{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:51Z","timestamp":1750307691598,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,3,31]],"date-time":"2009-03-31T00:00:00Z","timestamp":1238457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-07-1-0907"],"award-info":[{"award-number":["N00014-07-1-0907"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,3,31]]},"DOI":"10.1145\/1519144.1519149","type":"proceedings-article","created":{"date-parts":[[2009,4,6]],"date-time":"2009-04-06T16:34:53Z","timestamp":1239035693000},"page":"28-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["QuanTM"],"prefix":"10.1145","author":[{"given":"Andrew G.","family":"West","sequence":"first","affiliation":[{"name":"University of Pennsylvania, Philadelphia"}]},{"given":"Adam J.","family":"Aviv","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia"}]},{"given":"Jian","family":"Chang","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia"}]},{"given":"Vinayak S.","family":"Prabhu","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia"}]},{"given":"Matt","family":"Blaze","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia"}]},{"given":"Sampath","family":"Kannan","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia"}]},{"given":"Insup","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia"}]},{"given":"Jonathan M.","family":"Smith","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia"}]},{"given":"Oleg","family":"Sokolsky","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia"}]}],"member":"320","published-online":{"date-parts":[[2009,3,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"OpenBSD. http:\/\/www.openbsd.org.  OpenBSD. http:\/\/www.openbsd.org."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1160074.1159839"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292555"},{"key":"e_1_3_2_1_4_1","unstructured":"B. Atkinson. Web services security (WS-Security). http:\/\/msdn.microsoft.com\/library\/default.asp? url=\/library\/en-us\/dnglobspec\/html\/ws-security.asp 2002.  B. Atkinson. Web services security (WS-Security). http:\/\/msdn.microsoft.com\/library\/default.asp? url=\/library\/en-us\/dnglobspec\/html\/ws-security.asp 2002."},{"volume-title":"Microsoft Research","year":"2006","author":"Becker M. Y.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","first-page":"164","article-title":"The KeyNote trust-management system, version 2","volume":"2704","author":"Blaze M.","year":"1999","journal-title":"IETF RFC"},{"key":"e_1_3_2_1_7_1","volume-title":"Security Protocols Workshop","volume":"1550","author":"Blaze M.","year":"1999"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947337.1947361"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.51"},{"key":"e_1_3_2_1_10_1","series-title":"LNCS","first-page":"1505","volume-title":"GADA '07","author":"Colombo M.","year":"2007"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1151699.1151710"},{"volume-title":"Proceedings of IJCAI-01 Workshop on Autonomy, Delegation and Control","year":"2001","author":"Kagal L.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1239971.1239972"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.76"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/605434.605438"},{"volume-title":"DARPA Information Survivability Conference and Exposition, 2003. Proceedings, 1: 201--212","year":"2003","author":"Li N.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24747-0_5"},{"key":"e_1_3_2_1_20_1","unstructured":"ports@FreeBSD.org. FreeBSD port keynote-2.3-1. http:\/\/www.freebsd.org\/ports\/security.html.  ports@FreeBSD.org. FreeBSD port keynote-2.3-1. http:\/\/www.freebsd.org\/ports\/security.html."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.119"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/800135.804393"},{"key":"e_1_3_2_1_23_1","unstructured":"A. G. West S. Kannan I. Lee and O. Sokolsky. An evaluation framework for reputation management systems. Working chapter for Trust Modeling and Management in Digital Environments: From Social Concept to System Development (Zheng Yan ed.).  A. G. West S. Kannan I. Lee and O. Sokolsky. An evaluation framework for reputation management systems. Working chapter for Trust Modeling and Management in Digital Environments: From Social Concept to System Development (Zheng Yan ed.)."}],"event":{"name":"EuroSys '09: Fourth EuroSys Conference 2009","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Nuremburg Germany","acronym":"EuroSys '09"},"container-title":["Proceedings of the Second European Workshop on System Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1519144.1519149","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1519144.1519149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:54Z","timestamp":1750253394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1519144.1519149"}},"subtitle":["a quantitative trust management system"],"short-title":[],"issued":{"date-parts":[[2009,3,31]]},"references-count":23,"alternative-id":["10.1145\/1519144.1519149","10.1145\/1519144"],"URL":"https:\/\/doi.org\/10.1145\/1519144.1519149","relation":{},"subject":[],"published":{"date-parts":[[2009,3,31]]},"assertion":[{"value":"2009-03-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}