-
3
-
-
4544359599
-
Beyond concern: A privacy-trust-behavioral intention model of electronic commerce
-
C. Liu, J. Marchewkaa, J. Lub, and C. Yub, "Beyond concern: a privacy-trust-behavioral intention model of electronic commerce," Information & Management, vol. 42, no. 1, pp. 127-142, 2004.
-
(2004)
Information & Management
, vol.42
, Issue.1
, pp. 127-142
-
-
Liu, C.1
Marchewkaa, J.2
Lub, J.3
Yub, C.4
-
4
-
-
77957985367
-
Toward trustworthy web services - Approaches, weaknesses and trust-by-contract framework
-
IEEE
-
N. Dragoni, "Toward trustworthy web services - approaches, weaknesses and trust-by-contract framework," in Proc. of WIIAT. IEEE, 2009, pp. 599-606.
-
(2009)
Proc. of WIIAT
, pp. 599-606
-
-
Dragoni, N.1
-
6
-
-
26844503998
-
Experiments in building experiential trust in a society of objective-trust based agents
-
London, UK: Springer-Verlag
-
M. Witkowski, A. Artikis, and J. Pitt, "Experiments in building experiential trust in a society of objective-trust based agents," in Proc. of the workshop on Deception, Fraud, and Trust in Agent Societies. London, UK: Springer-Verlag, 2000, pp. 111-132.
-
(2000)
Proc. of the Workshop on Deception, Fraud, and Trust in Agent Societies
, pp. 111-132
-
-
Witkowski, M.1
Artikis, A.2
Pitt, J.3
-
7
-
-
33847207162
-
A cognitive trustbased approach for web service discovery and selection
-
IEEE
-
A. S. Ali, S. A. Ludwig, and O. F. Rana, "A cognitive trustbased approach for web service discovery and selection," in Proc. of ECOWS. IEEE, 2005.
-
(2005)
Proc. of ECOWS
-
-
Ali, A.S.1
Ludwig, S.A.2
Rana, O.F.3
-
8
-
-
35948972837
-
A review on trust and reputation for web service selection
-
Washington, DC, USA: IEEE
-
Y. Wang and J. Vassileva, "A review on trust and reputation for web service selection," in Proc. of ICDCS. Washington, DC, USA: IEEE, 2007.
-
(2007)
Proc. of ICDCS
-
-
Wang, Y.1
Vassileva, J.2
-
9
-
-
77958004716
-
QoS for web services: Requirements and possible approaches
-
November
-
K. Lee, J. Jeon, W. Lee, S. Jeong, and S. Park, "QoS for Web Services: Requirements and Possible Approaches," W3C Consortium Note, November 2003.
-
(2003)
W3C Consortium Note
-
-
Lee, K.1
Jeon, J.2
Lee, W.3
Jeong, S.4
Park, S.5
-
10
-
-
70350525809
-
Reputation bootstrapping for trust establishment among web services
-
Z. Malik and A. Bouguettaya, "Reputation bootstrapping for trust establishment among web services," Internet Computing, vol. 13, no. 1, pp. 40-47, 2009.
-
(2009)
Internet Computing
, vol.13
, Issue.1
, pp. 40-47
-
-
Malik, Z.1
Bouguettaya, A.2
-
11
-
-
84880467894
-
The eigentrust algorithm for reputation management in p2p networks
-
New York, NY, USA: ACM
-
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "The eigentrust algorithm for reputation management in p2p networks," in WWW '03: Proceedings of the 12th international conference on World Wide Web. New York, NY, USA: ACM, 2003, pp. 640-651.
-
(2003)
WWW '03: Proceedings of the 12th International Conference on World Wide Web
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
12
-
-
3142738238
-
Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities
-
L. Xiong and L. Liu, "Peertrust: supporting reputation-based trust for peer-to-peer electronic communities," Knowledge and Data Engineering, IEEE Transactions on, vol. 16, no. 7, pp. 843-857, 2004.
-
(2004)
Knowledge and Data Engineering, IEEE Transactions on
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
13
-
-
36048989051
-
Trust issues in service oriented environment
-
DOI 10.1109/SOLI.2006.235553, 1700969, 2006 IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI 2006
-
F. Hussain and T. Dillon, "Trust issues in service oriented environment," in Proc. of SOLI. IEEE, 2006, pp. 790 - 793. (Pubitemid 350080712)
-
(2006)
2006 IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI 2006
, pp. 790-793
-
-
Hussain, F.K.1
Chang, E.2
Dillon, T.S.3
-
14
-
-
20344391850
-
Using recommendations for managing trust in distributed systems
-
IEEE
-
A. Abdul-Rahman and S. Hailes, "Using recommendations for managing trust in distributed systems," in Intern. Conf. on Communication. IEEE, 1997.
