{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T22:07:10Z","timestamp":1649110030023},"reference-count":27,"publisher":"Computers, Materials and Continua (Tech Science Press)","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Automation & Soft Computing"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1080\/10798587.2016.1167438","type":"journal-article","created":{"date-parts":[[2016,4,20]],"date-time":"2016-04-20T12:47:33Z","timestamp":1461156453000},"page":"631-638","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Dynamic trust evaluation in open networks"],"prefix":"10.32604","volume":"22","author":[{"given":"Bin","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Jingsha","family":"He","sequence":"additional","affiliation":[]},{"given":"Yixuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Gongzheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Zhai","sequence":"additional","affiliation":[]},{"given":"Na","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Ruohong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2016,4,20]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.05.084"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/PTP.2004.1334930"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"CIT0004","first-page":"59","volume-title":"Proceedings of the 6th International Workshop on Security Protocols","author":"Blaze M.","year":"1999"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2011.10643211"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2014.060716"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.06.014"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/071L18"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2013-189"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.251"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.71"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/072L51"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.12.021"},{"key":"CIT0015","first-page":"1","volume":"37","author":"Li Q.","year":"2014","journal-title":"Chinese Journal of Computers"},{"key":"CIT0016","volume-title":"Research of trust based access control models and methods in network environments","author":"Ma S.N.","year":"2012"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1080\/18756891.2012.733233"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2011.10643132"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1145\/375735.376110"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.04.015"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1109\/ICMECG.2008.86"},{"key":"CIT0022","first-page":"1699","volume":"53","author":"Wang J.P.","year":"2013","journal-title":"Journal of Tsinghua University (Science & Technology)"},{"key":"CIT0023","first-page":"3109","volume":"9","author":"Wang J.P.","year":"2013","journal-title":"Journal of Computational Information Systems"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1504\/IJHPCN.2009.027466"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1093"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2010.030230"}],"container-title":["Intelligent Automation & Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=1167438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T13:08:52Z","timestamp":1591189732000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=1167438"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,20]]},"references-count":27,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,4,20]]},"published-print":{"date-parts":[[2016,10]]}},"alternative-id":["10.1080\/10798587.2016.1167438"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2016.1167438","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"value":"1079-8587","type":"print"},{"value":"2326-005X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,20]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}