{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:30:07Z","timestamp":1762032607624},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540342953"},{"type":"electronic","value":"9783540342977"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11755593_7","type":"book-chapter","created":{"date-parts":[[2006,8,25]],"date-time":"2006-08-25T15:28:17Z","timestamp":1156519697000},"page":"77-92","source":"Crossref","is-referenced-by-count":5,"title":["Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail"],"prefix":"10.1007","author":[{"given":"Noria","family":"Foukia","sequence":"first","affiliation":[]},{"given":"Li","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Clifford","family":"Neuman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"RFC 2554 \u2013 SMTP Service Extension for Authentication"},{"key":"7_CR2","unstructured":"RFC 3207 \u2013 SMTP Service Extension for Secure SMTP over Transport Layer Security"},{"key":"7_CR3","unstructured":"Zhou, L., Neuman, C.: Negotiation of Multilateral Security Decisions for Grid Computing. Technical Report TR 2004-15 (October 8, 2004)"},{"issue":"2","key":"7_CR4","doi-asserted-by":"publisher","first-page":"286","DOI":"10.2307\/1969529","volume":"54","author":"J.F. Nash","year":"1951","unstructured":"Nash, J.F.: Non-Cooperative Games. The Annals of Mathematics\u00a054(2), 286\u2013295 (1951)","journal-title":"The Annals of Mathematics"},{"key":"7_CR5","volume-title":"Prisoner\u2019s Dilemma: John von Neumann, Game Theory, and the Puzzle of the Bomb","author":"W. Poundstone","year":"1993","unstructured":"Poundstone, W.: Prisoner\u2019s Dilemma: John von Neumann, Game Theory, and the Puzzle of the Bomb. Oxford University Press, Oxford (1993)"},{"key":"7_CR6","unstructured":"SpamAssassin, http:\/\/spamassassin.apache.org"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Mirkovic, J., Robinson, M., Reiher, P.: Alliance Formation for DDoS Defense. In: Proceedings of the 2003 Workshop on New Security Paradigms, Ascona, Switzerland (2003)","DOI":"10.1145\/986655.986658"},{"key":"7_CR8","unstructured":"Papadopoulos, C., Lindell, R., Mhreinger, J., Hussain, A., Govindan, R.: COSSACK, Coordinated Suppression of Simultaneous Attacks. In: DARPA Information Survivability Conference and Exposition, Washington, DC, USA (2003)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Kaushik, S., Ammann, P., Wijesekera, D., Winsborough, W., Ritchtey, R.: A Policy Driven Approach for E-mail Services. In: Fifth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), New York, USA (2004)","DOI":"10.1109\/POLICY.2004.1309163"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A P2P-Based Collaborative Spam Detection and Filtering. In: The Fourth IEEE International Conference on P2P Computing, Zurich, Switzerland, August 24-27 (2004)","DOI":"10.1109\/PTP.2004.1334945"},{"key":"7_CR11","unstructured":"Razor: http:\/\/razor.sourceforge.net\/"},{"key":"7_CR12","unstructured":"Distributed Checksum Clearinghouse: http:\/\/www.rhyolite.com\/anti-spam\/dcc\/"},{"key":"7_CR13","unstructured":"SmartScreen, Microsoft Adds New Spam Filtering Technology Across E-Mail Platforms (November 17, 2003), http:\/\/www.microsoft.com\/presspass\/press\/"},{"key":"7_CR14","unstructured":"Cloudmark: http:\/\/www.cloudmark.com\/"},{"key":"7_CR15","unstructured":"Distributed Sender Blackhole List, http:\/\/www.dsbl.org"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Postel, J.: Simple Mail Transfer Protocol. RFC 821 Internet Engineering Task Force (1982)","DOI":"10.17487\/rfc0821"},{"key":"7_CR17","unstructured":"Jacob, P.: The Spam Problem: Moving Beyond RBLs (January 3, 2003), http:\/\/theory.whirlycott.com\/~phil\/antispam\/rbl-bad\/rbl-bad.html"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Goodman, J., Rounthwaite, R.: Stopping Outgoing Spam. In: ACM Conference on Electronic Commerce, New York (2004)","DOI":"10.1145\/988772.988779"},{"key":"7_CR19","unstructured":"Naor, M.: Verification of a Human in the Loop or Identification via the Turing Test (manuscript 1996), http:\/\/www.wisdom.weizmann.ac.il\/~naor\/"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Jung, J., Sit, E.: An Empirical Study of Spam traffic and the Use of DNS Black Lists. In: Internet Measurement Conference, Taormina, Italy (2004)","DOI":"10.1145\/1028788.1028838"},{"key":"7_CR21","unstructured":"Zhou, L., Neuman, C.: Establishing Agreements in Dynamic Virtual Organizations. In: IEEE SECOVAL Workshop of SECURECOMM 2005, Athens, Greece, September 5-9 (2005)"},{"key":"7_CR22","first-page":"88","volume-title":"Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2002)","author":"M. Nowostawski","year":"2002","unstructured":"Nowostawski, M., Purvis, M., Cranefield, S.: OPAL A Multi-level Infrastructure for Agent-Oriented Development. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2002), pp. 88\u201389. ACM Press, New York (2002)"},{"key":"7_CR23","unstructured":"FIPA. Foundation For Intelligent Physical Agents (FIPA): FIPA, Specifications (2000), http:\/\/www.fipa.org\/specifications\/index.html"}],"container-title":["Lecture Notes in Computer Science","Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11755593_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T20:24:58Z","timestamp":1555791898000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11755593_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540342953","9783540342977"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/11755593_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}