{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:51:11Z","timestamp":1761648671391,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Ministry of Education and Research (BMBF)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,9]]},"DOI":"10.1145\/3344948.3344973","type":"proceedings-article","created":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T12:16:25Z","timestamp":1567685785000},"page":"273-276","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Towards creation of a reference architecture for trust-based digital ecosystems"],"prefix":"10.1145","author":[{"given":"Emilia","family":"Cioroaica","sequence":"first","affiliation":[{"name":"Fraunhofer IESE, Kaiserslautern, Germany"}]},{"given":"Stanislav","family":"Chren","sequence":"additional","affiliation":[{"name":"Masaryk University, Brno, Czech Republic"}]},{"given":"Barbora","family":"Buhnova","sequence":"additional","affiliation":[{"name":"Masaryk University, Brno, Czech Republic"}]},{"given":"Thomas","family":"Kuhn","sequence":"additional","affiliation":[{"name":"Fraunhofer IESE, Kaiserslautern, Germany"}]},{"given":"Dimitar","family":"Dimitrov","sequence":"additional","affiliation":[{"name":"Siemens Corporate Technology, Munchen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"volume-title":"International Conference on Computer Safety, Reliability, and Security. Springer, 357--368","year":"2014","author":"Amorim Tiago","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Paris Avgeriou. 2003. Describing instantiating and evaluating a reference architecture: A case study. Enterprise Architecture Journal (2003).  Paris Avgeriou. 2003. Describing instantiating and evaluating a reference architecture: A case study. Enterprise Architecture Journal (2003)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30746-1_14"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1753235.1753251"},{"volume-title":"Prototyping Automotive Smart Ecosystems. In 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, 255--262","year":"2018","author":"Cioroaica Emilia","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00011"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131151.3131174"},{"key":"e_1_3_2_1_9_1","unstructured":"Martin Fowler. 1997. Analysis patterns: reusable object models. Addison-Wesley Professional.   Martin Fowler. 1997. Analysis patterns: reusable object models . Addison-Wesley Professional."},{"key":"e_1_3_2_1_11_1","unstructured":"Erik Hollnagel Arne N\u00e5bo and Ian V Lau. 2003. A systemic model for driver-in-control. (2003).  Erik Hollnagel Arne N\u00e5bo and Ian V Lau. 2003. A systemic model for driver-in-control. (2003)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.12.007"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.12.026"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370062.1370077"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA-ECSA.212.49"},{"key":"e_1_3_2_1_17_1","unstructured":"\u00d6zalp \u00d6zer and Yanchong Zheng. 2017. Trust and trustworthiness. (2017).  \u00d6zalp \u00d6zer and Yanchong Zheng. 2017. Trust and trustworthiness. (2017)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2015.06.141"},{"volume-title":"Marktpl\u00e4tze im Umbruch","author":"Sch\u00f6nberger Andreas","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/PLEASE.2013.6608655"},{"key":"e_1_3_2_1_21_1","unstructured":"Mark Seaborn and Thomas Dullien. 2015. Exploiting the DRAM rowhammer bug to gain kernel privileges. Black Hat 15 (2015).  Mark Seaborn and Thomas Dullien. 2015. Exploiting the DRAM rowhammer bug to gain kernel privileges. Black Hat 15 (2015)."},{"key":"e_1_3_2_1_22_1","unstructured":"Mike Shafto Mike Conroy Rich Doyle Ed Glaessgen Chris Kemp Jacqueline LeMoigne and Lui Wang. 2012. Modeling simulation information technology & processing roadmap. National Aeronautics and Space Administration (2012).  Mike Shafto Mike Conroy Rich Doyle Ed Glaessgen Chris Kemp Jacqueline LeMoigne and Lui Wang. 2012. Modeling simulation information technology & processing roadmap. National Aeronautics and Space Administration (2012)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140138808966698"}],"event":{"name":"ECSA: European Conference on Software Architecture","acronym":"ECSA","location":"Paris France"},"container-title":["Proceedings of the 13th European Conference on Software Architecture - Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3344948.3344973","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3344948.3344973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:28Z","timestamp":1750204468000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3344948.3344973"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,9]]},"references-count":22,"alternative-id":["10.1145\/3344948.3344973","10.1145\/3344948"],"URL":"https:\/\/doi.org\/10.1145\/3344948.3344973","relation":{},"subject":[],"published":{"date-parts":[[2019,9,9]]},"assertion":[{"value":"2019-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}