{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T04:35:35Z","timestamp":1725683735544},"reference-count":71,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1016\/j.comnet.2021.108506","type":"journal-article","created":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T12:53:08Z","timestamp":1633351988000},"page":"108506","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":18,"special_numbering":"C","title":["A blockchain-based trust management framework with verifiable interactions"],"prefix":"10.1016","volume":"200","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8784-0154","authenticated-orcid":false,"given":"Shantanu","family":"Pal","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1430-3518","authenticated-orcid":false,"given":"Ambrose","family":"Hill","sequence":"additional","affiliation":[]},{"given":"Tahiry","family":"Rabehaja","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6320-9184","authenticated-orcid":false,"given":"Michael","family":"Hitchens","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2021.108506_b1","series-title":"Trust Management VIII","first-page":"1","article-title":"The importance of trust in computer security","author":"Jensen","year":"2014"},{"key":"10.1016\/j.comnet.2021.108506_b2","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2019.02.024","article-title":"Trust models of internet of smart things: A survey, open issues and future directions","author":"Altaf","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"10.1016\/j.comnet.2021.108506_b3","first-page":"10","article-title":"A survey on trust computation in the internet of things","volume":"33","author":"Truong","year":"2016","journal-title":"J. Korean Inst. Commun. Inf. Sci."},{"key":"10.1016\/j.comnet.2021.108506_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107254","article-title":"Discrimination-aware trust management for social internet of things","volume":"178","author":"Jafarian","year":"2020","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2021.108506_b5","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.future.2019.05.017","article-title":"Modeling trust and reputation systems in hostile environments","volume":"99","author":"Ghasempouri","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.comnet.2021.108506_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.107952","article-title":"An adaptive trust model based on recommendation filtering algorithm for the Internet of Things systems","volume":"190","author":"Chen","year":"2021","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2021.108506_b7","series-title":"Web Information System Engineering","first-page":"314","article-title":"Trust as a service: A framework for trust management in cloud environments","author":"Noor","year":"2011"},{"key":"10.1016\/j.comnet.2021.108506_b8","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1016\/j.future.2019.02.060","article-title":"Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions","volume":"97","author":"Hassan","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"10.1016\/j.comnet.2021.108506_b9","doi-asserted-by":"crossref","first-page":"1594","DOI":"10.1109\/JIOT.2018.2847705","article-title":"Smart contract-based access control for the internet of things","volume":"6","author":"Zhang","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2021.108506_b10","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108005","article-title":"On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance","volume":"191","author":"Brotsis","year":"2021","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2021.108506_b11","first-page":"205","article-title":"Defining trust using expected utility theory","author":"Arai","year":"2009","journal-title":"Hitotsubashi J. Econ."},{"issue":"2","key":"10.1016\/j.comnet.2021.108506_b12","doi-asserted-by":"crossref","first-page":"28:1","DOI":"10.1145\/2815595","article-title":"A survey on trust modeling","volume":"48","author":"Cho","year":"2015","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.comnet.2021.108506_b13","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.comnet.2015.07.011","article-title":"Trust management and reputation systems in mobile participatory sensing applications: A survey","volume":"90","author":"Mousa","year":"2015","journal-title":"Comput. Netw."},{"issue":"6","key":"10.1016\/j.comnet.2021.108506_b14","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1111\/j.1751-9004.2009.00232.x","article-title":"The psychology (and economics) of trust","volume":"3","author":"Evans","year":"2009","journal-title":"Soc. Pers. Psychol. Compass"},{"issue":"3","key":"10.1016\/j.comnet.2021.108506_b15","doi-asserted-by":"crossref","first-page":"393","DOI":"10.5465\/amr.1998.926617","article-title":"Not so different after all: A cross-discipline view of trust","volume":"23","author":"Rousseau","year":"1998","journal-title":"Acad. Manag. Rev."