{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T14:59:48Z","timestamp":1770217188216,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,11]],"date-time":"2005-11-11T00:00:00Z","timestamp":1131667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,11]]},"DOI":"10.1145\/1103022.1103036","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"75-83","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Fuzzy nature of trust and dynamic trust modeling in service oriented environments"],"prefix":"10.1145","author":[{"given":"Elizabeth J.","family":"Chang","sequence":"first","affiliation":[{"name":"Centre of Extended Enterprise and Business Intelligence, Perth, WA, Australia"}]},{"given":"Farookh Khadeer","family":"Hussain","sequence":"additional","affiliation":[{"name":"Centre of Extended Enterprise and Business Intelligence, Perth, WA, Australia"}]},{"given":"Tharam S.","family":"Dillon","sequence":"additional","affiliation":[{"name":"University of Technology, Sydney Sydney, NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2005,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"John Wiley and Sons","author":"Chang E.","year":"2005","unstructured":"Chang , E. , Dillon T , Hussain , F \"Trust and Reputation for Service Oriented Environment\". John Wiley and Sons , 2005 . Chang, E., Dillon T, Hussain, F \"Trust and Reputation for Service Oriented Environment\". John Wiley and Sons, 2005."},{"key":"e_1_3_2_1_2_1","volume-title":"Available: {http:\/\/www.peerfear.org\/papers\/openprivacy-reputation.pdf} (10\/11\/2003).","author":"Burton K.A.","year":"2002","unstructured":"Burton , K.A. , ( 2002 ), ' Design of the open privacy distributed reputation system ', Available: {http:\/\/www.peerfear.org\/papers\/openprivacy-reputation.pdf} (10\/11\/2003). Burton, K.A., (2002), 'Design of the open privacy distributed reputation system', Available: {http:\/\/www.peerfear.org\/papers\/openprivacy-reputation.pdf} (10\/11\/2003)."},{"key":"e_1_3_2_1_3_1","volume-title":"Decision and data warehouse systems","author":"Mallach E,G","year":"2000","unstructured":"Mallach , E,G . , ( 2000 ), ' Decision and data warehouse systems ', Irwin McGraw Hill Companies . Mallach, E,G., (2000), 'Decision and data warehouse systems', Irwin McGraw Hill Companies."},{"key":"e_1_3_2_1_4_1","volume-title":"Available: {http:\/\/www.teamtechnology.co.uk\/tt\/t-articl\/mb-simpl.htm} (27\/12\/2003).","author":"Myers S.","year":"2003","unstructured":"Myers , S. , ( 2003 ), ' Working out your Myers Briggs Type ', Available: {http:\/\/www.teamtechnology.co.uk\/tt\/t-articl\/mb-simpl.htm} (27\/12\/2003). Myers, S., (2003), 'Working out your Myers Briggs Type', Available: {http:\/\/www.teamtechnology.co.uk\/tt\/t-articl\/mb-simpl.htm} (27\/12\/2003)."},{"key":"e_1_3_2_1_5_1","volume-title":"Available: http:\/\/www.cs.ucl.ac.uk\/staff\/F.AbdulRahman\/docs\/dwacos99.pdf} (7\/08\/2003).","author":"Rahman A.A.","year":"2003","unstructured":"Rahman , A.A. & Hailes , S. , ( 2003 a), ' Relying on trust to find reliable information ', Available: http:\/\/www.cs.ucl.ac.uk\/staff\/F.AbdulRahman\/docs\/dwacos99.pdf} (7\/08\/2003). Rahman, A.A. & Hailes, S., (2003a), 'Relying on trust to find reliable information', Available: http:\/\/www.cs.ucl.ac.uk\/staff\/F.AbdulRahman\/docs\/dwacos99.pdf} (7\/08\/2003)."},{"key":"e_1_3_2_1_6_1","volume-title":"Available: http:\/\/citeseer.nj.nec.com\/cache\/papers\/cs\/abdul-rahman97distributed.pdf} (5\/09\/2003).","author":"Rahman A.A.","year":"2003","unstructured":"Rahman , A.A. & Hailes , S. , ( 2003 b), ' A distributed trust model ', Available: http:\/\/citeseer.nj.nec.com\/cache\/papers\/cs\/abdul-rahman97distributed.pdf} (5\/09\/2003). Rahman, A.A. & Hailes, S., (2003b), 'A distributed trust model', Available: http:\/\/citeseer.nj.nec.com\/cache\/papers\/cs\/abdul-rahman97distributed.pdf} (5\/09\/2003)."},{"key":"e_1_3_2_1_7_1","volume-title":"Available: {http:\/\/citeseer.nj.nec.com\/cache\/papers\/cs\/abdul-rahman00supporting.pdf}","author":"Rahman A.A.","year":"2003","unstructured":"Rahman , A.A. & Hailes , S , ( 2003 ), ' Supporting trust in virtual communities ', Available: {http:\/\/citeseer.nj.nec.com\/cache\/papers\/cs\/abdul-rahman00supporting.pdf} Rahman, A.A. & Hailes, S, (2003), 'Supporting trust in virtual communities', Available: {http:\/\/citeseer.nj.nec.com\/cache\/papers\/cs\/abdul-rahman00supporting.pdf}"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Second International Workshop on Security in Information Systems WOSIS.","author":"Hussain F.","year":"2004","unstructured":"Hussain , F. , Chang , E. & Dillon , T. S. , ( 2004 ), ' Classification of trust relationships in peer-to-peer (P2P) communications ', Proceedings of the Second International Workshop on Security in Information Systems WOSIS. Hussain, F., Chang, E. & Dillon, T. S., (2004), 'Classification of trust relationships in peer-to-peer (P2P) communications', Proceedings of the Second International Workshop on Security in Information Systems WOSIS."},{"key":"e_1_3_2_1_9_1","volume-title":"The architectures of trust","author":"Smith J. H.","year":"2002","unstructured":"Smith , J. H. , ( 2002 ), ' The architectures of trust ', University of Copenhagen. Smith, J. H., (2002), 'The architectures of trust', University of Copenhagen."