{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:48Z","timestamp":1750307328976,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,5,25]],"date-time":"2011-05-25T00:00:00Z","timestamp":1306281600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,5,25]]},"DOI":"10.1145\/2141622.2141686","type":"proceedings-article","created":{"date-parts":[[2012,2,14]],"date-time":"2012-02-14T13:21:44Z","timestamp":1329225704000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Trust of medical devices, applications, and users in pervasive healthcare"],"prefix":"10.1145","author":[{"given":"Michael","family":"Clifford","sequence":"first","affiliation":[{"name":"University of California, Davis"}]},{"given":"Matt","family":"Bishop","sequence":"additional","affiliation":[{"name":"University of California, Davis"}]}],"member":"320","published-online":{"date-parts":[[2011,5,25]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"300","article-title":"The Solar Trust Model: Authentication Without Limitation","author":"Clifford M..","year":"1998","unstructured":"Clifford , M.. Lavine , C. and Bishop , M. 1998 \" The Solar Trust Model: Authentication Without Limitation .\" In Proceedings of the 14th Annual Computer Security Applications Conference , pp. 300 -- 307 . Clifford, M.. Lavine, C. and Bishop, M. 1998 \"The Solar Trust Model: Authentication Without Limitation.\" In Proceedings of the 14th Annual Computer Security Applications Conference, pp. 300--307.","journal-title":"Proceedings of the 14th Annual Computer Security Applications Conference"},{"key":"e_1_3_2_1_2_1","first-page":"271","article-title":"Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network","author":"Clifford M.","year":"2002","unstructured":"Clifford , M. 2002 . \" Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network .\" In Proceedings of the 18th Annual Computer Security Applications Conference , pp. 271 -- 281 . Clifford, M. 2002. \"Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network.\" In Proceedings of the 18th Annual Computer Security Applications Conference, pp. 271--281.","journal-title":"Proceedings of the 18th Annual Computer Security Applications Conference"},{"volume-title":"Distributed Trust And Authentication Model.\" Masters' Thesis","author":"Clifford M.","key":"e_1_3_2_1_3_1","unstructured":"Clifford , M. 2006. \" An Implementation And Performance Analysis Of The Solar Trust Model, A Dynamic , Distributed Trust And Authentication Model.\" Masters' Thesis , The George Washington University . Clifford, M. 2006. \"An Implementation And Performance Analysis Of The Solar Trust Model, A Dynamic, Distributed Trust And Authentication Model.\" Masters' Thesis, The George Washington University."},{"key":"e_1_3_2_1_5_1","first-page":"554","article-title":"Role Based Access Control","author":"Ferraiolo D. F.","year":"1992","unstructured":"Ferraiolo , D. F. and Kuhn , D. R. 1992 . \" Role Based Access Control .\" In Proceedings of the 15th National Computer Security Conference. pp. 554 -- 563 . Ferraiolo, D. F. and Kuhn, D. R. 1992. \"Role Based Access Control.\" In Proceedings of the 15th National Computer Security Conference. pp. 554--563.","journal-title":"Proceedings of the 15th National Computer Security Conference."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"volume-title":"Proceedings of First Workshop on Pervasive Security, Privacy and Trust.","author":"Hu J.","key":"e_1_3_2_1_7_1","unstructured":"Hu , J. and Weaver , A. C . 2004. \"A Dynamic, Context-Aware Security Infrastructure for Distributed Healthcare Applications \". In Proceedings of First Workshop on Pervasive Security, Privacy and Trust. Hu, J. and Weaver, A. C. 2004. \"A Dynamic, Context-Aware Security Infrastructure for Distributed Healthcare Applications\". In Proceedings of First Workshop on Pervasive Security, Privacy and Trust."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2003.1300264"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Anderson R. 1996. \"A Security Policy Model for Clinical Information Systems \" In Proceedings of the 1996 IEEE Symposium on Security and Privacy pp. 30--43. Anderson R. 1996. \"A Security Policy Model for Clinical Information Systems \" In Proceedings of the 1996 IEEE Symposium on Security and Privacy pp. 30--43.","DOI":"10.1109\/SECPRI.1996.502667"},{"key":"e_1_3_2_1_10_1","article-title":"The PGP Trust Model","author":"Abdul-Rahman A.","year":"1997","unstructured":"Abdul-Rahman , A. 1997 . \" The PGP Trust Model .\" EDI-Forum: the Journal of Electronic Commerce. Abdul-Rahman, A. 1997. \"The PGP Trust Model.\" EDI-Forum: the Journal of Electronic Commerce.","journal-title":"EDI-Forum: the Journal of Electronic Commerce."