{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,7]],"date-time":"2024-01-07T21:31:31Z","timestamp":1704663091153},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2013,10,12]],"date-time":"2013-10-12T00:00:00Z","timestamp":1381536000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s00607-013-0354-9","type":"journal-article","created":{"date-parts":[[2013,10,11]],"date-time":"2013-10-11T13:40:29Z","timestamp":1381498829000},"page":"925-949","source":"Crossref","is-referenced-by-count":5,"title":["An adaptable distributed trust management framework for large-scale secure service-based systems"],"prefix":"10.1007","volume":"96","author":[{"given":"Stephen S.","family":"Yau","sequence":"first","affiliation":[]},{"given":"Yisheng","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Arun Balaji","family":"Buduru","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,12]]},"reference":[{"key":"354_CR1","unstructured":"Booth D, Haas H, McCabe F (2004) Web services architecture. http:\/\/www.w3.org\/TR\/ws-arch\/ . Accessed 15 Jan 2013"},{"key":"354_CR2","doi-asserted-by":"crossref","unstructured":"Francois J, Bernard B, Philippe N, Armando W, Jerker D, Jens E, Rumen K, Stamatis K, Petr S, Marcel T (2012) Technologies for SOA-based distributed large scale process monitoring and control systems. In: Proceedings of IECON 38th annual conference on IEEE industrial electronics society, pp 5799\u20135804. doi: 10.1109\/IECON.2012.6389589","DOI":"10.1109\/IECON.2012.6389589"},{"key":"354_CR3","unstructured":"IBM Web Services Architecture Team (2000) IBM web services architecture overview. https:\/\/www.ibm.com\/developerworks\/library\/w-ovr\/ . Accessed 15 Jan 2013"},{"key":"354_CR4","doi-asserted-by":"crossref","unstructured":"Papazoglou MP (2003) Service-oriented computing: concepts, characteristics and directions. In: Proceedings of 4th international conference on web information systems engineering, pp 3\u201312. doi: 10.1109\/WISE.2003.1254461","DOI":"10.1109\/WISE.2003.1254461"},{"key":"354_CR5","doi-asserted-by":"crossref","unstructured":"Blaze M, Feigenbaum J, Ioannidis J, Keromytis A (1999) The keyNote trust management system (version 2). RFC2704. http:\/\/tools.ietf.org\/html\/rfc2704 . Accessed 15 Jan 2013","DOI":"10.17487\/rfc2704"},{"key":"354_CR6","doi-asserted-by":"crossref","unstructured":"Blaze M, Feigenbaum J, Strauss M (1998) Compliance checking in the policyMaker trust management system. In: Proceedings of 2nd international conference of financial cryptography, pp 254\u2013274. doi: 10.1007\/BFb0055488","DOI":"10.1007\/BFb0055488"},{"issue":"3","key":"354_CR7","first-page":"127","volume":"2","author":"Y Chu","year":"1997","unstructured":"Chu Y, Fengenbaun J, LaMacchia B, Resnick P, Strauss M (1997) REFEREE: trust management for web applications. World Wide Web J 2(3):127\u2013139. doi: http:\/\/www.comp.nus.edu.sg\/~cs6203\/guidelines\/topic7\/referee-trust-management.pdf","journal-title":"World Wide Web J"},{"key":"354_CR8","doi-asserted-by":"crossref","unstructured":"Gavriloaie R, Nejdl W, Olmedilla D, Seamons K, Winslett M (2004) No registration needed: how to use declarative policies and negotiation to access sensitive resources on the semantic web. In: 1st European semantic web symposium, vol 3053, pp 342\u2013356. doi: 10.1007\/978-3-540-25956-5_24","DOI":"10.1007\/978-3-540-25956-5_24"},{"key":"354_CR9","doi-asserted-by":"crossref","unstructured":"Jim T (2001) SD3: a trust management system with certified evaluation. In: IEEE symposium on security and privacy, pp 106\u2013115. doi: 10.1109\/SECPRI.2001.924291","DOI":"10.1109\/SECPRI.2001.924291"},{"key":"354_CR10","doi-asserted-by":"crossref","unstructured":"Li N, Mitchell J (2003) RT: a role-based trust management framework. In: Proceedings of 3rd DARPA information survivability conference and exposition, vol 1, pp 201\u2013212. doi: 