{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:41:34Z","timestamp":1757544094269,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T00:00:00Z","timestamp":1533600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,7]]},"DOI":"10.1145\/3229616.3229621","type":"proceedings-article","created":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T19:07:07Z","timestamp":1533150427000},"page":"14-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Trust Modelling in 5G mobile networks"],"prefix":"10.1145","author":[{"given":"Mike","family":"Surridge","sequence":"first","affiliation":[{"name":"IT Innovation Centre, Southampton, UK"}]},{"given":"Gianluca","family":"Correndo","sequence":"additional","affiliation":[{"name":"IT Innovation Centre, Southampton, UK"}]},{"given":"Ken","family":"Meacham","sequence":"additional","affiliation":[{"name":"IT Innovation Centre, Southampton, UK"}]},{"given":"Juri","family":"Papay","sequence":"additional","affiliation":[{"name":"IT Innovation Centre, Southampton, UK"}]},{"given":"Stephen C.","family":"Phillips","sequence":"additional","affiliation":[{"name":"IT Innovation Centre, Southampton, UK"}]},{"given":"Stefanie","family":"Wiegand","sequence":"additional","affiliation":[{"name":"IT Innovation Centre, Southampton, UK"}]},{"given":"Toby","family":"Wilkinson","sequence":"additional","affiliation":[{"name":"IT Innovation Centre, Southampton, UK"}]}],"member":"320","published-online":{"date-parts":[[2018,8,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Trustworthy systems design using semantic risk modelling. (February","author":"Chakravarthy Ajay","year":"2015","unstructured":"Ajay Chakravarthy , Xiaoyu Chen , Bassem Nasser , and Michael Surridge . 2015. Trustworthy systems design using semantic risk modelling. (February 2015 ). https:\/\/eprints.soton.ac.uk\/383465\/ Ajay Chakravarthy, Xiaoyu Chen, Bassem Nasser, and Michael Surridge. 2015. Trustworthy systems design using semantic risk modelling. (February 2015). https:\/\/eprints.soton.ac.uk\/383465\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815595"},{"key":"e_1_3_2_1_3_1","unstructured":"Foreseeti. 2018. SECURICAD. https:\/\/www.foreseeti.com\/.  Foreseeti. 2018. SECURICAD. https:\/\/www.foreseeti.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Per Hakon et al. 2008. SeaMonster: Providing tool support for security modeling.  Per Hakon et al. 2008. SeaMonster: Providing tool support for security modeling."},{"key":"e_1_3_2_1_5_1","unstructured":"ISO. 2009. ISO 31010: Risk management - Risk assessment techniques. https:\/\/www.iso.org\/standard\/51073.html.  ISO. 2009. ISO 31010: Risk management - Risk assessment techniques. https:\/\/www.iso.org\/standard\/51073.html."},{"key":"e_1_3_2_1_6_1","unstructured":"ISO. 2011. ISO\/IEC 27005: Information technology-Security techniques -Information security risk management. https:\/\/www.iso.org\/standard\/56742.html.  ISO. 2011. ISO\/IEC 27005: Information technology-Security techniques -Information security risk management. https:\/\/www.iso.org\/standard\/56742.html."},{"key":"e_1_3_2_1_8_1","unstructured":"Microsoft. 2018. Threat Modelling Tool. http:\/\/microsoft.com\/security.  Microsoft. 2018. Threat Modelling Tool. http:\/\/microsoft.com\/security."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Nazila Gol Mohammadi etal 2014. Maintaining Trustworthiness of Socio-Technical Systems at Run-Time. In Trust Privacy and Security in Digital Business. Cham 1--12.  Nazila Gol Mohammadi et al. 2014. Maintaining Trustworthiness of Socio-Technical Systems at Run-Time. In Trust Privacy and Security in Digital Business. Cham 1--12.","DOI":"10.1007\/978-3-319-09770-1_1"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of CAiSE","author":"Gol Nazila","year":"2015","unstructured":"Nazila Gol Mohammadi et al. 2015. Combining Risk-Management and Computational Approaches for Trustworthiness Evaluation of Socio-Technical Systems . In Proceedings of CAiSE 2015 . 237--244. Nazila Gol Mohammadi et al. 2015. Combining Risk-Management and Computational Approaches for Trustworthiness Evaluation of Socio-Technical Systems. In Proceedings of CAiSE 2015. 237--244."},{"key":"e_1_3_2_1_11_1","unstructured":"MyAppSecurity. 2018. Threat Modeller. http:\/\/threatmodeler.com\/.  MyAppSecurity. 2018. Threat Modeller. http:\/\/threatmodeler.com\/."},{"key":"e_1_3_2_1_12_1","unstructured":"M. Surridge et al. 2017. 5G-ENSURE DELIVERABLE D2.5 'TRUST MODEL'. https:\/\/5gensure.eu\/deliverables.  M. Surridge et al. 2017. 5G-ENSURE DELIVERABLE D2.5 'TRUST MODEL'. https:\/\/5gensure.eu\/deliverables."},{"key":"e_1_3_2_1_13_1","unstructured":"VsRisk. 2018. Risk Assessment Software. https:\/\/www.vigilantsoftware.co.uk\/topic\/vs-risk.  VsRisk. 2018. Risk Assessment Software. https:\/\/www.vigilantsoftware.co.uk\/topic\/vs-risk."}],"event":{"name":"SIGCOMM '18: ACM SIGCOMM 2018 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Budapest Hungary","acronym":"SIGCOMM '18"},"container-title":["Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229616.3229621","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3229616.3229621","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:37Z","timestamp":1750212457000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3229616.3229621"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,7]]},"references-count":12,"alternative-id":["10.1145\/3229616.3229621","10.1145\/3229616"],"URL":"https:\/\/doi.org\/10.1145\/3229616.3229621","relation":{},"subject":[],"published":{"date-parts":[[2018,8,7]]},"assertion":[{"value":"2018-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}