},{"key":"e_1_3_2_1_10_1","volume-title":"Available: {www.cs.usask ca\/grads\/yaw181\/ publications\/120_wang_y.pdf} (15\/10\/2003).","author":"Wang Y.","year":"2003","unstructured":"Wang , Y. & Vassileva , J. , ( 2003 ), ' Trust and reputation model in peer-to-peer ', Available: {www.cs.usask ca\/grads\/yaw181\/ publications\/120_wang_y.pdf} (15\/10\/2003). Wang, Y. & Vassileva, J., (2003), 'Trust and reputation model in peer-to-peer', Available: {www.cs.usask ca\/grads\/yaw181\/ publications\/120_wang_y.pdf} (15\/10\/2003)."},{"key":"e_1_3_2_1_11_1","volume-title":"Available: {http:\/\/www-staff.it.uts.edu.au\/~rajugan\/publication\/virtual_logistics.pdf} (6\/01\/2004)","author":"Chang E.","year":"2004","unstructured":"Chang , E. , Gardner , W. , Talevski , A. & Kapnoullas , T. , ( 2004 ), ' A virtual logistics network and an e-hub as a competitive approach for small to medium size companies ', Available: {http:\/\/www-staff.it.uts.edu.au\/~rajugan\/publication\/virtual_logistics.pdf} (6\/01\/2004) Chang, E., Gardner, W., Talevski, A. & Kapnoullas, T., (2004), 'A virtual logistics network and an e-hub as a competitive approach for small to medium size companies', Available: {http:\/\/www-staff.it.uts.edu.au\/~rajugan\/publication\/virtual_logistics.pdf} (6\/01\/2004)"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the IEEE Conference on Industrial Informatics, INDIN","author":"Chang E.","year":"2003","unstructured":"Chang , E. , Talevski , A. & Dillon , T. , ( 2003 ), ' Web service integration in the extended logistics enterprise ', Proceedings of the IEEE Conference on Industrial Informatics, INDIN , Banff, Canada. Chang, E., Talevski, A. & Dillon, T., (2003), 'Web service integration in the extended logistics enterprise', Proceedings of the IEEE Conference on Industrial Informatics, INDIN, Banff, Canada."},{"key":"e_1_3_2_1_13_1","volume-title":"The Unified Modeling Language User","author":"Booch G.","unstructured":"Booch , G. , Rumbaugh , J. & Jacobson , I. , 1999 , The Unified Modeling Language User , Addison Wesley , USA Booch, G., Rumbaugh, J. & Jacobson, I., 1999, The Unified Modeling Language User, Addison Wesley, USA"},{"key":"e_1_3_2_1_14_1","unstructured":"Dillon T.S and Tan P.L. 1993 Object Oriented Conceptual Modeling Prentice Hall UK   Dillon T.S and Tan P.L. 1993 Object Oriented Conceptual Modeling Prentice Hall UK"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 13th International Conference of the European Institute for Computer Anti-Virus Research","author":"Hussain F.","unstructured":"Hussain , F. , Chang , E. , and Dillon , T.S ., 2004, 'Peer-to-Peer Trust Modelling ', Proceedings of the 13th International Conference of the European Institute for Computer Anti-Virus Research , Luxembourg. Hussain, F., Chang, E., and Dillon, T.S., 2004, 'Peer-to-Peer Trust Modelling', Proceedings of the 13th International Conference of the European Institute for Computer Anti-Virus Research, Luxembourg."},{"key":"e_1_3_2_1_16_1","volume-title":"UML Distilled: A Brief Guide to the standard Object Modeling Language","author":"Fowler M.","unstructured":"Fowler , M. & Scott , K. , 2000 , UML Distilled: A Brief Guide to the standard Object Modeling Language , 2 nd Edition, Addition Wesley Longman . Fowler, M. & Scott, K., 2000, UML Distilled: A Brief Guide to the standard Object Modeling Language, 2nd Edition, Addition Wesley Longman.","edition":"2"},{"key":"e_1_3_2_1_17_1","volume-title":"Principles of Database and Knowledge-Base Systems","author":"Ullman J.D.","unstructured":"Ullman , J.D. , 1989 , Principles of Database and Knowledge-Base Systems , Vol. 1 , Computer Science Press , NY Ullman, J.D., 1989, Principles of Database and Knowledge-Base Systems, Vol. 1, Computer Science Press, NY"},{"key":"e_1_3_2_1_18_1","volume-title":"A realizable intelligent agent model applied in dynamic e-business","author":"Xiao Feng J.","year":"2003","unstructured":"Xiao Feng , J. , Junhua , X. , Hua , Z. & Zuzhao , L. , ( 2003 ), ' A realizable intelligent agent model applied in dynamic e-business ', IEEE. Xiao Feng, J., Junhua, X., Hua, Z. & Zuzhao, L., (2003), 'A realizable intelligent agent model applied in dynamic e-business', IEEE."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009386.1010210"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009386.1010142"}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","location":"Fairfax VA USA","acronym":"CCS05","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2005 workshop on Secure web services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103022.1103036","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1103022.1103036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:43:24Z","timestamp":1750286604000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103022.1103036"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,11]]},"references-count":20,"alternative-id":["10.1145\/1103022.1103036","10.1145\/1103022"],"URL":"https:\/\/doi.org\/10.1145\/1103022.1103036","relation":{},"subject":[],"published":{"date-parts":[[2005,11,11]]},"assertion":[{"value":"2005-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}