{"id":"https://openalex.org/W4206699028","doi":"https://doi.org/10.1007/978-1-4020-8157-6_67","title":"Trusting Strangers","display_name":"Trusting Strangers","publication_year":2008,"publication_date":"2008-04-07","ids":{"openalex":"https://openalex.org/W4206699028","doi":"https://doi.org/10.1007/978-1-4020-8157-6_67"},"language":"en","primary_location":{"id":"doi:10.1007/978-1-4020-8157-6_67","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-1-4020-8157-6_67","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-1-4020-8157-6_67.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-1-4020-8157-6_67.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071443789","display_name":"Carl E. Landwehr","orcid":"https://orcid.org/0000-0002-5824-1697"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Carl E. Landwehr","raw_affiliation_strings":["Institute for Systems Research, University of Maryland, College Park, USA"],"affiliations":[{"raw_affiliation_string":"Institute for Systems Research, University of Maryland, College Park, USA","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5071443789"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33537358,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"679","last_page":"683"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8770999908447266,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8770999908447266,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.8419222831726074},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5719608664512634},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5654967427253723},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5474168062210083},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4538981318473816},{"id":"https://openalex.org/keywords/open-source","display_name":"Open source","score":0.44138282537460327},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.334392249584198},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.05351221561431885}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.8419222831726074},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5719608664512634},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5654967427253723},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5474168062210083},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4538981318473816},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.44138282537460327},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.334392249584198},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.05351221561431885}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-1-4020-8157-6_67","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-1-4020-8157-6_67","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-1-4020-8157-6_67.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-1-4020-8157-6_67","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-1-4020-8157-6_67","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-1-4020-8157-6_67.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4206699028.pdf","grobid_xml":"https://content.openalex.org/works/W4206699028.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W3048799479","https://openalex.org/W3006507989","https://openalex.org/W2779961139","https://openalex.org/W2763500028","https://openalex.org/W4240288358","https://openalex.org/W4240241597"],"abstract_inverted_index":{"Abstract:The":[0],"issues":[1],"of":[2,11,38,53],"trusting":[3],"software,":[4],"certifying":[5],"security,":[6],"and":[7,13,66],"the":[8,36,51,58],"relative":[9],"merits":[10],"open":[12],"closed":[14],"source":[15],"software":[16],"as":[17,79,81],"a":[18],"basis":[19],"for":[20,49],"critical":[21],"systems":[22],"are":[23,47],"discussed.":[24],"It":[25],"is":[26],"concluded":[27],"(i)":[28],"that":[29,44,68],"neither":[30],"approach":[31],"in":[32,86],"itself":[33],"can":[34],"assure":[35],"absence":[37],"security":[39],"flaws":[40],"or":[41,60],"sabotage,":[42],"(ii)":[43],"better":[45],"methods":[46],"needed":[48],"assuring":[50],"properties":[52],"products":[54],"without":[55],"respect":[56],"to":[57,63],"people":[59],"process":[61],"used":[62],"create":[64],"them,":[65],"(iii)":[67],"system":[69,88],"architects":[70],"should":[71],"exploit":[72],"what":[73,82],"they":[74,76,83],"know":[75],"don\u2019t":[77],"know,":[78,85],"well":[80],"do":[84],"composing":[87],"architectures.":[89]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-01-26T00:00:00"}
