{"id":"https://openalex.org/W3008369002","doi":"https://doi.org/10.1145/3377644.3377664","title":"A Trust Management Model for Internet of Vehicles","display_name":"A Trust Management Model for Internet of Vehicles","publication_year":2020,"publication_date":"2020-01-10","ids":{"openalex":"https://openalex.org/W3008369002","doi":"https://doi.org/10.1145/3377644.3377664","mag":"3008369002"},"language":"en","primary_location":{"id":"doi:10.1145/3377644.3377664","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377644.3377664","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100647899","display_name":"Yonghao Wang","orcid":"https://orcid.org/0000-0002-4924-2508"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wang Yong-hao","raw_affiliation_strings":["Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, Beijing, China","institution_ids":["https://openalex.org/I202334528"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100647899"],"corresponding_institution_ids":["https://openalex.org/I202334528"],"apc_list":null,"apc_paid":null,"fwci":3.1391,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.92943728,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"136","last_page":"140"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.7840814590454102},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.6894336342811584},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6647430658340454},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6344517469406128},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5843293070793152},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.584212064743042},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.4773014783859253},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.4464702010154724},{"id":"https://openalex.org/keywords/trust-anchor","display_name":"Trust anchor","score":0.42732927203178406},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4148210883140564},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34246179461479187},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.20751255750656128},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.1650492250919342},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1010381281375885},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09191694855690002}],"concepts":[{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.7840814590454102},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.6894336342811584},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6647430658340454},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6344517469406128},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5843293070793152},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.584212064743042},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.4773014783859253},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.4464702010154724},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.42732927203178406},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4148210883140564},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34246179461479187},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.20751255750656128},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.1650492250919342},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1010381281375885},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09191694855690002},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3377644.3377664","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377644.3377664","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7599999904632568,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1873407489","https://openalex.org/W1977680444","https://openalex.org/W1997023312","https://openalex.org/W2031795630","https://openalex.org/W2097726984","https://openalex.org/W2104218537","https://openalex.org/W2105786423","https://openalex.org/W2115629149","https://openalex.org/W2127826640","https://openalex.org/W2130234299","https://openalex.org/W2134847005","https://openalex.org/W2156523427","https://openalex.org/W2156937700","https://openalex.org/W3204310220"],"related_works":["https://openalex.org/W4243605140","https://openalex.org/W2495963281","https://openalex.org/W4385687966","https://openalex.org/W2167620197","https://openalex.org/W2509590646","https://openalex.org/W2940914837","https://openalex.org/W2170496240","https://openalex.org/W2916013893","https://openalex.org/W2300110045","https://openalex.org/W2075589527"],"abstract_inverted_index":{"With":[0],"the":[1,8,32,35,43,48,64,87,93,97,104,109,118,122,126,129,134,142,154,158],"continuous":[2],"development":[3],"of":[4,11,13,34,45,50,67,72,80,100,112,121,128,160],"automatic":[5],"driving":[6],"technology,":[7],"application":[9],"scenarios":[10],"Internet":[12,71,79],"Vehicles":[14,81],"are":[15],"more":[16,18,24,26],"and":[17,25,47,116,149,156,164],"abundant,":[19],"but":[20,39],"it":[21],"also":[22],"faces":[23],"security":[27],"threats.":[28],"The":[29,84,137],"problem":[30],"that":[31,141],"identity":[33],"vehicle":[36,101],"is":[37,82],"real":[38],"difficult":[40],"to":[41,146],"guarantee":[42],"reliability":[44],"interaction":[46],"truth":[49],"shared":[51],"information":[52],"can":[53,144],"be":[54],"solved":[55],"by":[56,124],"using":[57],"trust":[58,68,75,99,106,151,168],"management":[59,69],"technology.":[60],"By":[61],"deeply":[62],"analyzing":[63],"main":[65],"characteristics":[66],"in":[70,167],"Vehicles,":[73],"a":[74],"model":[76,85,143],"suitable":[77],"for":[78,95],"proposed.":[83],"takes":[86],"owner's":[88],"offline":[89],"social":[90],"relationship":[91,152],"as":[92],"basis":[94],"setting":[96],"initial":[98],"nodes,":[102],"evaluates":[103],"direct":[105],"based":[107],"on":[108],"instant":[110],"evaluation":[111],"satisfaction":[113],"after":[114],"interaction,":[115],"satisfies":[117],"rapid":[119],"decision-making":[120],"vehicles":[123],"limiting":[125],"length":[127],"recommendation":[130,135],"path":[131],"when":[132],"evaluating":[133],"trust.":[136],"simulation":[138],"experiment":[139],"shows":[140],"help":[145],"establish":[147],"stable":[148],"reliable":[150],"among":[153],"vehicles,":[155],"reduce":[157],"risk":[159],"value":[161],"imbalance":[162],"attack":[163,166],"collusion":[165],"management.":[169]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
