{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:51:52Z","timestamp":1729637512691,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1109\/securware.2008.64","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T16:43:14Z","timestamp":1221583394000},"page":"179-184","source":"Crossref","is-referenced-by-count":103,"title":["Optimal Trust Network Analysis with Subjective Logic"],"prefix":"10.1109","author":[{"given":"Audun","family":"J\u00f8sang","sequence":"first","affiliation":[]},{"given":"Touhid","family":"Bhuiyan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"journal-title":"Probability and Statistics","year":"2001","author":"degroot","key":"2"},{"journal-title":"Proceedings of the Security Protocols International Workshop","article-title":"why isn't trust transitive?","year":"1996","author":"christianson","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.64"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.64"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-85735-8_10","article-title":"combining trust and reputation management for web-based services","author":"j\ufffdsang","year":"2008","journal-title":"The Proceedings of the 5th International Conference on Trust Privacy & Security in Digital Business (TrustBus2008)"},{"key":"4","article-title":"probabilistic logic under uncertainty","volume":"65","author":"j\ufffdsang","year":"2007","journal-title":"The Proceedings of Computing The Australian Theory Symposium (CATS2007) CRPIT"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1007\/11755593_14","article-title":"exploring different types of trust propagation","author":"j\ufffdsang","year":"2006","journal-title":"Proceedings of the 4th International Conference on Trust Management (iTrust)"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1007\/11518655_69","article-title":"conditional deduction under uncertainty","author":"j\ufffdsang","year":"2005","journal-title":"Proceedings of the 8th European Conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty (ECSQARU 2005)"}],"event":{"name":"2008 Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE)","start":{"date-parts":[[2008,8,25]]},"location":"Cap Esterel, France","end":{"date-parts":[[2008,8,31]]}},"container-title":["2008 Second International Conference on Emerging Security Information, Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4622544\/4622545\/04622580.pdf?arnumber=4622580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T21:35:56Z","timestamp":1557783356000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4622580\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/securware.2008.64","relation":{},"subject":[],"published":{"date-parts":[[2008,8]]}}}