{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:09:19Z","timestamp":1763467759377,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540385691"},{"type":"electronic","value":"9783540385707"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11839354_26","type":"book-chapter","created":{"date-parts":[[2006,9,16]],"date-time":"2006-09-16T02:58:37Z","timestamp":1158375517000},"page":"360-374","source":"Crossref","is-referenced-by-count":32,"title":["A Fuzzy Approach to Reasoning with Trust, Distrust and Insufficient Trust"],"prefix":"10.1007","author":[{"given":"Nathan","family":"Griffiths","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Castelfranchi, C., Falcone, R.: Principles of trust for MAS: Cognitive anatomy, social importance, and quantification. In: Proceedings of the Third International Conference on Multi-Agent Systems (ICMAS 1998), Paris, France, pp. 72\u201379 (1998)","DOI":"10.1109\/ICMAS.1998.699034"},{"key":"26_CR2","first-page":"213","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"D. Gambetta","year":"1988","unstructured":"Gambetta, D.: Can we trust trust? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213\u2013237. Basil Blackwell, Malden (1988)"},{"key":"26_CR3","first-page":"9","volume":"19","author":"N. Griffiths","year":"2005","unstructured":"Griffiths, N.: Trust: Challenges and opportunities. AgentLink News\u00a019, 9\u201311 (2005)","journal-title":"AgentLink News"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Griffiths, N.: Fuzzy trust for peer-to-peer systems. In: Proceedings of the P2P Data and Knowledge Sharing Workshop (P2P\/DAKS 2006) (to appear)","DOI":"10.1109\/ICDCSW.2006.57"},{"key":"26_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/11429760_17","volume-title":"Trust Management","author":"N. Griffiths","year":"2005","unstructured":"Griffiths, N., Chao, K.-M.: Experience-based trust: Enabling effective resource selection in a grid environment. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 240\u2013255. Springer, Heidelberg (2005)"},{"key":"26_CR6","first-page":"94","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"N. Luhmann","year":"1988","unstructured":"Luhmann, N.: Familiarity, confidence, trust: Problems and alternatives. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 94\u2013107. Basil Blackwell, Malden (1988)"},{"issue":"1","key":"26_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0020-7373(75)80002-2","volume":"7","author":"E.H. Mamdani","year":"1975","unstructured":"Mamdani, E.H., Assilian, S.: An experiment in linguistic synthesis with a fuzzy logic controller. International Journal of Man-Machine Studies\u00a07(1), 1\u201313 (1975)","journal-title":"International Journal of Man-Machine Studies"},{"issue":"2","key":"26_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/4236.832944","volume":"4","author":"D.W. Manchala","year":"2000","unstructured":"Manchala, D.W.: E-commerce trust metrics and models. IEEE Internet Computing\u00a04(2), 36\u201344 (2000)","journal-title":"IEEE Internet Computing"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/11429760_2","volume-title":"Trust Management","author":"S. Marsh","year":"2005","unstructured":"Marsh, S., Dibben, M.R.: Trust, untrust, distrust and mistrust \u2014 an exploration of the dark(er) side. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 17\u201333. Springer, Heidelberg (2005)"},{"key":"26_CR10","unstructured":"NRC Institute for Information Technology. The FuzzyJ toolkit (2006), www.iit.nrc.ca\/IR_public\/fuzzy\/fuzzyJToolkit2.html"},{"issue":"9\u201310","key":"26_CR11","first-page":"833","volume":"18","author":"S.D. Ramchurn","year":"2004","unstructured":"Ramchurn, S.D., Sierra, C., Godo, L., Jennings, N.R.: Devising a trust model for multi-agent interactions using confidence and reputation. Artificial Intelligence\u00a018(9\u201310), 833\u2013852 (2004)","journal-title":"Artificial Intelligence"},{"key":"26_CR12","volume-title":"Fuzzy Logic With Engineering Applications","author":"T.J. Ross","year":"2004","unstructured":"Ross, T.J.: Fuzzy Logic With Engineering Applications, 2nd edn. John Wiley & Sons, Chichester (2004)","edition":"2"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Sabater, J., Sierra, C.: REGRET: A reputation model for gregarious societies. In: Proceedings of the First International Joint Conference on Autonomous Agents in Multi-Agent Systems (AAMAS 2002), pp. 475\u2013482 (2002)","DOI":"10.1145\/544741.544854"},{"issue":"6","key":"26_CR14","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MIC.2005.136","volume":"9","author":"S. Song","year":"2005","unstructured":"Song, S., Hwang, K., Zhou, R., Kwok, Y.-K.: Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing\u00a09(6), 24\u201334 (2005)","journal-title":"IEEE Internet Computing"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Stakhanova, N., Basu, S., Wong, J., Stakhanov, O.: Trust framework for P2P networks using peer-profile based anomaly technique. In: Proceedings of the Second International Workshop on Security in Distributed Computing Systems, pp. 203\u2013209 (2005)","DOI":"10.1109\/ICDCSW.2005.137"},{"issue":"7","key":"26_CR16","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L. Xiong","year":"2004","unstructured":"Xiong, L., Liu, L.: PeerTrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Transactions on Knowledge and Data Engineering\u00a016(7), 843\u2013857 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"26_CR17","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1080\/01969727208542910","volume":"2","author":"L.A. Zadeh","year":"1972","unstructured":"Zadeh, L.A.: A fuzzy-set-theoretic interpretation of linguistic hedges. Journal of Cybernetics\u00a02(3), 4\u201334 (1972)","journal-title":"Journal of Cybernetics"}],"container-title":["Lecture Notes in Computer Science","Cooperative Information Agents X"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11839354_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T21:46:21Z","timestamp":1736545581000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11839354_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540385691","9783540385707"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11839354_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}