{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:08Z","timestamp":1750219988166,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,12]],"date-time":"2023-04-12T00:00:00Z","timestamp":1681257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1835441"],"award-info":[{"award-number":["1835441"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-22-1-2724"],"award-info":[{"award-number":["N00014-22-1-2724"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,12]]},"DOI":"10.1145\/3564746.3587014","type":"proceedings-article","created":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T18:29:00Z","timestamp":1686594540000},"page":"120-127","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Trust-based Enrollment in a Group in a Distributed Setting"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-6061-0498","authenticated-orcid":false,"given":"Kofi","family":"Kyei","sequence":"first","affiliation":[{"name":"North Carolina A&amp;T State University, Greensboro, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1434-8167","authenticated-orcid":false,"given":"Yasmin","family":"Eady","sequence":"additional","affiliation":[{"name":"North Carolina A&amp;T State University, Greensboro, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8774-4456","authenticated-orcid":false,"given":"Albert","family":"Esterline","sequence":"additional","affiliation":[{"name":"North Carolina A&amp;T State University, Greensboro, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9371-7403","authenticated-orcid":false,"given":"Joseph","family":"Shelton","sequence":"additional","affiliation":[{"name":"Virginia State University, Petersburg, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/502585.502638"},{"volume-title":"2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech)","author":"Airehrour David","key":"e_1_3_2_1_2_1","unstructured":"David Airehrour, Jairo Gutierrez, and Sayan Kumar Ray. 2016. A Lightweight Trust Design for IoT Routing. In 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech). IEEE, 552--557."},{"key":"e_1_3_2_1_3_1","volume-title":"FOAF Vocabulary Specification 0.99. W3C","author":"Brickley Dan","year":"2014","unstructured":"Dan Brickley and Libby Miller. 2014. FOAF Vocabulary Specification 0.99. W3C (2014). http:\/\/xmlns.com\/foaf\/0.1"},{"volume-title":"Classic works of the Dempster-Shafer theory of belief functions","author":"Dempster Arthur P","key":"e_1_3_2_1_4_1","unstructured":"Arthur P Dempster. 2008. Upper and Lower Probabilities Induced by a Multivalued Mapping. In Classic works of the Dempster-Shafer theory of belief functions. Springer, 57--72."},{"volume-title":"Networks, Crowds, and Markets: Reasoning about a Highly Connected World","author":"Easley David","key":"e_1_3_2_1_5_1","unstructured":"David Easley and Jon Kleinberg. 2010. Networks, Crowds, and Markets: Reasoning about a Highly Connected World. Cambridge university press."},{"key":"e_1_3_2_1_6_1","volume-title":"Trust Management Tools for Internet Applications. In International Conference on Trust Management. Springer, 91--107","author":"Grandison Tyrone","year":"2003","unstructured":"Tyrone Grandison and Morris Sloman. 2003. Trust Management Tools for Internet Applications. In International Conference on Trust Management. Springer, 91--107."},{"key":"e_1_3_2_1_7_1","volume-title":"A Survey of Trust and Reputation Systems for Online Service Provision. Decision support systems 43, 2","author":"J\u00f8sang Audun","year":"2007","unstructured":"Audun J\u00f8sang, Roslan Ismail, and Colin Boyd. 2007. A Survey of Trust and Reputation Systems for Online Service Provision. Decision support systems 43, 2 (2007), 618--644."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon45413.2021.9401947"},{"key":"e_1_3_2_1_9_1","volume-title":"Cooperative Peer Groups in NICE. In IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428)","volume":"2","author":"Lee Seungjoon","year":"2003","unstructured":"Seungjoon Lee, Rob Sherwood, and Bobby Bhattacharjee. 2003. Cooperative Peer Groups in NICE. In IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428), Vol. 2. IEEE, 1272--1282."},{"key":"e_1_3_2_1_10_1","volume-title":"Trust as a Social Reality. Social forces 63, 4","author":"David Lewis J","year":"1985","unstructured":"J David Lewis and Andrew Weigert. 1985. Trust as a Social Reality. Social forces 63, 4 (1985), 967--985."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.12.014"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297235"},{"volume-title":"Networks","author":"Newman Mark","key":"e_1_3_2_1_13_1","unstructured":"Mark Newman. 2018. Networks. Oxford university press."},{"volume-title":"What is the Analytic Hierarchy Process? In Mathematical models for decision support","author":"Saaty Thomas L","key":"e_1_3_2_1_14_1","unstructured":"Thomas L Saaty. 1988. What is the Analytic Hierarchy Process? In Mathematical models for decision support. Springer, 109--121."},{"key":"e_1_3_2_1_15_1","volume-title":"Web Identity and Discovery. W3C Editor","author":"Sambra Andrei","year":"2014","unstructured":"Andrei Sambra, Henry Story, and Tim Berners-Lee. 2014. WebID 1.0, Web Identity and Discovery. W3C Editor's Draft (2014). https:\/\/www.w3.org\/2005\/Incubator\/webid\/spec\/identity\/"},{"volume-title":"A Mathematical Theory of Evidence","author":"Shafer Glenn","key":"e_1_3_2_1_16_1","unstructured":"Glenn Shafer. 1976. A Mathematical Theory of Evidence. Vol. 42. Princeton university press."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the First Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009)","author":"Story Henry","year":"2009","unstructured":"Henry Story, Bruno Harbulot, Ian Jacobi, and Mike Jones. 2009. FOAF+ SSL: Restful Authentication for the Social Web. In Proceedings of the First Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009)."},{"key":"e_1_3_2_1_20_1","article-title":"Distributed Trust Management Mechanism for the Internet of Things. In Applied Mechanics and Materials, Vol. 347","author":"Wang Jing Pei","year":"2013","unstructured":"Jing Pei Wang, Sun Bin, Yang Yu, and Xin Xin Niu. 2013. Distributed Trust Management Mechanism for the Internet of Things. In Applied Mechanics and Materials, Vol. 347. Trans Tech Publ, 2463--2467.","journal-title":"Trans Tech Publ, 2463--2467."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.09.012"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1993.287635"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/860575.860588"}],"event":{"name":"ACMSE 2023: 2023 ACM Southeast Conference","acronym":"ACMSE 2023","location":"Virtual Event USA"},"container-title":["Proceedings of the 2023 ACM Southeast Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564746.3587014","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564746.3587014","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564746.3587014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:30Z","timestamp":1750182570000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564746.3587014"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,12]]},"references-count":21,"alternative-id":["10.1145\/3564746.3587014","10.1145\/3564746"],"URL":"https:\/\/doi.org\/10.1145\/3564746.3587014","relation":{},"subject":[],"published":{"date-parts":[[2023,4,12]]},"assertion":[{"value":"2023-06-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}