{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{-“日期部分”:[2022,4,3]],“日期时间”:“2022-04-03T05:01:18Z”,“时间戳”:1648962078687},“引用计数”:9,“发布者”:“Academy publisher”,“问题”:“10”,“内容域”:{“域”:[],“交叉标记限制”:false},”短容器时间“:[“JNW”],“DOI”:“10.4304\/jnw.6.101406-1413”,“type”:“journal-article”,“created”:{“date-parts”:[[2011,9,30]],“date-time”:“2011-09-30T16:15:06Z”,“timestamp”:1317399306000},“source”:《Crossref》,“is-referenced-by-count”:0,“title”:[“P2PGridSec:P2PGrid系统中基于信誉的安全框架”],“prefix”:“10.4304”,“volume”:”6“,“author”:[”给定“:”曾港“,“家族”:“熊”,“序列”:“第一”,“从属关系”:[]},{“给定”:“雪敏”,“家族“:“张”,“顺序”:“附加”,“隶属关系”:[]}在线“:{“date-parts”:[[2011,10,1]]},“reference”:[{“key”:“ref1”,“doi-asserted-by”:“publisher”,“doi”:“10.1016\/j.future.2006.12.003”},{“密钥”:“ref2”,“首页”:“83”,“文章标题”:“Foster,Carl Kesselman,Gene Tsudik,and Steven Tuecke。计算网格的安全体系结构。”,“卷标题”:《ACM计算机与通信安全会议》,“作者”:“Ian”,“年份”:“1998”},{“key”:“ref3”,“doi-asserted-by”:“publisher”,“doi”:“10.1177\/109434209701100205”}{“key”:“ref6”,“doi-asserted-by”:“publisher”,“doi”:“10.1109 \/HICSS.2002.994181”},{“key”:“ref7”,“doi-asserted-by”:“publisher”,“doi”:“10.1016\/j.future.2008.08.001”}“:”15“,”作者“:”窦“,”年份“:”2004“,”新闻标题“:”j。柔和。“,”ISSN“:”http://\/id.crossref.org\/ISSN\/1000-9825“,”ISSN-type“:“print”}]“container-title”:[“Journal of Networks”],”original-title“:[],”deposed“:{”date-parts“:[[2011,9,30]],”date-time“:”2011-09-30T16:15:08Z“,”timestamp“:1317399308000},”score“:1,”resource“:”{“primary”:{“URL”:“http://\/ojs.academypublisher.com/index.php\/jnw\/article\/view\/5022“}},”副标题“:[],”短标题“:[],”已发布“:{”日期部分“:[[2011,10,1]]},“引用计数”:9,”日志发布“:}”问题“:“10”,“published-online”:{“date-parts”:[2011,10,1]]]}}、“URL”:“http://\/dx.doi.org \/10.4304 \/jnw.6.101406-1413“,”关系“:{},”ISSN“:[”1796-2056“],”ISSN-type“:[{”value“:“1796-2056”,“type”:“print”}],“subject”:[],“published”:{“date-parts”:[[2011,10,1]]}}}