},{"key":"10.1016\/j.comnet.2021.108506_b16","series-title":"Cooperation and Trust: Some Theoretical Notes","first-page":"275","author":"Deutsch","year":"1962"},{"key":"10.1016\/j.comnet.2021.108506_b17","series-title":"Trust in Cyber-Societies","first-page":"27","article-title":"Trust and distrust definitions: One bite at a time","author":"Harrison\u00a0McKnight","year":"2001"},{"key":"10.1016\/j.comnet.2021.108506_b18","series-title":"Trust Management","first-page":"135","article-title":"Analysing the relationship between risk and trust","author":"J\u00f8sang","year":"2004"},{"issue":"4","key":"10.1016\/j.comnet.2021.108506_b19","doi-asserted-by":"crossref","first-page":"967","DOI":"10.2307\/2578601","article-title":"Trust as a social reality","volume":"63","author":"Lewis","year":"1985","journal-title":"Soc. Forces"},{"key":"10.1016\/j.comnet.2021.108506_b20","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","article-title":"Security, privacy and trust in Internet of Things: The road ahead","volume":"76","author":"Sicari","year":"2015","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2021.108506_b21","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","article-title":"A survey on trust management for Internet of Things","volume":"42","author":"Yan","year":"2014","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.comnet.2021.108506_b22","series-title":"Constructing Ambient Intelligence","first-page":"267","article-title":"On the internet of things, trust is relative","author":"Fritsch","year":"2012"},{"key":"10.1016\/j.comnet.2021.108506_b23","series-title":"2016 8th International Symposium on Telecommunications","first-page":"89","article-title":"A conceptual trust model for the Internet of Things interactions","author":"Arabsorkhi","year":"2016"},{"issue":"4","key":"10.1016\/j.comnet.2021.108506_b24","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","article-title":"A survey on trust management for mobile ad hoc networks","volume":"13","author":"Cho","year":"2011","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"10.1016\/j.comnet.2021.108506_b25","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","article-title":"A survey of trust and reputation systems for online service provision","volume":"43","author":"J\u00f8sang","year":"2007","journal-title":"Decis. Support Syst."},{"key":"10.1016\/j.comnet.2021.108506_b26","series-title":"Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks","author":"Mui","year":"2002"},{"issue":"2","key":"10.1016\/j.comnet.2021.108506_b27","first-page":"7","article-title":"Third party assurances: mapping the road to trust in eretailing","volume":"4","author":"Kimery","year":"2002","journal-title":"J. Inf. Technol. Theory Appl."},{"issue":"6","key":"10.1016\/j.comnet.2021.108506_b28","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1016\/S1071-5819(03)00041-7","article-title":"On-line trust: concepts, evolving themes, a model","volume":"58","author":"Corritore","year":"2003","journal-title":"Int. J. Hum.-Comput. Stud."},{"issue":"2","key":"10.1016\/j.comnet.2021.108506_b29","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.websem.2007.03.002","article-title":"A survey of trust in computer science and the Semantic Web","volume":"5","author":"Artz","year":"2007","journal-title":"J. Web Semant."},{"issue":"3","key":"10.1016\/j.comnet.2021.108506_b30","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","article-title":"A logic for uncertain probabilities","volume":"9","author":"J\u00f8sang","year":"2001","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"10.1016\/j.comnet.2021.108506_b31","series-title":"2016 International Conference on Emerging Trends in Communication Technologies","first-page":"1","article-title":"A framework to manage Trust in Internet of Things","author":"Sharma","year":"2016"},{"key":"10.1016\/j.comnet.2021.108506_b32","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.cose.2013.09.001","article-title":"Trust management system design for the Internet of Things: A context-aware and multi-service approach","volume":"39","author":"Saied","year":"2013","journal-title":"Comput. Secur."},{"key":"10.1016\/j.comnet.2021.108506_b33","series-title":"Applied Mechanics and Materials, Vol. 347","first-page":"2463","article-title":"Distributed trust management mechanism for the internet of things","author":"Wang","year":"2013"},{"key":"10.1016\/j.comnet.2021.108506_b34","series-title":"2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks","first-page":"1","article-title":"Trust management for the internet of things and its application to service composition","author":"Bao","year":"2012"},{"key":"10.1016\/j.comnet.2021.108506_b35","series-title":"2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems","first-page":"1","article-title":"Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems","author":"Bao","year":"2013"},{"issue":"6","key":"10.1016\/j.comnet.2021.108506_b36","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1109\/TDSC.2015.2420552","article-title":"Trust-based service management for social internet of things systems","volume":"13","author":"Chen","year":"2016","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.comnet.2021.108506_b37","first-page":"569","article-title":"Beyond