{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:32:48Z","timestamp":1725471168604},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540386193"},{"type":"electronic","value":"9783540386223"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11839569_24","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T13:21:24Z","timestamp":1159881684000},"page":"246-257","source":"Crossref","is-referenced-by-count":20,"title":["Bayesian Network Based Trust Management"],"prefix":"10.1007","author":[{"given":"Yong","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vinny","family":"Cahill","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elizabeth","family":"Gray","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Colin","family":"Harris","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lejian","family":"Liao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"24_CR1","volume-title":"Pervasive Computing Magazine","author":"V. Cahill","year":"2003","unstructured":"Cahill, V., Gray, E., Seigneur, J.-M., Jensen, C., Chen, Y., Shand, B., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon, P., Serugendo, G., Bryce, C., Carbone, M., Krukow, K., Nielsen, M.: Using Trust for Secure Collaboration in Uncertain Environments. In: Pervasive Computing Magazine, vol.\u00a02. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"24_CR2","unstructured":"Mui, L., Mohtashemi, M., Ang, C., Szolovits, P., Halberdtadt, A.: Ratings in Distributed Systems: A Bayesian Approach (2002)"},{"key":"24_CR3","unstructured":"Ismail, R., Josang, A.: The beta reputation systems. In: Proceedings of the 15th Bled Conference on Electronic Commerce, Slovenia (2002)"},{"key":"24_CR4","unstructured":"Whitby, A., Josang, A., Indulska, J.: Filtering out unfair ratings in bayesian reputation systems. In: Proceedings of the Workshop on Trust in Agent Societies, at the 3rd Int. Conf. on Autonomous Agents and Multi Agent Systems (2004)"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/11429760_14","volume-title":"Trust Management","author":"J. Patel","year":"2005","unstructured":"Patel, J., Luke Teacy, W.T., Jennings, N.R., Luck, M.: A Probabilistic Trust Model for Handling Inaccurate Reputation Sources. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 193\u2013209. Springer, Heidelberg (2005)"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Wang, Y., Vassileva, J.: Trust and Reputation Model in Peer-to-Peer Networks. In: Proceedings of the Third International Conference on Peer-to-Peer Computing (2003)","DOI":"10.1109\/PTP.2003.1231515"},{"key":"24_CR7","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/3-540-45547-7_5","volume-title":"Trust in Cyber-societies","author":"K.S. Barber","year":"2001","unstructured":"Barber, K.S., Kim, J.: Belief Revision Process Based on Trust: Agents Evaluating Reputation of Information Sources. In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) AA-WS 2000. LNCS (LNAI), vol.\u00a02246, p. 73. Springer, Heidelberg (2001)"},{"key":"24_CR8","unstructured":"Dellarocas, C.: Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems. In: ICIS (2000)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks,? In: ACM Security for Ad-hoc and Sensor Networks (2004)","DOI":"10.1145\/1029102.1029115"},{"key":"24_CR10","unstructured":"Buchegger, S., Boudec, J.Y.L.: A robust reputation system for p2p and mobile ad-hoc networks. In: Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems (2004)"},{"key":"24_CR11","unstructured":"http:\/\/www.norsys.com\/"},{"key":"24_CR12","unstructured":"http:\/\/www.econ.iastate.edu\/tesfatsi\/tnghome.htm"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11839569_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:15:29Z","timestamp":1619507729000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11839569_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540386193","9783540386223"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11839569_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}