10.1109\/DISCEX.2003.1194885","DOI":"10.1109\/DISCEX.2003.1194885"},{"key":"354_CR11","doi-asserted-by":"crossref","unstructured":"Townend P, Venters C, Lau L, Djemame K, Dimitrova V, Marshall A, Xu J, Dibsdale C, Taylor N, Austin J, McAvoy J, Fletcher M, Hobson S (2012) A framework for improving trust in dynamic service-oriented systems. In: Proceedings of IEEE 15th international symposium on object\/component\/service-oriented real-time distributed computing workshops, pp 136\u2013141. doi: 10.1109\/ISORCW.2012.33","DOI":"10.1109\/ISORCW.2012.33"},{"issue":"4","key":"354_CR12","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MC.2003.1193234","volume":"36","author":"M Naedele","year":"2003","unstructured":"Naedele M (2003) Standards for XML and web services security. IEEE Comput 36(4):96\u201398. doi: 10.1109\/MC.2003.1193234","journal-title":"IEEE Comput"},{"key":"354_CR13","doi-asserted-by":"crossref","unstructured":"Nakamur Y, Hada S, Neyama R (2002) Towards the integration of web services security on enterprise environments. In: Proceedings of symposium on applications and the internet (SAINT) workshops, pp 166\u2013175. doi: 10.1109\/SAINTW.2002.994567","DOI":"10.1109\/SAINTW.2002.994567"},{"key":"354_CR14","unstructured":"WS-Security 1.1 (2006) OASIS web services security. https:\/\/www.oasis-open.org\/committees\/wss\/ . Accessed 15 Jan 2013"},{"key":"354_CR15","unstructured":"WS Security Policy 1.2 (2006) OASIS web services security. http:\/\/docs.oasis-open.org\/ws-sx\/ws-securitypolicy\/200702\/ws-securitypolicy-1.2-spec-os.html . Accessed 15 Jan 2013"},{"key":"354_CR16","doi-asserted-by":"crossref","unstructured":"Paik I, Komiya R (2012) Active situation awareness on web APIs for information on social network services. In: Proceedings of IEEE 1st international conference on services economics, pp 68\u201369. doi: 10.1109\/SE.2012.15","DOI":"10.1109\/SE.2012.15"},{"key":"354_CR17","doi-asserted-by":"crossref","unstructured":"Yau SS, Huang D, Gong H, Davulcu H (2005) Situation-awareness for adaptable service coordination in service-based systems. In: Proceedings of 29th annual internationl computer software and application conference, pp 107\u2013112. doi: 10.1109\/COMPSAC.2005.141","DOI":"10.1109\/COMPSAC.2005.141"},{"issue":"9","key":"354_CR18","doi-asserted-by":"crossref","first-page":"893","DOI":"10.1002\/spe.736","volume":"36","author":"SS Yau","year":"2006","unstructured":"Yau SS, Huang D, Gong H, Yao Y (2006) Support for situation-awareness in trustworthy ubiquitous computing application software. J Softw Pract Eng 36(9):893\u2013921. doi: 10.1109\/COMPSAC.2006.30","journal-title":"J Softw Pract Eng"},{"key":"354_CR19","doi-asserted-by":"crossref","unstructured":"Yau SS, Gong H, Huang D, Gao W, Zhu L (2006) Automated agent synthesis for situation awareness in service-based systems. In: Proceedings of 30th annual international computer software and application conference, pp. 503\u2013510. doi: 10.1109\/COMPSAC.2006.30","DOI":"10.1109\/COMPSAC.2006.30"},{"issue":"10","key":"354_CR20","doi-asserted-by":"crossref","first-page":"1663","DOI":"10.1016\/j.jss.2008.02.035","volume":"81","author":"SS Yau","year":"2008","unstructured":"Yau SS, Gong H, Huang D, Gao W, Zhu L (2008) Specification, decomposition and agent synthesis for situation-aware service-based systems. J Syst Softw 81(10):1663\u20131680. doi: 10.1016\/j.jss.2008.02.035","journal-title":"J Syst Softw"},{"issue":"1","key":"354_CR21","first-page":"21","volume":"7","author":"SS Yau","year":"2013","unstructured":"Yau SS, Huang D (2013) Development of situation-aware applications in services and cloud computing environments. Int J Softw Inform 7(1):21\u201339","journal-title":"Int J Softw Inform"},{"issue":"2","key":"354_CR22","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MC.2009.51","volume":"42","author":"M Blaze","year":"2009","unstructured":"Blaze M, Kannan S, Lee