-
(1997)
Intern. Conf. on Communication
-
-
Abdul-Rahman, A.1
Hailes, S.2
-
15
-
-
0031103679
-
Fab: Content-based, collaborative recommendation
-
M. Balabanovic and Y. Shoham, "Fab: content-based, collaborative recommendation," Comm.of the ACM, vol. 40, no. 3, pp. 66-72, 1997.
-
(1997)
Comm.Of the ACM
, vol.40
, Issue.3
, pp. 66-72
-
-
Balabanovic, M.1
Shoham, Y.2
-
16
-
-
20844435854
-
Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions
-
G. Adomavicius and E. Tuzhilin, "Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions," IEEE TKDE, vol. 17, pp. 734-749, 2005.
-
(2005)
IEEE TKDE
, vol.17
, pp. 734-749
-
-
Adomavicius, G.1
Tuzhilin, E.2
-
17
-
-
80052126248
-
Trust based recommender system for the semantic web
-
P. Bedi, H. Kaur, and S. Marwaha, "Trust based recommender system for the semantic web," in Proc. of IJCAI, 2007, pp. 2677-2682.
-
(2007)
Proc. of IJCAI
, pp. 2677-2682
-
-
Bedi, P.1
Kaur, H.2
Marwaha, S.3
-
18
-
-
52249108046
-
Trust management and service selection in pervasive computing environments
-
IEEE
-
S. Guan, X. Dong, W. Wu, Y. Mei, and S. Liao, "Trust Management and Service Selection in Pervasive Computing Environments," in Proc. of CIS. IEEE, 2007, pp. 620-623.
-
(2007)
Proc. of CIS
, pp. 620-623
-
-
Guan, S.1
Dong, X.2
Wu, W.3
Mei, Y.4
Liao, S.5
-
19
-
-
38649109809
-
A formal framework for trust management of service-oriented systems
-
IEEE
-
L. Zhengping, L. Xiaoli, W. Guoqing, Y. Min, and Z. Fan, "A formal framework for trust management of service-oriented systems," in Proc. of SOCA. IEEE, 2007, pp. 241-248.
-
(2007)
Proc. of SOCA
, pp. 241-248
-
-
Zhengping, L.1
Xiaoli, L.2
Guoqing, W.3
Min, Y.4
Fan, Z.5
-
20
-
-
56749177571
-
Service sharing with trust in pervasive environment: Now it's time to break the jinx
-
ACM Press
-
S. Ahamed, M. Haque, and N. Talukder, "Service sharing with trust in pervasive environment: now it's time to break the jinx," in Proc. of SAC. ACM Press, 2008, pp. 1622-1628.
-
(2008)
Proc. of SAC
, pp. 1622-1628
-
-
Ahamed, S.1
Haque, M.2
Talukder, N.3
-
21
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
A. Josang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2007.
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
22
-
-
0001812831
-
Community-based service location
-
M. Singh, B. Yu, and M. Venkatraman, "Community-based service location," Comm. of the ACM, vol. 44, no. 4, pp. 49-54, 2001.
-
(2001)
Comm. of the ACM
, vol.44
, Issue.4
, pp. 49-54
-
-
Singh, M.1
Yu, B.2
Venkatraman, M.3
-
23
-
-
18144381559
-
Engineering self-organizing referral networks for trustworthy service selection
-
P. Yolum and M. Singh, "Engineering Self-Organizing Referral Networks for Trustworthy Service Selection," IEEE Trans. on Systems, Man, and Cybernetics, vol. 35, no. 3, pp. 396-407, 2005.
-
(2005)
IEEE Trans. on Systems, Man, and Cybernetics
, vol.35
, Issue.3
, pp. 396-407
-
-
Yolum, P.1
Singh, M.2
-
24
-
-
47749105669
-
A trust based methodology for web service selection
-
IEEE
-
S. Galizia, A. Gugliotta, and J. Dominque, "A trust based methodology for web service selection," in Proc. of ICSC. IEEE, 2007, pp. 193-200.