},{"key":"e_1_3_2_1_12_1","first-page":"164","article-title":"Decentralized Trust Management","author":"Blaze M.","year":"1996","unstructured":"Blaze , M. Feigenbaum , J. and Lacy , J. 1996 . \" Decentralized Trust Management .\" In Proceedings of the 17th IEEE Symposium on Security and Privacy , pp. 164 -- 173 . Blaze, M. Feigenbaum, J. and Lacy, J. 1996. \"Decentralized Trust Management.\" In Proceedings of the 17th IEEE Symposium on Security and Privacy, pp. 164--173.","journal-title":"Proceedings of the 17th IEEE Symposium on Security and Privacy"},{"volume-title":"Secure Computer Systems: Mathematical Foundations","author":"Bell D.","key":"e_1_3_2_1_13_1","unstructured":"Bell , D. and La Padula , L. 1973. Secure Computer Systems: Mathematical Foundations . MITRE Corporation . Bell, D. and La Padula, L. 1973. Secure Computer Systems: Mathematical Foundations. MITRE Corporation."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.444"},{"key":"e_1_3_2_1_15_1","first-page":"7","article-title":"Information Technology---Open Systems Interconnection---The Directory","author":"International Telecommunication Union","year":"1995","unstructured":"International Telecommunication Union . 1995 . Information Technology---Open Systems Interconnection---The Directory : Authentication Framework. ITU-T Recommendation X .509, pp. 7 -- 17 International Telecommunication Union. 1995. Information Technology---Open Systems Interconnection---The Directory: Authentication Framework. ITU-T Recommendation X.509, pp. 7--17","journal-title":"Authentication Framework. ITU-T Recommendation"},{"volume-title":"An Integrative Model of Organizational Trust","author":"Mayer R.","key":"e_1_3_2_1_16_1","unstructured":"Mayer , R. , Davis , J. , and Schoorman , F . An Integrative Model of Organizational Trust . The Academy of Management Review , Vol . 20, No. 3 pp. 709--734, July 1995. Mayer, R., Davis, J., and Schoorman, F. An Integrative Model of Organizational Trust. The Academy of Management Review, Vol. 20, No. 3 pp. 709--734, July 1995."},{"key":"e_1_3_2_1_17_1","unstructured":"Network Associates. 1999. How PGP Works. PGP 6.5.1 documentation. http:\/\/www.pgpi.org\/doc\/pgpintro\/. Network Associates. 1999. How PGP Works . PGP 6.5.1 documentation. http:\/\/www.pgpi.org\/doc\/pgpintro\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Linn J. 1993. Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures. RFC 1421. Linn J. 1993. Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures . RFC 1421.","DOI":"10.17487\/rfc1421"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283739"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Spear M. Lu X. Matloff N. and Wu S. F. 2009. \"KarmaNET: Leveraging Trusted Social Paths to Create Judicious Forwarders.\" In Proceedings of the First International Conference on Future Information Network. Spear M. Lu X. Matloff N. and Wu S. F. 2009. \"KarmaNET: Leveraging Trusted Social Paths to Create Judicious Forwarders.\" In Proceedings of the First International Conference on Future Information Network .","DOI":"10.1109\/ICFIN.2009.5339559"},{"key":"e_1_3_2_1_21_1","unstructured":"Wang Y. and Vassileva J. 2003. \"Trust and Reputation Model in Peer-to-Peer Networks.\" In Proceedings of the IEEE Conference on P2P Computing. Wang Y. and Vassileva J. 2003. \"Trust and Reputation Model in Peer-to-Peer Networks.\" In Proceedings of the IEEE Conference on P2P Computing ."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/779928.779972"}],"event":{"name":"PETRA '11: The 4th International Conference on PErvasive Technologies Related to Assistive Environments","sponsor":["NSF National Science Foundation","Foundation of the Hellenic World","ICS-FORTH Institute of Computer Science, Foundation for Research and Technology - Hellas","U of Tex at Arlington U of Tex at Arlington","UCG University of Central Greece","Didaskaleio Konstantinos Karatheodoris, University of the Aegean","Fulbrigh, Greece Fulbright Foundation, Greece","Ionian Ionian University, GREECE"],"location":"Heraklion Crete Greece","acronym":"PETRA '11"},"container-title":["Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2141622.2141686","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2141622.2141686","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:04Z","timestamp":1750244764000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2141622.2141686"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,25]]},"references-count":20,"alternative-id":["10.1145\/2141622.2141686","10.1145\/2141622"],"URL":"https:\/\/doi.org\/10.1145\/2141622.2141686","relation":{},"subject":[],"published":{"date-parts":[[2011,5,25]]},"assertion":[{"value":"2011-05-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}