bitcoin: Issues in regulating blockchain tranactions","volume":"65","author":"Kiviat","year":"2015","journal-title":"Duke LJ"},{"key":"10.1016\/j.comnet.2021.108506_b38","series-title":"2017 IEEE International Congress on Big Data","first-page":"557","article-title":"An overview of blockchain technology: Architecture, consensus, and future trends","author":"Zheng","year":"2017"},{"key":"10.1016\/j.comnet.2021.108506_b39","series-title":"2016 IEEE\/ACS 13th International Conference of Computer Systems and Applications","first-page":"1","article-title":"Blockchain for the Internet of Things: A systematic literature review","author":"Conoscenti","year":"2016"},{"key":"10.1016\/j.comnet.2021.108506_b40","series-title":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies","first-page":"77","article-title":"A blockchain-based trust system for the internet of things","author":"Di\u00a0Pietro","year":"2018"},{"issue":"3","key":"10.1016\/j.comnet.2021.108506_b41","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1109\/TCSS.2020.2990103","article-title":"Security and trust in blockchains: Architecture, key technologies, and open issues","volume":"7","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"2","key":"10.1016\/j.comnet.2021.108506_b42","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1109\/JAS.2020.1003039","article-title":"Securing parked vehicle assisted fog computing with blockchain and optimal smart contract design","volume":"7","author":"Huang","year":"2020","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"10.1016\/j.comnet.2021.108506_b43","series-title":"2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/ 12th IEEE International Conference on Big Data Science and Engineering","first-page":"98","article-title":"BARS: A blockchain-based anonymous reputation system for trust management in VANETs","author":"Lu","year":"2018"},{"issue":"3","key":"10.1016\/j.comnet.2021.108506_b44","doi-asserted-by":"crossref","first-page":"4660","DOI":"10.1109\/JIOT.2018.2875542","article-title":"Blockchain for secure and efficient data sharing in vehicular edge computing and networks","volume":"6","author":"Kang","year":"2019","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"10.1016\/j.comnet.2021.108506_b45","doi-asserted-by":"crossref","first-page":"5510","DOI":"10.1109\/JIOT.2020.3030689","article-title":"A trust-evaluation-enhanced blockchain-secured industrial IoT system","volume":"8","author":"Wu","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2021.108506_b46","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2019.100058","article-title":"Novel trust consensus protocol and blockchain-based trust evaluation system for M2M application services","volume":"7","author":"Shala","year":"2019","journal-title":"Internet Things"},{"key":"10.1016\/j.comnet.2021.108506_b47","doi-asserted-by":"crossref","first-page":"184133","DOI":"10.1109\/ACCESS.2019.2960609","article-title":"A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks","volume":"7","author":"Kim","year":"2019","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.comnet.2021.108506_b48","doi-asserted-by":"crossref","first-page":"1495","DOI":"10.1109\/JIOT.2018.2836144","article-title":"Blockchain-based decentralized trust management in vehicular networks","volume":"6","author":"Yang","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2021.108506_b49","series-title":"2015 10th International Conference for Internet Technology and Secured Transactions","first-page":"131","article-title":"Rep on the block: A next generation reputation system based on the blockchain","author":"Dennis","year":"2015"},{"issue":"3","key":"10.1016\/j.comnet.2021.108506_b50","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0228844","article-title":"TrustBlock: An adaptive trust evaluation of SDN network nodes based on double-layer blockchain","volume":"15","author":"Zhao","year":"2020","journal-title":"PLoS One"},{"key":"10.1016\/j.comnet.2021.108506_b51","series-title":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops","first-page":"841","article-title":"STewARD:SDN and blockchain-based Trust evaluation for Automated Risk management on IoT devices","author":"Boussard","year":"2019"},{"key":"10.1016\/j.comnet.2021.108506_b52","series-title":"Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services","first-page":"190","article-title":"A trust architecture for blockchain in IoT","author":"Dedeoglu","year":"2019"},{"issue":"22","key":"10.1016\/j.comnet.2021.108506_b53","doi-asserted-by":"crossref","first-page":"4954","DOI":"10.3390\/s19224954","article-title":"Secure trust-based blockchain architecture to prevent attacks in VANET","volume":"19","author":"Khan","year":"2019","journal-title":"Sensors"},{"issue":"1","key":"10.1016\/j.comnet.2021.108506_b54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3419102","article-title":"Social-chain: Decentralized trust evaluation based on blockchain in pervasive social networking","volume":"21","author":"Yan","year":"2021","journal-title":"ACM Trans. Internet Technol."