-
(2007)
Proc. of ICSC
, pp. 193-200
-
-
Galizia, S.1
Gugliotta, A.2
Dominque, J.3
-
25
-
-
33845382265
-
IRS-III: A broker for semantic web services based applications
-
The Semantic Web - ISWC 2006 - 5th International Semantic Web Conference, ISWC 2006, Proceedings
-
L. Cabral, J. Domingue, S. Galizia, A. Gugliotta, V. Tanasescu, C. Pedrinaci, and B. Norton, "IRS-III: A Broker for Semantic Web Services based Applications," in Proce. of ISWC, ser. LNCS. Springer-Verlag, 2006, pp. 201-214. (Pubitemid 44892031)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 201-214
-
-
Cabral, L.1
Domingue, J.2
Galizia, S.3
Gugliotta, A.4
Tanasescu, V.5
Pedrinaci, C.6
Norton, B.7
-
26
-
-
24144437747
-
Trust negotiation for semantic web services
-
ser. LNCS. Springer-Verlag
-
D. Olmedilla, R. Lara, A. Polleres, and H. Lausen, "Trust negotiation for semantic web services," in Proc. of Intern. Workshop on Semantic Web Services and Web Process Composition, ser. LNCS. Springer-Verlag, 2004, pp. 81-95.
-
(2004)
Proc. of Intern. Workshop on Semantic Web Services and Web Process Composition
, pp. 81-95
-
-
Olmedilla, D.1
Lara, R.2
Polleres, A.3
Lausen, H.4
-
27
-
-
85041439566
-
Principles of trust for mas: Cognitive anatomy, social importance,and quantification
-
IEEE
-
R. Falcone and C. Castelfranchi, "Principles of trust for mas: cognitive anatomy, social importance,and quantification," in Proc. of ICMAS. IEEE, 1998, pp. 72-79.
-
(1998)
Proc. of ICMAS
, pp. 72-79
-
-
Falcone, R.1
Castelfranchi, C.2
-
29
-
-
7044245599
-
-
ser. LNAI. Springer-Verlag, ch. A fuzzy approach to a belief-based trust computation
-
R. Falcone, G. Pezzulo, and C. Castelfranchi, Special Issue on "Trust, Reputation and Security: Theories and Practice", ser. LNAI. Springer-Verlag, 2003, ch. A fuzzy approach to a belief-based trust computation, pp. 73-86.
-
(2003)
Special Issue on Trust, Reputation and Security: Theories and Practice
, pp. 73-86
-
-
Falcone, R.1
Pezzulo, G.2
Castelfranchi, C.3
-
30
-
-
77957980545
-
Who you can trust: Dealing with deception
-
R. Falcone, Ed.
-
M. Schillo, P. Funk, and M. Rovatsos, "Who you can trust: Dealing with deception," in Proc. of "Deception, Fraud and Trust" Workshop of the Auton. Agents Conf., R. Falcone, Ed., 1999.
-
(1999)
Proc. of "deception, Fraud and Trust" Workshop of the Auton. Agents Conf.
-
-
Schillo, M.1
Funk, P.2
Rovatsos, M.3
-
31
-
-
0002908551
-
Bdi agents: From theory to practice
-
AAAI Press
-
A. S. Rao and M. P. Georgeff, "Bdi agents: From theory to practice," in Proc. of ICMAS. AAAI Press, 1995.
-
(1995)
Proc. of ICMAS
-
-
Rao, A.S.1
Georgeff, M.P.2
-
32
-
-
33748707875
-
QoS-based service selection and ranking with trust and reputation management
-
ser. LNCS. Springer-Verlag
-
L.-H. Vu, M. Hauswirth, and K. Aberer, "QoS-based Service Selection and Ranking with Trust and Reputation Management," in Proc. of CIS, ser. LNCS. Springer-Verlag, 2005.
-
(2005)
Proc. of CIS
-
-
Vu, L.-H.1
Hauswirth, M.2
Aberer, K.3
-
33
-
-
33846966283
-
An integrated trust and reputation model for open multi-agent systems
-
T. Huynh, N. Jennings, and N. Shadbolt, "An integrated trust and reputation model for open multi-agent systems," JAAMAS, vol. 13, no. 2, pp. 119-154, 2006.
-
(2006)
JAAMAS
, vol.13
, Issue.2
, pp. 119-154
-
-
Huynh, T.1
Jennings, N.2
Shadbolt, N.3
-
34
-
-
52149092491
-
Combining trust and reputation management for web-based services
-
ser. LNCS. Springer-Verlag
-
A. Josang, T. Bhuiyan, Y. Xu, and C. Cox, "Combining Trust and Reputation Management for Web-Based Services," in Proc. of TrustBus, ser. LNCS. Springer-Verlag, 2008, pp. 90-99.
-
(2008)
Proc. of TrustBus
, pp. 90-99
-
-
Josang, A.1
Bhuiyan, T.2
Xu, Y.3
Cox, C.4
-
35
-
-
0347608169
-
A logic for uncertain probabilities
-
A. Josang, "A logic for uncertain probabilities," Intern. Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 9, no. 3, pp. 279-311, 2001.
