{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:18:01Z","timestamp":1725538681770},"publisher-location":"Boston, MA","reference-count":30,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387848099"},{"type":"electronic","value":"9780387848105"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/b137171_62","type":"book-chapter","created":{"date-parts":[[2009,9,22]],"date-time":"2009-09-22T21:01:09Z","timestamp":1253653269000},"page":"599-608","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Language for Modelling Trust in Information Systems"],"prefix":"10.1007","author":[{"given":"Kamaljit Kaur","family":"Bimrah","sequence":"first","affiliation":[]},{"given":"Haralambos","family":"Mouratidis","sequence":"additional","affiliation":[]},{"given":"David","family":"Preston","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,8,3]]},"reference":[{"issue":"1&2","key":"62_CR1","first-page":"9","volume":"4","author":"A. J\u00f8sang","year":"2004","unstructured":"J\u00f8sang, A., Patton, M.A. (2004).\"Technologies for Trust in Electronic Commerce.\u201d Electronic Commerce Research Journal 4(1&2): 9\u201321.","journal-title":"Electronic Commerce Research Journal"},{"key":"62_CR2","first-page":"4","volume":"5","author":"J.B. Michael","year":"2002","unstructured":"Michael, J.B., Hestad, D.R., Pedersen, C.M., Gaines L.T (2002). \u201cIncorporating the Human Element of Trust into Information Systems.\u201d IAnewsletter 5: 4\u20138.","journal-title":"\"Incorporating the Human Element of Trust into Information Systems.\u201d IAnewsletter"},{"key":"62_CR3","doi-asserted-by":"crossref","unstructured":"Chopra, K., Wallace, W.A. (2003). Trust in Electronic Environments. Proceedings of the 36th Hawaii Conference on System Sciences (HICSS'03), Hawaii.","DOI":"10.1109\/HICSS.2003.1174902"},{"key":"62_CR4","volume-title":"Privacy and Trust, PSPT\u201904 in conjunction with Mobiquitous","author":"F. Almenarez","year":"2004","unstructured":"Almenarez, F., Mar\u0131n, A., Campo, C., Garc\u0131a, C. (2004 ). PTM: A Pervasive Trust Management Model for Dynamic Open Environments. First Workshop on Pervasive Security, Privacy and Trust, PSPT\u201904 in conjunction with Mobiquitous, Boston, USA."},{"key":"62_CR5","doi-asserted-by":"publisher","first-page":"574","DOI":"10.2307\/2393868","volume":"41","author":"S. L. Robinson","year":"1996","unstructured":"Robinson, S. L. (1996). \u201cTrust and Breach of the Psychological Contract.\u201d Administrative Science Quarterly 41: 574\u2013579.","journal-title":"Administrative Science Quarterly"},{"key":"62_CR6","unstructured":"Alford, J. (2004). Building Trust in Partnerships Between Community Organization and Government. Changing the Way Government Works Seminar, Melbourne."},{"key":"62_CR7","volume-title":"Faculty of Computer Science and Information System University of Technology Malaysia, 81310","author":"M. A. Maarof","year":"2002","unstructured":"Maarof, M. A., Krishna, K (2002). A Hybrid Trust Management Model For MAS Based. Information Security Group, Faculty of Computer Science and Information System University of Technology Malaysia, 81310 Skudai, Johor."},{"key":"62_CR8","doi-asserted-by":"crossref","unstructured":"Yu, E., Liu, L (2001). Modelling Trust for System Design Using the i* Strategic Actors Framework. Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives.","DOI":"10.1007\/3-540-45547-7_11"},{"key":"62_CR9","volume-title":"18th International Conference","author":"A. Sutcliffe","year":"2006","unstructured":"Sutcliffe, A. (2006). Trust: From Cognition to Conceptual Models and Design. 18th International Conference, SE 2006, June 5\u20139, 2006 Proceedings, Springer-Verlag Berlin Heidelberg, Luxembourg."},{"key":"62_CR10","volume-title":"In Proceedings of the Thirteenth European Conference on Information Systems","author":"S. E. A. Kethers","year":"2005","unstructured":"Kethers, S. E. A. (2005). Modelling Trust Relationships in a Healthcare Network: Experiences with the TCD Framework. In Proceedings of the Thirteenth European Conference on Information Systems, Regensburg, Germany."},{"key":"62_CR11","unstructured":"Li, X., Valacich, J. S., Hess, T. J. (2004). Predicting User Trust in Information Systems: A Comparison of Competing Trust Models. The Proceedings of the 37th Hawaii International Conference on Systems Sciences, Hawaii."},{"key":"62_CR12","doi-asserted-by":"crossref","unstructured":"Giorgini, P., Mouratidis, H., Zannone, Z. (2006). Modelling Security and Trust with Secure Tropos. In Integrating Security and Software Engineering: Advances and Future Vision, Idea Group: 160\u2013189.","DOI":"10.4018\/978-1-59904-147-6.ch008"},{"key":"62_CR13","volume-title":"1st International Workshop on Safety and Security in Multiagent Systems","author":"H. Mouratidis","year":"2004","unstructured":"Mouratidis, H., Giorgini, P. (2004). Enhancing secure Tropos to effectively deal with security requirements in the development of multiagent systems. 1st International Workshop on Safety and Security in Multiagent Systems, NY, USA."