{"id":"https://openalex.org/W1593013782","doi":"https://doi.org/10.1109/csac.2002.1176298","title":"Networking in the Solar Trust Model: determining optimal trust paths in a decentralized trust network","display_name":"Networking in the Solar Trust Model: determining optimal trust paths in a decentralized trust network","publication_year":2003,"publication_date":"2003-06-26","ids":{"openalex":"https://openalex.org/W1593013782","doi":"https://doi.org/10.1109/csac.2002.1176298","mag":"1593013782"},"language":"en","primary_location":{"id":"doi:10.1109/csac.2002.1176298","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csac.2002.1176298","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087219666","display_name":"Michael Clifford","orcid":"https://orcid.org/0000-0002-8316-4929"},"institutions":[{"id":"https://openalex.org/I169540460","display_name":"The Aerospace Corporation","ror":"https://ror.org/01ar9e455","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I169540460"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"M. Clifford","raw_affiliation_strings":["Aerospace Corporation, El Segundo, CA, USA","Aerosp. Corp., El Segundo, CA, USA"],"affiliations":[{"raw_affiliation_string":"Aerospace Corporation, El Segundo, CA, USA","institution_ids":["https://openalex.org/I169540460"]},{"raw_affiliation_string":"Aerosp. Corp., El Segundo, CA, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5087219666"],"corresponding_institution_ids":["https://openalex.org/I169540460"],"apc_list":null,"apc_paid":null,"fwci":0.2361,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.5970623,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"1","issue":null,"first_page":"271","last_page":"281"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.9298464059829712},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8307651281356812},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5688883066177368},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.5044318437576294},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4866350591182709},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.4784714877605438},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.47677069902420044},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4686049222946167},{"id":"https://openalex.org/keywords/trust-anchor","display_name":"Trust anchor","score":0.4595573842525482},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45351096987724304},{"id":"https://openalex.org/keywords/message-passing","display_name":"Message passing","score":0.4368855059146881},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3656400442123413},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11688333749771118}],"concepts":[{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.9298464059829712},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8307651281356812},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5688883066177368},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.5044318437576294},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4866350591182709},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.4784714877605438},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.47677069902420044},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4686049222946167},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.4595573842525482},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45351096987724304},{"id":"https://openalex.org/C854659","wikidata":"https://www.wikidata.org/wiki/Q1859284","display_name":"Message passing","level":2,"score":0.4368855059146881},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3656400442123413},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11688333749771118},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csac.2002.1176298","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csac.2002.1176298","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"18th Annual Computer Security Applications Conference, 2002. Proceedings.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6100000143051147,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1618708475","https://openalex.org/W1852932101","https://openalex.org/W2030824584","https://openalex.org/W2134296086","https://openalex.org/W2135780448","https://openalex.org/W2157457404","https://openalex.org/W2159538218","https://openalex.org/W2160558706","https://openalex.org/W2167830373","https://openalex.org/W2169043176","https://openalex.org/W2213553754","https://openalex.org/W2730758618","https://openalex.org/W6636706205","https://openalex.org/W6680035254","https://openalex.org/W6680345583"],"related_works":["https://openalex.org/W2129567949","https://openalex.org/W2018769941","https://openalex.org/W2147574710","https://openalex.org/W1548793402","https://openalex.org/W2127807338","https://openalex.org/W2136092929","https://openalex.org/W2376875105","https://openalex.org/W4243605140","https://openalex.org/W2545277503","https://openalex.org/W2072642013"],"abstract_inverted_index":{"The":[0,39,57,138],"Solar":[1,58],"Trust":[2,59],"Model":[3,60],"provides":[4,98],"a":[5,12,62,81,99,117,123,134],"method":[6],"by":[7,149],"which":[8,116],"the":[9,18,27,30,33,50,55,68,88,92,111,128,145,150],"sender":[10,28,51,124],"of":[11,20,29,54,64,70,83,91,101,110,131,136],"message":[13,31,34,118],"can":[14,23,36,104,119],"be":[15,24,37,105,120],"authenticated,":[16],"and":[17,52,74,85,127,156],"level":[19],"trust":[21,72],"that":[22,103],"placed":[25],"in":[26,67],"or":[32],"itself":[35],"computed":[38],"model":[40,151],"works":[41],"even":[42],"if":[43],"there":[44],"is":[45],"no":[46],"prior":[47],"relationship":[48],"between":[49],"receiver":[53],"message.":[56],"overcomes":[61],"variety":[63,82],"limitations":[65],"inherent":[66],"design":[69],"other":[71],"models":[73],"public":[75],"key":[76],"infrastructures.":[77],"This":[78],"paper":[79,97,139],"presents":[80,141],"enhancements":[84],"formalizations":[86],"to":[87,107,125],"basic":[89],"concepts":[90],"model.":[93],"In":[94],"addition,":[95],"this":[96],"set":[100],"algorithms":[102,142],"used":[106],"determine":[108],"all":[109],"possible":[112],"trusted":[113],"paths":[114,132],"along":[115],"sent":[121],"from":[122,133],"recipient":[126],"optimal":[129],"choice":[130],"selection":[135],"paths.":[137],"also":[140],"for":[143],"reducing":[144],"network":[146],"load":[147,157],"produced":[148],"through":[152],"piggybacking,":[153],"path":[154],"caching,":[155],"distribution":[158],"techniques.":[159]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