-
(2001)
Intern. Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.9
, Issue.3
, pp. 279-311
-
-
Josang, A.1
-
36
-
-
77958022916
-
Regret: A reputation model for gregarious societies
-
J. Sabater and C. Sierra, "Regret: a reputation model for gregarious societies," in Proc. of AAMAS, 2002.
-
(2002)
Proc. of AAMAS
-
-
Sabater, J.1
Sierra, C.2
-
37
-
-
4344669314
-
A computational trust model for multi-agent interactions based on confidence and reputation
-
S. D. Ramchurn, C. Sierra, L. Godo, and N. R. Jennings, "A computational trust model for multi-agent interactions based on confidence and reputation," in Proc. of Deception, Fraud and Trust in Agent Societies Workshop, 2003, pp. 69-75.
-
(2003)
Proc. of Deception, Fraud and Trust in Agent Societies Workshop
, pp. 69-75
-
-
Ramchurn, S.D.1
Sierra, C.2
Godo, L.3
Jennings, N.R.4
-
38
-
-
35248892017
-
Trust-based service provider selection in open environments
-
ACM Press
-
H. Billhardt, R. Hermoso, S. Ossowski, and R. Centeno, "Trust-based service provider selection in open environments," in Proc. of SAC. ACM Press, 2007, pp. 1375-1380.
-
(2007)
Proc. of SAC
, pp. 1375-1380
-
-
Billhardt, H.1
Hermoso, R.2
Ossowski, S.3
Centeno, R.4
-
39
-
-
3042777385
-
Trust negotiations: Concepts, systems, and languages
-
E. Bertino, E. Ferrari, and A. Squicciarini, "Trust Negotiations: Concepts, Systems, and Languages," Computing in Science and Engineering, vol. 6, no. 4, pp. 27-34, 2004.
-
(2004)
Computing in Science and Engineering
, vol.6
, Issue.4
, pp. 27-34
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.3
-
40
-
-
0036871183
-
Negotiating trust on the web
-
M. Winslett, T. Yu, K. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu, "Negotiating Trust on the Web," IEEE Internet Computing, vol. 6, no. 6, pp. 30-37, 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
41
-
-
3543075807
-
An access control framework for business processes for web services
-
ACM Press
-
H. Koshutanski and F. Massacci, "An access control framework for business processes for web services," in XMLSEC. ACM Press, 2003, pp. 15-24.
-
(2003)
XMLSEC
, pp. 15-24
-
-
Koshutanski, H.1
Massacci, F.2
-
42
-
-
50149088324
-
Security-by-contract for web services
-
ACM Press
-
N. Dragoni and F. Massacci, "Security-by-contract for web services," in Proc. of SWS. ACM Press, 2007, pp. 90-98.
-
(2007)
Proc. of SWS
, pp. 90-98
-
-
Dragoni, N.1
Massacci, F.2
-
43
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
T. Yu, M. Winslett, and K. E. Seamons, "Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation," ACM TISSEC, vol. 6, no. 1, pp. 1-42, 2003.
-
(2003)
ACM TISSEC
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
44
-
-
13244299177
-
Collaborative automated trust negotiation in peer-to-peer systems
-
IEEE
-
S. Ye, F. Makedon, and J. Ford, "Collaborative automated trust negotiation in peer-to-peer systems," in Proc. of P2P. IEEE, 2004, pp. 108-115.
-
(2004)
Proc. of P2P
, pp. 108-115
-
-
Ye, S.1
Makedon, F.2
Ford, J.3
-
45
-
-
33646851522
-
How to exploit ontologies for trust negotiation
-
CEUR-WS.org
-
T. Leithead, W. Nejdl, D. Olmedilla, K. E. Seamons, M. Winslett, T. Yu, and C. C. Zhang, "How to exploit ontologies for trust negotiation," in Proc. of ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, vol. 127. CEUR-WS.org, 2004.
-
(2004)
Proc. of ISWC Workshop on Trust, Security, and Reputation on the Semantic Web
, vol.127
-
-
Leithead, T.1
Nejdl, W.2
Olmedilla, D.3
Seamons, K.E.4
Winslett, M.5
Yu, T.6
Zhang, C.C.7
-
46
-
-
35048841281
-
Peertrust: Automated trust negotiation for peers on the semantic web
-
Springer
-
W. Nejdl, D. Olmedilla, and M. Winslett, "Peertrust: Automated trust negotiation for peers on the semantic web," in Proc. of SDM, vol. 3178. Springer, 2004, pp. 118-132.
