{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T17:36:36Z","timestamp":1769189796096,"version":"3.49.0"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2014,5,1]],"date-time":"2014-05-01T00:00:00Z","timestamp":1398902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/tii.2014.2306799","type":"journal-article","created":{"date-parts":[[2014,2,17]],"date-time":"2014-02-17T19:04:26Z","timestamp":1392663866000},"page":"1516-1526","source":"Crossref","is-referenced-by-count":64,"title":["An Interactive Trust Model for Application Market of the Internet of Things"],"prefix":"10.1109","volume":"10","author":[{"family":"Kai Kang","sequence":"first","affiliation":[]},{"family":"Zhibo Pang","sequence":"additional","affiliation":[]},{"family":"Li Da Xu","sequence":"additional","affiliation":[]},{"family":"Liya Ma","sequence":"additional","affiliation":[]},{"family":"Cong Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507722"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.69"},{"key":"ref32","year":"0","journal-title":"Trustworthy Application Platform Trustworthy Application Store for Mobile Terminal"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"1819","DOI":"10.1007\/BF02831883","article-title":"A behavior-based remote trust attestation model","volume":"11","author":"zhang","year":"2006","journal-title":"Wuhan Univ J Nat Sci"},{"key":"ref36","first-page":"16","article-title":"Design and implementation of a TCG-based integrity measurement architecture","volume":"13","author":"sailer","year":"2004","journal-title":"Proc 13th Usenix Security Symp"},{"key":"ref35","year":"0","journal-title":"TCG MPWG Mobile Trusted Module Specification"},{"key":"ref34","first-page":"13","article-title":"A data mining based measurement method for software trustworthiness","volume":"21","author":"yuan","year":"2012","journal-title":"Chinese J Electron"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom.2012.33"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2013.776118"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.85"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2299233"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2012.698022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2011.651627"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2011.644583"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/sres.2184"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2012.660503"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2185806"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2189221"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.02.021"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2010.03735"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2198666"},{"key":"ref52","first-page":"529","article-title":"Ecosystem analysis in the design of open platform-based in-home healthcare terminals towards the internet-of-things","author":"pang","year":"2013","journal-title":"Proc 15th Int Conf Adv Commun Technol"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1478","DOI":"10.1109\/TII.2014.2301378","article-title":"A novel architecture for requirement-oriented participation decision in service workflows","volume":"10","author":"xu","year":"2014","journal-title":"IEEE Trans Ind Informat"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.7551\/978-0-262-31050-5-ch028"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2301132"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2011.1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/41.873219"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2164773"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2001.939015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2012.745618"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2012.705021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2011.587544"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2257807"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1109\/TII.2014.2300338","article-title":"Internet of things for enterprise systems of modern manufacturing","volume":"10","author":"bi","year":"2014","journal-title":"IEEE Trans Ind Informat"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2301143"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1568","DOI":"10.1109\/TII.2014.2302583","article-title":"IoT based smart rehabilitation system","volume":"10","author":"fan","year":"2014","journal-title":"IEEE Trans Ind Informat"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2010.508944"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/sres.2186"},{"key":"ref49","first-page":"1","article-title":"TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proc 5th USENIX Conf Operating Syst Design Implementation"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2012.11.010"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382224"},{"key":"ref45","first-page":"606","article-title":"Explicit and implicit ratings for mobile applications","author":"girardello","year":"2010","journal-title":"Proc GI Jahrestagung (1) Conf"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1999732.1999740"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36660-4_14"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2010.05.006"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0420-2"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14597-1_13"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/6809862\/06742593.pdf?arnumber=6742593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:53:49Z","timestamp":1642006429000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6742593\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":53,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tii.2014.2306799","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5]]}}}