{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:18:40Z","timestamp":1759133920223,"version":"3.28.0"},"reference-count":57,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/sysose.2016.7542961","type":"proceedings-article","created":{"date-parts":[[2016,8,15]],"date-time":"2016-08-15T16:28:31Z","timestamp":1471278511000},"page":"1-6","source":"Crossref","is-referenced-by-count":16,"title":["Towards trustworthy smart cyber-physical-social systems in the era of Internet of Things"],"prefix":"10.1109","author":[{"given":"Jingwei","family":"Huang","sequence":"first","affiliation":[]},{"given":"Mamadou D.","family":"Seck","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Gheorghe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"53","article-title":"Production of Trust: Institutional Sources of Economic Structure, 1840&#x2013;1920","volume":"8","author":"zucker","year":"1986","journal-title":"Research in Organizational Behavior"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1995.9508080335"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389103"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2420552"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.014"},{"key":"ref37","first-page":"213","article-title":"Can We Trust Trust?","author":"gambetta","year":"1988","journal-title":"Trust Making and Breaking Cooperative Relations"},{"journal-title":"Trust and Power","year":"1979","author":"luhmann","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.1967.tb01454.x"},{"key":"ref34","first-page":"275","article-title":"Cooperation and Trust: Some Theoretical Notes","author":"deutsch","year":"1962","journal-title":"In JONES M R ED Nebraska Symposium on Motivation"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.17"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.99"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1186\/2192-113X-2-9"},{"year":"2013","key":"ref2","article-title":"World population ageing 2013"},{"year":"2008","key":"ref1","article-title":"Disruptive civil technologies"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-004-0041-5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45012-2_15"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283739"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11755593_14"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45217-1_18"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1527017.1527021"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1080\/10429247.2003.11415214"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSE.2008.018142"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/8983915"},{"key":"ref56","volume":"6","author":"gheorghe","year":"2012","journal-title":"Risk Engineering Bridge Risk Analysis with Stakeholders Values"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2002375.2002376"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1177\/154851290700400301"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2699714"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1504\/IJSSE.2015.068811"},{"journal-title":"Formalising trust as a computational concept","year":"1994","author":"marsh","key":"ref10"},{"key":"ref11","article-title":"Authoritative Sources in a Hyperlinked Environment","author":"kleinberg","year":"1998","journal-title":"Proc 9th ACM-SIAM Symposium on Discrete Algorithms"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/63.4.967"},{"key":"ref12","article-title":"The PageRank Citation Ranking: Bringing Order to the Web","author":"page","year":"0","journal-title":"Technical report Stanford Digital Library Technologies Project 1998"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994181"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067734"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0278-0984(02)11030-3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.10.1407.17308"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-005-4807-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.042711.00083"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.002"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61770-1_45"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"journal-title":"The Official PGP User's Guide","year":"1995","author":"zimmermann","key":"ref9"},{"key":"ref46","article-title":"Probability, Logic, and Probability Logic","author":"hajek","year":"2001","journal-title":"Philosophical Logic"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"journal-title":"Trust in Cyberspace","year":"1999","author":"schneider","key":"ref48"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(92)90049-4"},{"key":"ref42","first-page":"259","article-title":"An Ontology of Trust - Formal Semantics and Transitivity","author":"huang","year":"2006","journal-title":"Proceedings of the 8th international conference on Electronic commerce"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/S0956-5221(97)84644-1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2010.83"},{"journal-title":"Knowledge Provenance An Approach to Modeling and Maintaining the Evolution and Validity of Knowledge","year":"2007","author":"huang","key":"ref43"}],"event":{"name":"2016 11th System of Systems Engineering Conference (SoSE)","start":{"date-parts":[[2016,6,12]]},"location":"Kongsberg, Norway","end":{"date-parts":[[2016,6,16]]}},"container-title":["2016 11th System of Systems Engineering Conference (SoSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7533679\/7542882\/07542961.pdf?arnumber=7542961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,24]],"date-time":"2016-09-24T11:11:18Z","timestamp":1474715478000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7542961\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/sysose.2016.7542961","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}