{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T22:42:32Z","timestamp":1749249752261},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540393689"},{"type":"electronic","value":"9783540393726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11847366_58","type":"book-chapter","created":{"date-parts":[[2006,9,8]],"date-time":"2006-09-08T16:50:18Z","timestamp":1157734218000},"page":"562-571","source":"Crossref","is-referenced-by-count":9,"title":["A Dynamic Trust Model Based on Naive Bayes Classifier for Ubiquitous Environments"],"prefix":"10.1007","author":[{"given":"Weiwei","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Donghai","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Sungyoung","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Youngkoo","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"58_CR1","unstructured":"Marsh, S.P.: Formalising Trust as a Computational Concept. Ph.D. Thesis, University of Stirling (1994)"},{"key":"58_CR2","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust\u00a0management. In: Proc. of the 1996 IEEE Symposium\u00a0on Security and Privacy, pp. 164\u2013173 (1996)"},{"key":"58_CR3","doi-asserted-by":"crossref","unstructured":"Josang, A.: The right\u00a0type of trust of distributed systems. In: New security paradigms workshop, USA, pp. 119\u2013131 (1996)","DOI":"10.1145\/304851.304877"},{"key":"58_CR4","unstructured":"English, C., Nixon, P.: Dynamic Trust Models for Ubiquitous Computing Environments. In: Proc. of the Fourth Annual Conference on Ubiquitous Computing (2002)"},{"key":"58_CR5","unstructured":"Lamsal, P.: Requirements for modeling trust in ubiquitous computing and ad hoc networks. In: Ad Hoc Mobile Wireless Networks \u2013 Research Seminar on Telecommunications Software (2002)"},{"key":"58_CR6","doi-asserted-by":"crossref","unstructured":"Ranganathan, K.: Trustworthy Pervasive Computing: The Hard Security Problems. In: Proc. of IEEE Conference on Pervasive Computing and Communications (2004)","DOI":"10.1109\/PERCOMW.2004.1276916"},{"key":"58_CR7","doi-asserted-by":"crossref","unstructured":"Aime, M.D., Lioy, A.: Incremental trust: building trust from past experience. In: Proc. of IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, Italy, pp. 603\u2013608 (2005)","DOI":"10.1109\/WOWMOM.2005.54"},{"key":"58_CR8","doi-asserted-by":"crossref","unstructured":"Shand, B., Dimmock, N., Bacon, J.: Trust for Ubiquitous, Transparent Collaboration. In: Proc. of ACM: Special issue: Pervasive computing and communications, pp. 711\u2013721 (2004)","DOI":"10.1023\/B:WINE.0000044030.65959.91"},{"key":"58_CR9","unstructured":"Liu, Z.Y., Jo, A.W., Thompson, R.A.: A Dynamic Trust Model for Mobile Ad Hoc NetWorks. In: Proc. of 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2004), pp. 80\u201385 (2004)"},{"key":"58_CR10","doi-asserted-by":"crossref","unstructured":"Theodorakopoulos, G., Baras, J.S.: Trust Evaluation in Ad-Hoc Networks. In: Proc. of the 2004 ACM workshop on Wireless security, USA, pp. 1\u201310 (2004)","DOI":"10.1145\/1023646.1023648"},{"key":"58_CR11","unstructured":"He, R., Niu, J.W., Yuan, M.: A Novel Cloud-Based Trust Model\u00a0for Pervasive Computing. In: Proc. of the Fourth International Conference on Computer and Information Technology, pp. 693\u2013670 (2004)"},{"key":"58_CR12","doi-asserted-by":"crossref","unstructured":"Guha, R., Kumar, R., Raghavan, P.: Propagation of trust and distrust. In: Proc. of International Conference on World Wide Wed, USA, pp. 403\u2013412 (2004)","DOI":"10.1145\/988672.988727"},{"key":"58_CR13","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.: A collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks. In: Proc. of IFIP Communication and Multimedia Security Conference, Portoroz, pp. 107\u2013121 (2002)","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"58_CR14","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proc. of ACM Workshop on Security of ad-hoc and sensor networks, USA, pp. 66\u201377 (2004)","DOI":"10.1145\/1029102.1029115"},{"key":"58_CR15","doi-asserted-by":"crossref","unstructured":"Castelfranchi, C., Falcone, R., Pezzulo, G.: Trust\u00a0in Information Sources as a source for Trust: A Fuzzy Approach. In: Proc. of the second international joint conference on Autonomous agents and multiagent systems, pp. 89\u201396 (2003)","DOI":"10.1145\/860575.860590"}],"container-title":["Lecture Notes in Computer Science","High Performance Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11847366_58.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T14:42:22Z","timestamp":1605624142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11847366_58"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540393689","9783540393726"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11847366_58","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}