},{"key":"62_CR14","volume-title":"SULTAN \u2013 A Language for Trust Specification and Analysis","author":"T. Grandison","year":"2001","unstructured":"Grandison, T., Sloman, M (2001). SULTAN \u2013 A Language for Trust Specification and Analysis. In: Eighth Workshop of the HP OpenView University Association, Berlin."},{"key":"62_CR15","unstructured":"Wilson, M., Arenas, A., Schubert, L., Ed. (2007). TrustCoM Framework V4. AL1 \u2013 TrustCoM Framework."},{"key":"62_CR16","unstructured":"J\u00fcrjens, J. (2004). \u201cDeveloping Security-Critical Applications with UMLsec. A Short Walk-Through.\u201d The European Journal for the Informatics Professional 5(2)."},{"key":"62_CR17","doi-asserted-by":"crossref","unstructured":"Basin, D., Clavel, M., Doser, J., Egea, M. (2007). A Metamodel-Based Approach for Analyzing Security-Design Models.MODELS 2007, Nashville, TN.","DOI":"10.1007\/978-3-540-75209-7_29"},{"issue":"8","key":"62_CR18","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1016\/j.is.2004.06.002","volume":"30","author":"H. Mouratidis","year":"2005","unstructured":"Mouratidis, H., Giorgini, P., Manson, G. (2005). When Security Meets Software Engineering: A Case of Modelling Secure Information Systems, in Information System. Elsevier 30(8): 609\u2013629.","journal-title":"in Information System. Elsevier"},{"key":"62_CR19","volume-title":"The CORAS Approach. EuroWeb 2002 Conference","author":"T. Dimitrakos","year":"2002","unstructured":"Dimitrakos, T., Ritchie, B., Raptis, D., St\u00f8len, K. (2002). Model Based Security Risk Analysis for Web Applications: The CORAS Approach. EuroWeb 2002 Conference, Oxford, UK."},{"key":"62_CR20","doi-asserted-by":"crossref","unstructured":"Bimrah, K., Mouratidis, H., Preston, D. (2007). Trust Ontology for Information Systems Development. 16th International Conference on Information Systems Development Ireland, Galway.","DOI":"10.1007\/978-0-387-78578-3_14"},{"key":"62_CR21","volume-title":"Springer Berlin\/Heidelberg","author":"L. Viljanen","year":"2005","unstructured":"Viljanen, L. (2005). Towards an Ontology of Trust. Lecture Notes in Computer Science, Springer Berlin\/Heidelberg, Copenhagen, Denmark."},{"key":"62_CR22","volume-title":"Springer-Verlag Berlin\/Heidelberg","author":"A. Kim","year":"2005","unstructured":"Kim, A., Luo, J., Kang, M. (2005). Security Ontology for Annotating Resources. Lecture Notes in Computer Science, Springer-Verlag Berlin\/Heidelberg, Agai Napa, Cyprus."},{"key":"62_CR23","volume-title":"Proceedings of the 1st Workshop Formal Ontologies Meet Industry","author":"C. Cuske","year":"2005","unstructured":"Cuske, C., Korthaus, A., Seedorf, S., Tomczyk, P. (2005). Towards Formal Ontologies for Technology Risk Measurement in the Banking Industry. Proceedings of the 1st Workshop Formal Ontologies Meet Industry, Verona, Italy."},{"key":"62_CR24","volume-title":"Springer Berlin\/Heidelberg","author":"A. Simmonds","year":"2004","unstructured":"Simmonds, A., Sandilands, P., Ekert, L.V. (2004). An Ontology for Network Security Attacks. Lecture Notes in Computer Science, Springer Berlin\/Heidelberg, Kathmandu, Nepal."},{"key":"62_CR25","doi-asserted-by":"crossref","unstructured":"Casare, S., Sichman, J. (2005). Towards a Functional Ontology of Reputation. International Conference on Autonomous Agents Archive Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, The Netherlands.","DOI":"10.1145\/1082473.1082550"},{"key":"62_CR26","unstructured":"Martimiano, A. F. M., Moreira, E. S. (2005). An OWL-based Security Incident Ontology. In: Proceedings of the Eighth International Protege Conference 43\u201344 Poster."},{"key":"62_CR27","volume-title":"Engineering Systems","author":"H. Mouratidis","year":"2003","unstructured":"Mouratidis, H., Giorgini, P., Mansoon, G (2003). An Ontology for Modelling Security: The Tropos Approach. Proceedings of the 7th International Conference on Knowledge-Based Intelligent Information & Engineering Systems, Oxford, England."},{"key":"62_CR28","unstructured":"Siegel, J. (2001). \u201cDeveloping in OMG's Model-Driven Architecture.\u201d Developing in the MDA."},{"key":"62_CR29","doi-asserted-by":"crossref","unstructured":"Grandison, T., Sloman, M (2000). \u201cA Survey of Trust in Internet Applications.\u201d IEEE Communications Surveys and Tutorials 3(4).","DOI":"10.1109\/COMST.2000.5340804"},{"key":"62_CR30","volume-title":"Random House","author":"House Random","year":"2006","unstructured":"Random House (2006). Random House Unabridged Dictionary, Random House, Inc., New York."}],"container-title":["Information Systems Development"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/b137171_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T19:59:27Z","timestamp":1676059167000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/b137171_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9780387848099","9780387848105"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/b137171_62","relation":{},"subject":[],"published":{"date-parts":[[2009]]},"assertion":[{"value":"3 August 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}