},{"issue":"4","key":"10.1016\/j.comnet.2021.108506_b55","doi-asserted-by":"crossref","first-page":"2630","DOI":"10.1109\/JIOT.2019.2952141","article-title":"On the integration of blockchain to the internet of things for enabling access right delegation","volume":"7","author":"Pal","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2021.108506_b56","series-title":"Trust management model for cloud computing environment","author":"Prajapati","year":"2013"},{"key":"10.1016\/j.comnet.2021.108506_b57","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.adhoc.2018.07.009","article-title":"Toward trust based protocols in a pervasive and mobile computing environment: A survey","volume":"81","author":"Usman","year":"2018","journal-title":"Ad Hoc Netw."},{"issue":"1","key":"10.1016\/j.comnet.2021.108506_b58","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/S0305-0483(99)00033-X","article-title":"The Dempster\u2013Shafer theory of evidence: an alternative approach to multicriteria decision modelling","volume":"28","author":"Beynon","year":"2000","journal-title":"Omega"},{"key":"10.1016\/j.comnet.2021.108506_b59","series-title":"Upper and Lower Probabilities Induced by a Multivalued Mapping, Vol. 38","first-page":"325","author":"Dempster","year":"1967"},{"key":"10.1016\/j.comnet.2021.108506_b60","series-title":"2014 IEEE 28th International Conference on Advanced Information Networking and Applications","first-page":"49","article-title":"Dynamic hierarchical trust management of mobile groups and its application to misbehaving node detection","author":"Chen","year":"2014"},{"key":"10.1016\/j.comnet.2021.108506_b61","series-title":"European Workshop on Modelling Autonomous Agents in a Multi-Agent World","first-page":"221","article-title":"Formal analysis of models for the dynamics of trust based on experiences","author":"Jonker","year":"1999"},{"key":"10.1016\/j.comnet.2021.108506_b62","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1214\/aoms\/1177698950","article-title":"Upper and lower probabilities induced by a multivalued mapping","volume":"38","author":"Dempster","year":"1967","journal-title":"Ann. Math. Stat."},{"issue":"5","key":"10.1016\/j.comnet.2021.108506_b63","doi-asserted-by":"crossref","first-page":"3521","DOI":"10.1109\/TII.2019.2925898","article-title":"On the design of a flexible delegation model for the internet of things using blockchain","volume":"16","author":"Pal","year":"2020","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.comnet.2021.108506_b64","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2016.10.012","article-title":"A survey of trust computation models for service management in internet of things systems","volume":"97","author":"Guo","year":"2017","journal-title":"Comput. Commun."},{"key":"10.1016\/j.comnet.2021.108506_b65","series-title":"2006 40th Annual Conference on Information Sciences and Systems","first-page":"1461","article-title":"Attacks on trust evaluation in distributed networks","author":"Sun","year":"2006"},{"key":"10.1016\/j.comnet.2021.108506_b66","series-title":"Cloud Armor: a Platform for Credibility-Based Trust Management of Cloud Services","first-page":"2509","author":"Noor","year":"2013"},{"key":"10.1016\/j.comnet.2021.108506_b67","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","article-title":"A survey on the security of blockchain systems","volume":"107","author":"Li","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.comnet.2021.108506_b68","doi-asserted-by":"crossref","first-page":"1028","DOI":"10.1016\/j.future.2019.07.036","article-title":"IoT information sharing security mechanism based on blockchain technology","volume":"101","author":"Si","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.comnet.2021.108506_b69","series-title":"Trust Evaluation in the IoT Environment","author":"Jayasinghe","year":"2018"},{"key":"10.1016\/j.comnet.2021.108506_b70","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2020.107647","article-title":"Anomaly detection and trust authority in artificial intelligence and cloud computing","volume":"184","author":"Qureshi","year":"2021","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2021.108506_b71","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108004","article-title":"Deep reinforcement learning for blockchain in industrial IoT: A survey","volume":"191","author":"Wu","year":"2021","journal-title":"Comput. Netw."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128621004436?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128621004436?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,4,2]],"date-time":"2023-04-02T21:39:14Z","timestamp":1680471554000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128621004436"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":71,"alternative-id":["S1389128621004436"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2021.108506","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A blockchain-based trust management framework with verifiable interactions","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2021.108506","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"108506"}}