{"id":"https://openalex.org/W2135664962","doi":"https://doi.org/10.1109/mcom.2010.5621979","title":"Situation-aware trust architecture for vehicular networks","display_name":"Situation-aware trust architecture for vehicular networks","publication_year":2010,"publication_date":"2010-11-01","ids":{"openalex":"https://openalex.org/W2135664962","doi":"https://doi.org/10.1109/mcom.2010.5621979","mag":"2135664962"},"language":"en","primary_location":{"id":"doi:10.1109/mcom.2010.5621979","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcom.2010.5621979","pdf_url":null,"source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Magazine","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003921452","display_name":"Dijiang Huang","orcid":"https://orcid.org/0000-0003-3257-6349"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dijiang Huang","raw_affiliation_strings":["Arizona State University, USA","Arizona State University , Tempe , AZ , USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, USA","institution_ids":["https://openalex.org/I55732556"]},{"raw_affiliation_string":"Arizona State University , Tempe , AZ , USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102002672","display_name":"Xiaoyan Hong","orcid":"https://orcid.org/0000-0002-0745-5038"},"institutions":[{"id":"https://openalex.org/I17301866","display_name":"University of Alabama","ror":"https://ror.org/03xrrjk67","country_code":"US","type":"education","lineage":["https://openalex.org/I17301866"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaoyan Hong","raw_affiliation_strings":["University of Alabama, USA","[University of Alabama, Tuscaloosa, AL, USA]"],"affiliations":[{"raw_affiliation_string":"University of Alabama, USA","institution_ids":["https://openalex.org/I17301866"]},{"raw_affiliation_string":"[University of Alabama, Tuscaloosa, AL, USA]","institution_ids":["https://openalex.org/I17301866"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059529956","display_name":"M\u00e1rio Gerla","orcid":null},"institutions":[{"id":"https://openalex.org/I2799798094","display_name":"UCLA Health","ror":"https://ror.org/01d88se56","country_code":"US","type":"funder","lineage":["https://openalex.org/I2799798094"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mario Gerla","raw_affiliation_strings":["UCLA, USA","UCLA, Los Angeles, CA,\u00a0USA"],"affiliations":[{"raw_affiliation_string":"UCLA, USA","institution_ids":["https://openalex.org/I2799798094"]},{"raw_affiliation_string":"UCLA, Los Angeles, CA,\u00a0USA","institution_ids":["https://openalex.org/I2799798094"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5003921452"],"corresponding_institution_ids":["https://openalex.org/I55732556"],"apc_list":null,"apc_paid":null,"fwci":6.9823,"has_fulltext":false,"cited_by_count":67,"citation_normalized_percentile":{"value":0.96836179,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"48","issue":"11","first_page":"128","last_page":"135"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8856385946273804},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.6735440492630005},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6530927419662476},{"id":"https://openalex.org/keywords/trust-anchor","display_name":"Trust anchor","score":0.5839333534240723},{"id":"https://openalex.org/keywords/web-of-trust","display_name":"Web of trust","score":0.5785198211669922},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5588104724884033},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5385943055152893},{"id":"https://openalex.org/keywords/social-trust","display_name":"Social trust","score":0.5151939988136292},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.5149701237678528},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5028626322746277},{"id":"https://openalex.org/keywords/subjective-logic","display_name":"Subjective logic","score":0.48702651262283325},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.48642539978027344},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44864732027053833},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.44105201959609985},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.19173112511634827}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8856385946273804},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.6735440492630005},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6530927419662476},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.5839333534240723},{"id":"https://openalex.org/C157424077","wikidata":"https://www.wikidata.org/wiki/Q1928707","display_name":"Web of trust","level":4,"score":0.5785198211669922},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5588104724884033},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5385943055152893},{"id":"https://openalex.org/C2985797017","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Social trust","level":3,"score":0.5151939988136292},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.5149701237678528},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5028626322746277},{"id":"https://openalex.org/C113839178","wikidata":"https://www.wikidata.org/wiki/Q7631418","display_name":"Subjective logic","level":3,"score":0.48702651262283325},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.48642539978027344},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44864732027053833},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.44105201959609985},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.19173112511634827},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C68062652","wikidata":"https://www.wikidata.org/wiki/Q214693","display_name":"Social capital","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/mcom.2010.5621979","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mcom.2010.5621979","pdf_url":null,"source":{"id":"https://openalex.org/S158797327","display_name":"IEEE Communications Magazine","issn_l":"0163-6804","issn":["0163-6804","1558-1896"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Magazine","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.501.6431","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.501.6431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://hong.cs.ua.edu/papers/SAT-CM2010-proof.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1980303100","https://openalex.org/W1998280563","https://openalex.org/W2061920530","https://openalex.org/W2069124975","https://openalex.org/W2108072891","https://openalex.org/W2118488578","https://openalex.org/W2126375161","https://openalex.org/W2129421350","https://openalex.org/W2141420453","https://openalex.org/W2152924492","https://openalex.org/W2159584786","https://openalex.org/W2164192722","https://openalex.org/W6671828919"],"related_works":["https://openalex.org/W2406819003","https://openalex.org/W2371389416","https://openalex.org/W4385687966","https://openalex.org/W2000168120","https://openalex.org/W1965142802","https://openalex.org/W2121112638","https://openalex.org/W2068227386","https://openalex.org/W2128649519","https://openalex.org/W2170512593","https://openalex.org/W2145254015"],"abstract_inverted_index":{"We":[0,99],"present":[1],"a":[2,30,63,88,92],"new":[3],"trust":[4,10,32,36,51,55,65],"architecture-Situation-Aware":[5],"Trust-to":[6],"address":[7],"several":[8],"important":[9],"issues":[11],"in":[12],"vehicular":[13],"networks.":[14],"SAT":[15],"includes":[16],"three":[17],"main":[18],"components:":[19],"an":[20,47],"attribute-based":[21],"policy":[22,81],"control":[23],"model":[24,33],"for":[25,96],"highly":[26],"dynamic":[27],"communication":[28],"environments,":[29],"proactive":[31],"to":[34,53,57,74],"build":[35],"among":[37],"vehicles,":[38],"and":[39,46,56,83,91,105],"prevent":[40],"the":[41,59],"breakage":[42],"of":[43,62,94],"existing":[44],"trust,":[45,77,79,86],"email-based":[48],"social":[49,84],"network":[50,85],"system":[52],"enhance":[54],"allow":[58],"set":[60,93],"up":[61],"decentralized":[64],"framework.":[66],"To":[67],"deploy":[68],"SAT,":[69],"we":[70],"utilize":[71],"identity-based":[72],"cryptography":[73],"integrate":[75],"entity":[76],"data":[78],"security":[80],"enforcement,":[82],"allocating":[87],"unique":[89],"identity,":[90],"attributes":[95],"each":[97],"entity.":[98],"conclude":[100],"by":[101],"presenting":[102],"research":[103,107],"challenges":[104],"potential":[106],"directions":[108],"that":[109],"extend":[110],"this":[111],"work.":[112]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":9},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":7},{"year":2012,"cited_by_count":5}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
