{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T12:02:27Z","timestamp":1748606547786},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T00:00:00Z","timestamp":1362096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Electron."],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/tie.2011.2173890","type":"journal-article","created":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T20:29:40Z","timestamp":1323116980000},"page":"1042-1058","source":"Crossref","is-referenced-by-count":13,"title":["A Methodology for Maintaining Trust in Industrial Digital Ecosystems"],"prefix":"10.1109","volume":"60","author":[{"given":"O.","family":"Fachrunnisa","sequence":"first","affiliation":[]},{"given":"F. K.","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1806338.1806474"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2027917"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1504\/IJNVO.2008.015999"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.2307\/259293"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01472.x"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00019-7"},{"key":"ref37","first-page":"165","article-title":"Initiator-domain-based SLA negotiation for inter-domain QoS-service provisioning","author":"cao","year":"2008","journal-title":"Proc 4th ICNS"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"55","DOI":"10.9774\/GLEAF.4700.2007.sp.00008","article-title":"Building trust through governance: Lessons from tri-sector partnerships in the extractive industries","volume":"25","author":"sullivan","year":"2007","journal-title":"The Journal of Corporate Citizenship"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1108\/03090560110388105"},{"key":"ref34","first-page":"173","article-title":"Trustworthiness and CCCI metrics in P2P communication","volume":"3","author":"hussain","year":"2004","journal-title":"Int J Comput Syst Sci Eng"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2035457"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.4337\/9781845426873"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2004.826011"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2005.1560464"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2027248"},{"key":"ref1","first-page":"3","article-title":"Digital ecosystems a next generation of the collaborative environment","author":"chang","year":"2006","journal-title":"proc iiWAS"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1108\/02686900210447542"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.indmarman.2007.06.007"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1108\/08858620110384132"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2051393"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2060453"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.obhdp.2005.08.001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2307\/259291"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICIE.2009.65"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICEE.2010.1253"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2026372"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusvent.2009.09.005"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICIII.2008.297"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30079-3_2"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.6.791"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1108\/10662240110402777"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1108\/09590550610673617"},{"key":"ref52","first-page":"249","author":"wang","year":"2005","journal-title":"Agents and Peer-to-Peer Computing"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2007.89"},{"key":"ref40","author":"hussain","year":"2006","journal-title":"A methodology for trust management in service orientated environment"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355128"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2008.4635150"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.10.038"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0090-2616(03)00018-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2007.45"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2007.43"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2007.44"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/9780470028261"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2050292"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2106096"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2031186"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2026758"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2007.371982"},{"key":"ref49","first-page":"1552","article-title":"The Markov-based evaluation on trust and reputation in peer-to-peer","author":"ma","year":"2006","journal-title":"Proc Int Conf Commun Circuits Syst"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2009.5276790"},{"key":"ref9","first-page":"17","article-title":"A methodology for risk measurement in e-transactions","volume":"21","author":"hussain","year":"2006","journal-title":"Int J Comput Syst Sci Eng"},{"key":"ref46","first-page":"403","article-title":"Trust evaluation model based on fuzzy logic for C2C e-commerce","author":"jingan","year":"2009","journal-title":"Proc IEEE Int Symp"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICECT.2005.4"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2005.1560464"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MCDM.2007.369116"},{"key":"ref42","first-page":"43","article-title":"A conceptual framework for understanding trust building and maintenance in virtual organizations","volume":"9","author":"gwebu","year":"2007","journal-title":"J Inf Technol Theory Appl"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2010.194"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1590\/S1807-76922010000200005"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"438","DOI":"10.5465\/amr.1998.926620","article-title":"Trust and distrust: New relationships and realities","volume":"23","author":"lewicki","year":"1998","journal-title":"Acad Manage Rev"}],"container-title":["IEEE Transactions on Industrial Electronics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/41\/6331663\/06094206.pdf?arnumber=6094206","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:53:10Z","timestamp":1633909990000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6094206\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":60,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tie.2011.2173890","relation":{},"ISSN":["0278-0046","1557-9948"],"issn-type":[{"value":"0278-0046","type":"print"},{"value":"1557-9948","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3]]}}}