I, Sokolsky O, Smith M, Keromytis A, Lee W (2009) Dynamic trust management. Computer 42(2):44\u201352. doi: 10.1109\/MC.2009.51","journal-title":"Computer"},{"key":"354_CR23","doi-asserted-by":"crossref","unstructured":"AlNemr R, Meinel C (2008) Getting more from reputation systems: a context-aware reputation framework based on trust centers and agent lists. In: Proceedings of 3rd international multi-conference on computing in the global information technology, pp 137\u2013142. doi: 10.1109\/ICCGI.2008.45","DOI":"10.1109\/ICCGI.2008.45"},{"key":"354_CR24","doi-asserted-by":"crossref","unstructured":"Singh A, Liu L (2003) TrustMe: anonymous management of trust relationships in decentralized P2P systems. In: Proceedings of 3rd international conference on peer-to-peer computing, pp 142\u2013149. doi: 10.1109\/PTP.2003.1231514","DOI":"10.1109\/PTP.2003.1231514"},{"issue":"2","key":"354_CR25","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1109\/JSAC.2005.861390","volume":"24","author":"G Theodorakopoulos","year":"2006","unstructured":"Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE J Sel Areas Commun 24(2):318\u2013328. doi: 10.1109\/JSAC.2005.861390","journal-title":"IEEE J Sel Areas Commun"},{"issue":"7","key":"354_CR26","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L Xiong","year":"2004","unstructured":"Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843\u2013857. doi: 10.1109\/TKDE.2004.1318566","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"354_CR27","doi-asserted-by":"crossref","unstructured":"Conner W, Iyengar A, Mikalsen T, Rouvellou I, Nahrstedt K (2009) A trust management framework for service-oriented environments. ACM track: web engineering\/session: service oriented development, pp 891\u2013900. doi: 10.1145\/1526709.1526829","DOI":"10.1145\/1526709.1526829"},{"key":"354_CR28","doi-asserted-by":"crossref","unstructured":"Cheng A, Friedman E (2005) Sybilproof reputation mechanisms. In: Proceedings of ACM workshop on economics of peer-to-peer systems, pp 128\u2013132. doi: 10.1145\/1080192.1080202","DOI":"10.1145\/1080192.1080202"},{"key":"354_CR29","doi-asserted-by":"crossref","unstructured":"Douceur JR (2002) The Sybil attack. In: Proceedings of 1st international workshop on peer-to-peer systems (IPTPS), vol 2429. Springer, Berlin, pp 251\u2013260. ISBN: 3-540-44179-4","DOI":"10.1007\/3-540-45748-8_24"},{"key":"354_CR30","unstructured":"Survey (2005) E-crime watch survey 2005. http:\/\/www.cert.org\/archive\/pdf\/ecrimesurvey05.pdf . Accessed 15 Jan 2013"},{"key":"354_CR31","unstructured":"OASIS (2012) Security assertion markup language (SAML) version 2.0. https:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=security . Accessed 16 Jan 2013"},{"key":"354_CR32","unstructured":"OASIS (2004) eXtensible access control markup language (XACML) version 2.0. http:\/\/docs.oasis-open.org\/xacml\/access_control-xacml-2_0-core-spec-cd-04.pdf . Accessed 16 Jan 2013"},{"key":"354_CR33","doi-asserted-by":"crossref","unstructured":"Bhargavan K, Fournet C, Gordon AD (2004) A semantics for web services authentication. In: Proceedings of 31st ACM SIGPLAN-SIGACT symposium on principles of programming languages, vol 39, pp 198\u2013209. doi: 10.1145\/982962.964018","DOI":"10.1145\/982962.964018"},{"key":"354_CR34","doi-asserted-by":"crossref","unstructured":"Bertino E, Bonatti PA, Ferrari E, Sapino ML (2000) Temporal authorization bases: from specification to integration. J Comput Secur 8(4):309\u2013354. ISSN: 0926\u2013227X","DOI":"10.3233\/JCS-2000-8404"},{"issue":"2","key":"354_CR35","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S Jajodia","year":"2001","unstructured":"Jajodia S, Pamarati S (2001) Flexible supporting for multiple access control policies. ACM Trans Database Syst 26(2):214\u2013260. doi: 10.1145\/383891.383894","journal-title":"ACM Trans Database