-
(2004)
Proc. of SDM
, vol.3178
, pp. 118-132
-
-
Nejdl, W.1
Olmedilla, D.2
Winslett, M.3
-
47
-
-
33745764834
-
Automated trust negotiation using cryptographic credentials
-
ACM Press
-
J. Li, N. Li, and W. H. Winsborough, "Automated trust negotiation using cryptographic credentials," in Proc. of ACM CCS. ACM Press, 2005, pp. 46-57.
-
(2005)
Proc. of ACM CCS
, pp. 46-57
-
-
Li, J.1
Li, N.2
Winsborough, W.H.3
-
48
-
-
34547505017
-
Pp-trust-x: A system for privacy preserving trust negotiations
-
A. Squicciarini, E. Bertino, E. Ferrari, F. Paci, and B. Thuraisingham, "Pp-trust-x: A system for privacy preserving trust negotiations," ACM TISSEC, vol. 10, no. 3, p. 12, 2007.
-
(2007)
ACM TISSEC
, vol.10
, Issue.3
, pp. 12
-
-
Squicciarini, A.1
Bertino, E.2
Ferrari, E.3
Paci, F.4
Thuraisingham, B.5
-
49
-
-
34848877469
-
Supporting robust and secure interactions in open domains through recovery of trust negotiations
-
IEEE
-
A. Squicciarini, A. Trombetta, and E. Bertino, "Supporting robust and secure interactions in open domains through recovery of trust negotiations," in ICDCS. IEEE, 2007.
-
(2007)
ICDCS
-
-
Squicciarini, A.1
Trombetta, A.2
Bertino, E.3
-
50
-
-
3142676730
-
Trust-x: A peer-to-peer framework for trust establishment
-
E. Bertino, E. Ferrari, and A. C. Squicciarini, "Trust-x: A peer-to-peer framework for trust establishment," TKDE, vol. 16, no. 7, pp. 827-842, 2004.
-
(2004)
TKDE
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
51
-
-
84902459113
-
Interactive access control for web services
-
Kluwer Press
-
H. Koshutanski and F. Massacci, "Interactive access control for web services," in Proc. of IFIP ISC. Kluwer Press, 2004, pp. 151-166.
-
(2004)
Proc. of IFIP ISC
, pp. 151-166
-
-
Koshutanski, H.1
Massacci, F.2
-
52
-
-
0036085965
-
Design of a role-based trust management framework
-
N. Li and J. C. Mitchell, "Design of a role-based trust management framework," in Proc. of IEEE SSP. IEEE, 2002, pp. 114-130.
-
(2002)
Proc. of IEEE SSP. IEEE
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
-
54
-
-
11244331795
-
Cassandra: Distributed access control policies with tunable expressiveness
-
IEEE
-
M. Becker and P. Sewell, "Cassandra: Distributed access control policies with tunable expressiveness," in Proc. of POLICY. IEEE, 2004, pp. 159-168.
-
(2004)
Proc. of POLICY
, pp. 159-168
-
-
Becker, M.1
Sewell, P.2
-
55
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
P. Bonatti and P. Samarati, "A unified framework for regulating access and information release on the web," Journal of Computer Security, vol. 10, no. 3, pp. 241-272, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
56
-
-
33745792729
-
Peeraccess: A logic for distributed authorization
-
ACM Press
-
M. Winslett, C. C. Zhang, and P. A. Bonatti, "Peeraccess: a logic for distributed authorization," in Proc. of ACM CCS. ACM Press, 2005, pp. 168-179.
-
(2005)
Proc. of ACM CCS
, pp. 168-179
-
-
Winslett, M.1
Zhang, C.C.2
Bonatti, P.A.3
-
57
-
-
34250616363
-
Access control enforcement for conversation-based web services
-
DOI 10.1145/1135777.1135818, Proceedings of the 15th International Conference on World Wide Web
-
M. Mecella, M. Ouzzani, F. Paci, and E. Bertino, "Access control enforcement for conversation-based web services." in Proc. of WWW. ACM Press, 2006, pp. 257-266. (Pubitemid 46946618)
-
(2006)
Proceedings of the 15th International Conference on World Wide Web
, pp. 257-266
-
-
Mecella, M.1
Ouzzani, M.2
Paci, F.3
Bertino, E.4
-
58
-
-
85029609685
-
Simulated social control for secure internet commerce
-
ACM Press
-
L. Rasmusson and S. Jansson, "Simulated social control for secure internet commerce," in Proc. of NSPW. ACM Press, 1996, pp. 18-25.
-
(1996)
Proc. of NSPW
, pp. 18-25
-
-
Rasmusson, L.1
Jansson, S.2
|