{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:13:17Z","timestamp":1725574397744},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540235781"},{"type":"electronic","value":"9783540302070"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30207-0_48","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T20:51:21Z","timestamp":1294433481000},"page":"382-389","source":"Crossref","is-referenced-by-count":4,"title":["Modeling Time-Related Trust"],"prefix":"10.1007","author":[{"given":"Chenlin","family":"Huang","sequence":"first","affiliation":[]},{"given":"Hua-Ping","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Zhiying","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","first-page":"3","volume-title":"Proceedings of the European Symposium on Research in Computer Security","author":"T. Beth","year":"1994","unstructured":"Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Proceedings of the European Symposium on Research in Computer Security, pp. 3\u201318. Springer, Brighton (1994)"},{"key":"48_CR2","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Halles, S.: A distributed trust model. In: New Security Paradigms Workshop 1997, pp. 48\u201360 (1997)","DOI":"10.1145\/283699.283739"},{"key":"48_CR3","unstructured":"Teng, Y., Phoha, V., Choi, B.: Design of trust metrics based on dempstershafer theory, http:\/\/citeseer.nj.nec.com\/461538.html"},{"key":"48_CR4","unstructured":"Manchala, D.W.: Trust metrics, models and protocols for electronic commerce transactions. In: The 18th International Conference on Distributed Computing Systems, pp. 3\u201312 (1998)"},{"key":"48_CR5","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A.: Prospectives for modelling trust in information security. In: Australasian Conference on Information Security and Privacy, pp. 2\u201313 (1997)","DOI":"10.1007\/BFb0027928"},{"key":"48_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/BFb0055873","volume-title":"Computer Security \u2013 ESORICS 98","author":"A. J\u00f8sang","year":"1998","unstructured":"J\u00f8sang, A.: A subjective metric of authentication. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 329\u2013344. Springer, Heidelberg (1998)"},{"issue":"3","key":"48_CR7","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A. J\u00f8sang","year":"2001","unstructured":"J\u00f8sang, A.: A logic for uncertain probabilities. International Journal of Uncertainty. Fuzziness and Knowledge-Based Systems\u00a09(3), 279\u2013311 (2001)","journal-title":"International Journal of Uncertainty. Fuzziness and Knowledge-Based Systems"},{"key":"48_CR8","unstructured":"Lamsal, P.: Understanding Trust and Security (2001), http:\/\/citeseer.nj.nec.com\/lamsal01understanding.html"},{"key":"48_CR9","doi-asserted-by":"crossref","unstructured":"Grandison, T.: Trust Management for Internet Applications. PhD thesis (2003)","DOI":"10.1007\/3-540-44875-6_7"},{"key":"48_CR10","doi-asserted-by":"crossref","unstructured":"Xiong, L., Liu, L.: A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities. The IEEE Conference on E-Commerce (2003)","DOI":"10.1145\/779928.779972"},{"key":"48_CR11","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a09(3) (June 2001)","DOI":"10.1016\/S0218-4885(01)00083-1"},{"key":"48_CR12","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G. Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)"},{"key":"48_CR13","unstructured":"Chenlin, H., huaping, H., Zhiying, W.: The Extension of Subjective Logic for Timerelated Trust. Submitted to CTCIS 2004 (2004)"}],"container-title":["Lecture Notes in Computer Science","Grid and Cooperative Computing - GCC 2004 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30207-0_48.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T02:52:42Z","timestamp":1637117562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30207-0_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540235781","9783540302070"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30207-0_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}