{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T05:42:00Z","timestamp":1736314920228,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540329923"},{"type":"electronic","value":"9783540329930"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11687818_12","type":"book-chapter","created":{"date-parts":[[2006,2,23]],"date-time":"2006-02-23T07:33:24Z","timestamp":1140680004000},"page":"153-164","source":"Crossref","is-referenced-by-count":1,"title":["Trust Management Issues for Ad Hoc and Self-organized Networks"],"prefix":"10.1007","author":[{"given":"Vassileios","family":"Tsetsos","sequence":"first","affiliation":[]},{"given":"Giannis F.","family":"Marias","sequence":"additional","affiliation":[]},{"given":"Sarantis","family":"Paskalis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J. Douceur","year":"2002","unstructured":"Douceur, J.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, p. 251. Springer, Heidelberg (2002)"},{"key":"12_CR2","unstructured":"Perrig, A., Hu, Y.-C., Johnson, D.B.: Wormhole Protection in Wireless Ad Hoc Networks, Technical Report TR01-384. Dep. Of Computer Science, Rice University (2001)"},{"key":"12_CR3","unstructured":"EC Directorate F, IST Framework, Future and Emerging Technologies, Situated and Autonomic Communications (COMS) - Communication Paradigms for 2020, Available at: http:\/\/www.cordis.lu\/ist\/fet\/comms.htm"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Chess, D.M., Palmer, C.C., White, S.R.: Security in an autonomic computing environment. IBM Systems Journal\u00a042(1) (2003)","DOI":"10.1147\/sj.421.0107"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: Proc. New Security Paradigms Workshop. ACM, New York (1997)","DOI":"10.1145\/283699.283739"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehaviour in mobile ad hoc networks. In: Proc. of Mobicom 2000, Boston, USA (2000)","DOI":"10.1145\/345910.345955"},{"issue":"3","key":"12_CR7","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MPRV.2003.1228527","volume":"2","author":"V. Cahill","year":"2003","unstructured":"Cahill, V., et al.: Using Trust for Secure Collaboration in Uncertain Environments. IEEE Pervasive Computing\u00a02(3), 52\u201361 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"English, C., Terzis, S., Nixon, P.: Towards Self-Protecting Ubiquitous Systems: Monitoring Trust-based Interactions. Journal of Personal and Ubiquitous Computing (to appear, 2005)","DOI":"10.1007\/s00779-005-0030-y"},{"key":"12_CR9","unstructured":"Castelfranchi, C., Falcone, R.: Trust is much more than subjective probability. Mental components and sources of trust. In: HICSS33, Hawaii (2000)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.: CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proc. 6th IFIP Communications and Multimedia Security Conference, Portorosz, Slovenia (2002)","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"12_CR11","unstructured":"Buchegger, S., Le Boudec, J.-Y.: A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In: Proc. Second Workshop on the Economics of Peer-to-Peer Systems (2004)"},{"key":"12_CR12","unstructured":"Software-defined radio forum, http:\/\/www.sdrforum.org\/"},{"key":"12_CR13","unstructured":"IST End-to-End Reconfigurability Project E2R, http:\/\/e2r.motlabs.com\/"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A.: The right type of trust for distributed systems. In: Proc. of Workshop on New Security Paradigms, California, USA (1996)","DOI":"10.1145\/304851.304877"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Hendler, J., Lassila, O.: The Semantic Web. Scientific American (2001)","DOI":"10.1038\/scientificamerican0501-34"},{"key":"12_CR16","volume-title":"Ontological Engineering: with examples from the areas of Knowledge Management, e-Commerce and the Semantic Web","author":"A. Gomez-Perez","year":"2004","unstructured":"Gomez-Perez, A., Corcho, O., Fernandez-Lopez, M.: Ontological Engineering: with examples from the areas of Knowledge Management, e-Commerce and the Semantic Web. Springer, Heidelberg (2004)"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"L\u00f3pez de Vergara, J.E., et al.: Semantic management: Application of ontologies for the integration of management information models. In: IM 2003 - 9th IFIP\/IEEE International Symposium on Integrated Network Management, vol.\u00a09(1), pp. 131\u2013134 (March 2003)","DOI":"10.1109\/INM.2003.1194172"},{"key":"12_CR18","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-45217-1_18","volume-title":"Cooperative Information Agents VII","author":"J. Golbeck","year":"2003","unstructured":"Golbeck, J., Parsia, B., Hendler, J.: Trust Networks on the Semantic Web. In: Klusch, M., Omicini, A., Ossowski, S., Laamanen, H. (eds.) CIA 2003. LNCS (LNAI), vol.\u00a02782, pp. 238\u2013249. Springer, Heidelberg (2003)"},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/978-3-540-39718-2_26","volume-title":"The Semantic Web - ISWC 2003","author":"L. Kagal","year":"2003","unstructured":"Kagal, L., Finin, T., Joshi, A.: A Policy Based Approach to Security for the Semantic Web. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 402\u2013418. Springer, Heidelberg (2003)"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/978-3-540-39718-2_27","volume-title":"The Semantic Web - ISWC 2003","author":"G. Tonti","year":"2003","unstructured":"Tonti, G., et al.: Semantic Web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 419\u2013437. Springer, Heidelberg (2003)"},{"key":"12_CR21","unstructured":"Verma, D.C.: Policy-Based Networking\u2013Architecture and Algorithms, New Riders (2000)"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Neisse, R.: An Hierarchical Policy-Based Architecture for Integrated Management of Grids and Networks. In: Fifth IEEE POLICY Workshop, New York, USA (2004)","DOI":"10.1109\/POLICY.2004.1309155"},{"key":"12_CR23","unstructured":"Semantic Web Trust and Security Resource Guide, http:\/\/www.wiwiss.fu-berlin.de\/suhl\/bizer\/SWTSGuide\/"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Clark, D., Partridge, C., Ramming, J.C., Wroclawski, J.: A Knowledge Plane for the Internet. In: SIGCOMM 2003, Karlsruhe, Germany (2003)","DOI":"10.1145\/863955.863957"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Marias, G., Tsetsos, V., Sekkas, O., Georgiadis, P.: Performance evaluation of a self-evolving trust building framework. In: IEEE SECOVAL Workshop, Athens, Greece (2005)","DOI":"10.1109\/SECCMW.2005.1588306"}],"container-title":["Lecture Notes in Computer Science","Autonomic Communication"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11687818_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,7]],"date-time":"2025-01-07T21:16:07Z","timestamp":1736284567000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11687818_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540329923","9783540329930"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/11687818_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}