Syst"},{"issue":"1","key":"354_CR36","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TKDE.2005.1","volume":"17","author":"JBD Joshi","year":"2005","unstructured":"Joshi JBD, Bertino E, Latif U, Ghafoor A (2005) A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng 17(1):4\u201323. doi: 10.1109\/TKDE.2005.1","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"354_CR37","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/0004-3702(80)90014-4","volume":"13","author":"R Reiter","year":"1980","unstructured":"Reiter R (1980) A logic for default reasoning. Artif Intell 13:81\u2013132. doi: http:\/\/dl.acm.org\/citation.cfm?id=42646","journal-title":"Artif Intell"},{"key":"354_CR38","doi-asserted-by":"crossref","unstructured":"Uszok A et al (2003) KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement. In: Proceedings of IEEE 4th international workshop on policies for distributed systems and networks, pp 93\u201396. doi: 10.1109\/POLICY.2003.1206963","DOI":"10.1109\/POLICY.2003.1206963"},{"key":"354_CR39","volume-title":"The description logic handbook","author":"F Baader","year":"2003","unstructured":"Baader F, Calvanese D, McGuinness DL, Nardi D, Patel-Schneider PF (2003) The description logic handbook. Cambridge University Press, Cambridge"},{"key":"354_CR40","doi-asserted-by":"crossref","unstructured":"Kraft R (2002) Designing a distributed access control processor for network services on the web. In: Proceedings of ACM workshop on XML. Security, pp 36\u201352. doi: 10.1145\/764792.764799","DOI":"10.1145\/764792.764799"},{"key":"354_CR41","unstructured":"W3C (2004) Web services architecture. W3C working group note. http:\/\/www.w3.org\/TR\/ws-arch\/ . Accessed on 16 Jan 2013"},{"key":"354_CR42","doi-asserted-by":"crossref","unstructured":"Bharadwaj R (2003) Secure middleware for situation-aware Naval $$\\text{ C }^{2}$$ C 2 and combat systems. In: Proceedings of 9th internationall workshop on future trends of distributed computing system, pp 233\u2013240. doi: 10.1109\/FTDCS.2003.1204342","DOI":"10.1109\/FTDCS.2003.1204342"},{"issue":"5","key":"354_CR43","first-page":"140","volume":"65","author":"R Bharadwaj","year":"2002","unstructured":"Bharadwaj R (2002) SOL: a verifiable synchronous language for reactive systems. Proc Synchron Lang Appl Program 65(5):140\u2013154. doi: 10.1016\/S1571-0661(05)82565-4","journal-title":"Proc Synchron Lang Appl Program"},{"issue":"4","key":"354_CR44","doi-asserted-by":"crossref","first-page":"59","DOI":"10.4018\/jwsr.2007100103","volume":"4","author":"SS Yau","year":"2007","unstructured":"Yau SS, Davulcu H, Mukhopadhyay S, Gong H, Huang D, Singh P, Gelgi F (2007) Automated situation-aware service composition in service-oriented computing. Int J Web Serv Res 4(4):59\u201382. doi: 10.4018\/jwsr.2007100103","journal-title":"Int J Web Serv Res"},{"key":"354_CR45","unstructured":"Yau SS, Gupta S, Karim F, Ahamed S, Wang Y, Wang B (2003) A smart classroom for enhancing collaborative learning using pervasive computing technology. In: Proceedings of 6th WFEO world congress on engineering education & 2nd ASEE international colloquium on engineering education (ASEE2003), Paper No. 2521"},{"key":"354_CR46","unstructured":"OMG (2003) MDA guide version 1.0. http:\/\/www.omg.org\/mda\/mda_files\/MDA_Guide_Version1-0.pdf . Accessed 15 Jan 2013"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-013-0354-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-013-0354-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-013-0354-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T13:12:57Z","timestamp":1564492377000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-013-0354-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,12]]},"references-count":46,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["354"],"URL":"https:\/\/doi.org\/10.1007\/s00607-013-0354-9","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,12]]}}}