{"id":"https://openalex.org/W1570091982","doi":"https://doi.org/10.1007/978-3-8348-9195-2_37","title":"A Service Oriented Trust Development Platform","display_name":"A Service Oriented Trust Development Platform","publication_year":2007,"publication_date":"2007-12-21","ids":{"openalex":"https://openalex.org/W1570091982","doi":"https://doi.org/10.1007/978-3-8348-9195-2_37","mag":"1570091982"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-8348-9195-2_37","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9195-2_37","pdf_url":null,"source":{"id":"https://openalex.org/S4306464254","display_name":"Vieweg eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2006 \u2014 Securing Electronic Busines Processes","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080217126","display_name":"Helena Rif\u00e0-Pous","orcid":"https://orcid.org/0000-0003-0923-0235"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Helena Rif\u00e0","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5023297915","display_name":"F. Michael Jordan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Francisco Jordan","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5080217126"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0875339,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"344","last_page":"355"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/service-oriented-architecture","display_name":"Service-oriented architecture","score":0.5930289030075073},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.543050229549408},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5171910524368286},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.5082685351371765},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5050812363624573},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5046197175979614},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.4724060893058777},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.4716545641422272},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4598695933818817},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.4542837142944336},{"id":"https://openalex.org/keywords/russian-federation","display_name":"Russian federation","score":0.42667895555496216},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4225307106971741},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.35493379831314087},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3286089599132538},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.14814046025276184},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.0639280378818512}],"concepts":[{"id":"https://openalex.org/C57041688","wikidata":"https://www.wikidata.org/wiki/Q220644","display_name":"Service-oriented architecture","level":3,"score":0.5930289030075073},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.543050229549408},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5171910524368286},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.5082685351371765},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5050812363624573},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5046197175979614},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.4724060893058777},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.4716545641422272},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4598695933818817},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.4542837142944336},{"id":"https://openalex.org/C3019953208","wikidata":"https://www.wikidata.org/wiki/Q159","display_name":"Russian federation","level":2,"score":0.42667895555496216},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4225307106971741},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.35493379831314087},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3286089599132538},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.14814046025276184},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0639280378818512},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C105639569","wikidata":"https://www.wikidata.org/wiki/Q582577","display_name":"Economic policy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-8348-9195-2_37","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-8348-9195-2_37","pdf_url":null,"source":{"id":"https://openalex.org/S4306464254","display_name":"Vieweg eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"ebook platform"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ISSE 2006 \u2014 Securing Electronic Busines Processes","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1706727159","https://openalex.org/W1877684430","https://openalex.org/W1965014786","https://openalex.org/W2008524185","https://openalex.org/W2032520053","https://openalex.org/W2097565277","https://openalex.org/W2122440889","https://openalex.org/W2184078534","https://openalex.org/W2245281884","https://openalex.org/W4229838822"],"related_works":["https://openalex.org/W1546980300","https://openalex.org/W2013343621","https://openalex.org/W4246898356","https://openalex.org/W1982098960","https://openalex.org/W100127945","https://openalex.org/W2994043954","https://openalex.org/W2898818629","https://openalex.org/W2136457176","https://openalex.org/W2783582617","https://openalex.org/W2920199510"],"abstract_inverted_index":{"A":[0],"Trust":[1,23],"Development":[2],"Platform":[3],"that":[4,47],"offers":[5],"services":[6,51,70],"for":[7,52,102],"the":[8,16,53,66,75,88,100,160,167,173],"generation":[9],"and":[10,38,72,95,97,119,130,157,166],"interpretation":[11],"of":[12,18,30,68,77,122],"trust":[13,79,86,139],"based":[14,83,126],"on":[15,84,127],"concept":[17],"ecosystem's":[19,107],"federation":[20,24,62,67,108],"is":[21,91,109,116,141,164],"presented.":[22],"schemes":[25],"allow":[26],"to":[27,65,74,93,99,136],"define":[28],"bonds":[29],"confidence":[31],"between":[32],"systems":[33],"managed":[34],"under":[35],"different":[36],"domains":[37],"policies.":[39,60],"Each":[40],"ecosystem":[41],"has":[42],"a":[43,113,120],"trusted":[44,69],"service":[45],"provider":[46],"will":[48],"automatically":[49],"deliver":[50],"local":[54],"domain":[55],"following":[56],"its":[57],"own":[58],"security":[59],"Ecosystem's":[61],"leads":[63],"us":[64],"providers":[71],"therefore,":[73],"development":[76,140],"federated":[78],"systems.":[80],"Unlike":[81],"solutions":[82],"global":[85],"policies,":[87],"proposed":[89],"architecture":[90],"easy":[92],"deploy":[94],"use,":[96],"conforms":[98],"requirements":[101],"each":[103],"environment.":[104],"Moreover,":[105],"an":[106],"also":[110],"feasible":[111],"because":[112],"common":[114],"language":[115],"shared,":[117],"XML,":[118],"plethora":[121],"related":[123,135],"standards":[124],"are":[125,133],"it.":[128],"SOA":[129],"Web":[131],"Services":[132],"intimately":[134],"federation,":[137],"so":[138],"now":[142],"something":[143],"almost":[144],"tangible.KeywordsSecurity":[145],"PolicyService":[146],"Orient":[147],"ArchitectureTrust":[148],"ManagementTrust":[149],"LevelTrust":[150],"DevelopmentThese":[151],"keywords":[152,168],"were":[153],"added":[154],"by":[155,159],"machine":[156],"not":[158],"authors.":[161],"This":[162],"process":[163],"experimental":[165],"may":[169],"be":[170],"updated":[171],"as":[172],"learning":[174],"algorithm":[175],"improves.":[176]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
