{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:04:56Z","timestamp":1725559496431},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540280125"},{"type":"electronic","value":"9783540318590"}],"license":[{"start":{"date-parts":[[2005,1,1]],"date-time":"2005-01-01T00:00:00Z","timestamp":1104537600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11532095_10","type":"book-chapter","created":{"date-parts":[[2010,7,18]],"date-time":"2010-07-18T16:06:39Z","timestamp":1279469199000},"page":"162-179","source":"Crossref","is-referenced-by-count":10,"title":["A Security Infrastructure for Trust Management in Multi-agent Systems"],"prefix":"10.1007","author":[{"given":"Agostino","family":"Poggi","sequence":"first","affiliation":[]},{"given":"Michele","family":"Tomaiuolo","sequence":"additional","affiliation":[]},{"given":"Giosu\u00e8","family":"Vitaglione","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Poggi, A., Rimassa, G., Tomaiuolo, M.: Multi-user and security support for multi-agent systems. In: Proc. WOA 2001 (Modena IT), September 2001, pp. 13\u201318 (2001)"},{"key":"10_CR2","unstructured":"Vitaglione, G.: JADE Tutorial - Security Administrator Guide (September 2002), http:\/\/jade.cselt.it\/doc\/tutorials\/SecurityAdminGuide.pdf"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI certificate theory. IETF RFC 2693 (September 1999)","DOI":"10.17487\/rfc2693"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Aura, T.: On the structure of delegation networks. In: Proc. 11th IEEE Computer Security Foundations Workshop, Rockport MA, June 1998, pp. 14\u201326 (1998)","DOI":"10.1109\/CSFW.1998.683151"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigmenbaum, J., Lacy, J.: Decentralized trust management. In: Proc. 1996 IEEE Symposium on Security and Privacy, Oakland CA, May 1996, pp. 164\u2013173 (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"issue":"3","key":"10_CR6","first-page":"77","volume":"2","author":"R. Khare","year":"1997","unstructured":"Khare, R., Rifkin, A.: Weaving a web of trust. World Wide Web Journal\u00a02(3), 77\u2013112 (Summer 1997)","journal-title":"World Wide Web Journal"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Li, N., Grosof, B.: A practically implementable and tractable delegation logic. In: Proc. 2000 IEEE Symposium on Security and Privacy, Oakland CA, May 2000, pp. 29\u201344 (2000)","DOI":"10.2139\/ssrn.290100"},{"key":"10_CR8","unstructured":"Paajarvi, J.X.: Encoding of SPKI Certificates. Internet Draft draft-paajarvi-xml-spki-cert-00.txt (March 2000)"},{"key":"10_CR9","unstructured":"Jansen, W., Karygiannis, T.: Mobile agent security, pp. 800\u2013819. NIST Special Publ."},{"key":"10_CR10","unstructured":"FIPA., http:\/\/www.fipa.org"},{"key":"10_CR11","unstructured":"JADE., http:\/\/jade.tilab.com"},{"key":"10_CR12","unstructured":"JAAS., http:\/\/java.sun.com\/products\/jaas\/"},{"key":"10_CR13","unstructured":"Castelfranchi, C., Falcone, R.: Socio-Cognitive Theory of Trust., http:\/\/alfebiite.ee.ic.ac.uk\/docs\/papers\/D1\/ab-d1-cas+fal-soccog.pdf"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Castelfranchi, C., Falcone, R.: Principles of trust for MAS: cognitive anatomy, social importance, and quantification. In: Proc. 3rd International Conference on Multi-Agent Systems, Paris, France, pp. 72\u201379 (1998)","DOI":"10.1109\/ICMAS.1998.699034"},{"key":"10_CR15","unstructured":"Castelfranchi, C., Falcone, R., Pezzullo, G.: Belief sources for trust: some learning mechanisms. In: Proc. 6th Workshop on Trust, Privacy, Deception and Fraud In Agent Societies, Melbourne (2003)"},{"key":"10_CR16","unstructured":"Lamsal, P.: Understanding Trust and Security (October 20, 2001), http:\/\/www.cs.helsinki.fi\/u\/lamsal\/papers\/UnderstandingTrustAndSecurity.pdf"},{"key":"10_CR17","first-page":"4","volume-title":"Trust and Power","author":"N. Luhmann","year":"1979","unstructured":"Luhmann, N.: Trust and Power, p. 4. Wiley, New York (1979)"},{"key":"10_CR18","first-page":"9","volume-title":"The Logic and Limits of Trust","author":"B. Barber","year":"1959","unstructured":"Barber, B.: The Logic and Limits of Trust, pp. 9\u201317. Grammercy Press, New Brunswick (1959)"},{"key":"10_CR19","unstructured":"Deutsch, M.: Cooperation and Trust: Some Theoretical Notes. In: Nebraska Symposium on Motivation, Nebraska University Press (1962)"},{"key":"10_CR20","unstructured":"Gambetta, D.: Can we trust trust? In: Trust: making and breaking cooperative relations, electronic edition ch. 13, pp. 213\u2013237 (2000)"}],"container-title":["Lecture Notes in Computer Science","Trusting Agents for Trusting Electronic Societies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11532095_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,31]],"date-time":"2021-10-31T18:50:24Z","timestamp":1635706224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11532095_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540280125","9783540318590"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11532095_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}