":"Valuation of trust in open networks","author":"beth","year":"1994","journal-title":"ESORICS 94"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(02)00085-7"},{"key":"2","article-title":"An economy driven resource management architecture for global computational power grids","author":"buyya","year":"2000","journal-title":"Int Conf on Parallel and Distributed Processing Techniques and Applications"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1177\/109434200101500302"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-30141-7_6","article-title":"Fuzzy trust integration for security enforcement in grid computing","author":"song","year":"2004","journal-title":"International Symposium on Network and Parallel Computing (NPC2004)"},{"key":"7","article-title":"TrustMe: Anonymous management of trust relationships in decentralized P2P systems","author":"singh","year":"2003","journal-title":"ICP2PC2003"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2004.1336575"},{"key":"5","article-title":"Bayesian network trust model in peer-to-peer networks","author":"wang","year":"2003","journal-title":"AP2PC 2003"},{"key":"4","article-title":"An architecture for a secure service discovery service","author":"hodes","year":"1999","journal-title":"Fifth International Conference of Mobile Computing and Networks"},{"key":"9","article-title":"Evolving and managing trust in grid computing systems","author":"maheswaran","year":"2002","journal-title":"Canadian Conference for Electrical and Computer Engineering"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/502585.502638"}],"event":{"name":"ICPS '05. International Conference on Pervasive Services, 2005.","location":"Santorini, Greece"},"container-title":["ICPS '05. Proceedings. International Conference on Pervasive Services, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10064\/32279\/01506561.pdf?arnumber=1506561","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T19:18:36Z","timestamp":1497640716000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1506561\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/perser.2005.1506561","relation":{},"subject":[]}}