{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:27:47Z","timestamp":1750307267236,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,3,21]],"date-time":"2011-03-21T00:00:00Z","timestamp":1300665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,21]]},"DOI":"10.1145\/1982185.1982548","type":"proceedings-article","created":{"date-parts":[[2011,5,17]],"date-time":"2011-05-17T12:59:14Z","timestamp":1305637154000},"page":"1739-1745","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["A formal approach towards measuring trust in distributed systems"],"prefix":"10.1145","author":[{"given":"Guido","family":"Schryen","sequence":"first","affiliation":[{"name":"RWTH Aachen, Aachen"}]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[{"name":"CASED\/TU Darmstadt, Darmstadt"}]},{"given":"Sebastian","family":"Ries","sequence":"additional","affiliation":[{"name":"CASED\/TU Darmstadt, Darmstadt"}]},{"given":"Sheikh Mahbub","family":"Habib","sequence":"additional","affiliation":[{"name":"CASED\/TU Darmstadt, Darmstadt"}]}],"member":"320","published-online":{"date-parts":[[2011,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"1st Workshop on Quality of Protection","volume":"23","author":"Atzeni A.","year":"2005"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/646645.699041"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244298"},{"volume-title":"Springer","year":"2005","author":"Blakley R.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/647216.720552"},{"first-page":"2173","volume-title":"Proceedings from the 17th Symposium on Security and Privacy","author":"Blaze M.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947337.1947361"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/978-3-540-68947-8_2","volume-title":"Dependability Metrics","author":"B\u00f6hme R.","year":"2008"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-540-68947-8_15","volume-title":"Dependability Metrics","author":"B\u00f6hme R.","year":"2008"},{"volume-title":"P2PEcon","year":"2004","author":"Buchegger S.","key":"e_1_3_2_1_10_1"},{"volume-title":"Basil Blackwell","year":"1988","author":"Gambett D.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/646151.679366"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/120090.120093"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(99)00243-1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88873-4_8"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2004.03.003"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_21_1","first-page":"17","volume-title":"Trust Management and Security","author":"Kohlas R.","year":"2008"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0014-1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/3-540-61770-1_45","volume-title":"Computer Security --- ESORICS 96","author":"Maurer U.","year":"1996"},{"key":"e_1_3_2_1_24_1","unstructured":"NIST. Performance measurement guide for information security May 2008. NIST Special Publication 800-55 Revision 1.  NIST. Performance measurement guide for information security May 2008. NIST Special Publication 800-55 Revision 1."},{"volume-title":"The SANS Institute","year":"2006","author":"Payne S. C.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529573"},{"volume-title":"Technische Universit\u00e4t Darmstadt","year":"2009","author":"Ries S.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","first-page":"51","volume-title":"Trust Management and Security","author":"Ries S.","year":"2008"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314257.1314266"},{"key":"e_1_3_2_1_30_1","unstructured":"B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's journal 24: 21--29 1999.  B. Schneier. Attack trees: Modeling security threats. Dr. Dobb's journal 24: 21--29 1999."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2033230"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_33_1","first-page":"1436","volume-title":"Proceedings of Americas Conference on Information Systems","author":"Sharman R.","year":"2004"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-006-5952-x"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"E.\n       \n      Triantaphyllou\n    .\n      \n  \n   \n  Multi-Criteria Decision Making Methods: A comparative Study volume \n  44\n   of \n  Applied Optimization\n  . \n  Springer 2000\n  .  E. Triantaphyllou. Multi-Criteria Decision Making Methods: A comparative Study volume 44 of Applied Optimization . Springer 2000.","DOI":"10.1007\/978-1-4757-3157-6"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/820756.821829"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008280705142"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE-VOTE.2009.2"},{"issue":"2","key":"e_1_3_2_1_39_1","first-page":"48","article-title":"Filtering out unfair ratings in bayesian reputation systems","volume":"4","author":"Whitby A.","year":"2005","journal-title":"The ICFAIN Journal of Management Research"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00485052"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(99)00228-3"}],"event":{"name":"SAC'11: The 2011 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"TaiChung Taiwan","acronym":"SAC'11"},"container-title":["Proceedings of the 2011 ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1982185.1982548","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1982185.1982548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:50Z","timestamp":1750243970000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1982185.1982548"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,21]]},"references-count":41,"alternative-id":["10.1145\/1982185.1982548","10.1145\/1982185"],"URL":"https:\/\/doi.org\/10.1145\/1982185.1982548","relation":{},"subject":[],"published":{"date-parts":[[2011,3,21]]},"assertion":[{"value":"2011-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}