{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:21Z","timestamp":1725558981181},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540260424"},{"type":"electronic","value":"9783540320401"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11429760_20","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T15:47:10Z","timestamp":1279036030000},"page":"289-304","source":"Crossref","is-referenced-by-count":1,"title":["Towards an Evaluation Methodology for Computational Trust Systems"],"prefix":"10.1007","author":[{"given":"Ciar\u00e1n","family":"Bryce","sequence":"first","affiliation":[]},{"given":"Nathan","family":"Dimmock","sequence":"additional","affiliation":[]},{"given":"Karl","family":"Krukow","sequence":"additional","affiliation":[]},{"given":"Jean-Marc","family":"Seigneur","sequence":"additional","affiliation":[]},{"given":"Vinny","family":"Cahill","sequence":"additional","affiliation":[]},{"given":"Waleed","family":"Wagealla","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Spamassassin, http:\/\/spamassassin.apache.org"},{"key":"20_CR2","volume-title":"Security Engineering \u2014 A Guide to Building Dependable Distributed Systems","author":"R.J. Anderson","year":"2001","unstructured":"Anderson, R.J.: Security Engineering \u2014 A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Chichester (2001)"},{"key":"20_CR3","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. Technical Report 96-17, DIMACS, June 28 (1996)"},{"issue":"3","key":"20_CR4","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MPRV.2003.1228527","volume":"2","author":"V. Cahill","year":"2003","unstructured":"Cahill, V., et al.: Using Trust for Secure Collaboration in Uncertain Environments. IEEE Pervasive\u00a02(3), 52\u201361 (2003)","journal-title":"IEEE Pervasive"},{"key":"20_CR5","unstructured":"Dimmock, N., Bacon, J., Ingram, D., Moody, K.: Trust-based access control model. EU IST-FET SECURE Project Deliverable (September 2004)"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Douceur, J.R., Donath, J.S.: The Sybil Attack, February\u00a022 (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"20_CR7","unstructured":"Garcia-Molina, H., Schlosser, M.T., Kamvar, S.D.: The EigenTrust Algorithm for Reputation Management in P2P Networks, November\u00a018 (2002)"},{"key":"20_CR8","series-title":"The Java Series","volume-title":"Inside Java 2 Platform Security.","author":"L. Gong","year":"1999","unstructured":"Gong, L.: Inside Java 2 Platform Security. The Java Series. Addison Wesley, Reading (1999)"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-540-24747-0_16","volume-title":"Trust Management","author":"C.M. Jonker","year":"2004","unstructured":"Jonker, C.M., Schalken, J.J.P., Theeuwes, J., Treur, J.: Human Experiments in Trust Dynamics. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol.\u00a02995, pp. 206\u2013220. Springer, Heidelberg (2004)"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-540-30119-6_12","volume-title":"UbiComp 2004: Ubiquitous Computing","author":"T. Kindberg","year":"2004","unstructured":"Kindberg, T., Sellen, A., Geelhoed, E.: Security and Trust in Mobile Interactions: A Study of Users\u2019 Perceptions and Reasoning. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol.\u00a03205, pp. 196\u2013213. Springer, Heidelberg (2004)"},{"key":"20_CR11","unstructured":"Lampson, B., Rivest, R.L.: SDSI \u2013 A Simple Distributed Security Infrastructure. Technical report, July\u00a026 (1996)"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-540-24747-0_5","volume-title":"Trust Management","author":"J. Liu","year":"2004","unstructured":"Liu, J., Issarny, V.: Enhanced Reputation Mechanism for Mobile Ad Hoc Networks. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol.\u00a02995, pp. 48\u201362. Springer, Heidelberg (2004)"},{"key":"20_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-540-24747-0_17","volume-title":"Trust Management","author":"P. Massa","year":"2004","unstructured":"Massa, P., Bhattacharjee, B.: Using Trust in Recommender Systems: an Experimental Analysis. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol.\u00a02995, pp. 48\u201362. Springer, Heidelberg (2004)"},{"key":"20_CR14","first-page":"228","volume-title":"Proceedings of the 2nd International Conference on Privacy, Security and Trust","author":"J.-M. Seigneur","year":"2004","unstructured":"Seigneur, J.-M., Dimmock, N., Bryce, C., Jensen, C.: Combating SPAM with Trustworthy Email Addresses. In: Proceedings of the 2nd International Conference on Privacy, Security and Trust, New Brunswick, June 9-19, pp. 228\u2013229. ACM Press, New York (2004)"},{"issue":"6","key":"20_CR15","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MSECP.2003.1253566","volume":"1","author":"J.-M. Seigneur","year":"2003","unstructured":"Seigneur, J.-M., Jensen, C.D.: Privacy Recovery with Disposable Email Addresses. IEEE Security & Privacy\u00a01(6), 35\u201339 (2003)","journal-title":"IEEE Security & Privacy"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Twigg, A., Dimmock, N.: Attack Resistance of Computational Trust Models. In: IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises \u2014 Enterprise Security, June 2003, pp. 281\u2013282 (2003)","DOI":"10.1109\/ENABL.2003.1231420"},{"key":"20_CR17","unstructured":"Wagealla, W., Terzis, S., English, C., Nixon, P.: Simulation-based Assessment and Validation for the SECURE Collaboration Model. Technical report, University of Strathcylde (2005)"},{"key":"20_CR18","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/779928.779972","volume-title":"Proceedings of the 4th ACM Conference on Electronic Commerce EC 2003","author":"L. Xiong","year":"2003","unstructured":"Xiong, L., Liu, L.: A Reputation-based Trust Model for Peer-to-Peer Ecommerce Communities. In: Proceedings of the 4th ACM Conference on Electronic Commerce EC 2003, June 9-12, pp. 228\u2013229. ACM Press, New York (2003)"},{"key":"20_CR19","unstructured":"Zannone, N.: A Survey on Trust Management Languages. Technical report, University of Verona, August 01 (2004)"}],"container-title":["Lecture Notes in Computer Science","Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11429760_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:57:23Z","timestamp":1605643043000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11429760_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540260424","9783540320401"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11429760_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}