{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:29:54Z","timestamp":1760596194675},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540402244"},{"type":"electronic","value":"9783540448754"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44875-6_17","type":"book-chapter","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T23:35:20Z","timestamp":1193182520000},"page":"239-254","source":"Crossref","is-referenced-by-count":39,"title":["Trust Propagation in Small Worlds"],"prefix":"10.1007","author":[{"given":"Elizabeth","family":"Gray","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jean-Marc","family":"Seigneur","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yong","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christian","family":"Jensen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2003,5,27]]},"reference":[{"key":"17_CR1","unstructured":"Marsh, S.: Formalising Trust as a Computational Concept. PhD thesis, University of Stirling, Department of Computer Science and Mathematics (1994)"},{"key":"17_CR2","unstructured":"McKnight, D., Chervany, N.: The Meanings of Trust. MISRC 96-04, University of Minnesota, Management Informations Systems Research Center, University of Minnesota (1996)"},{"key":"17_CR3","unstructured":"Gray, E., O\u2019Connell, P., Jensen, C., Weber, S., Seigneur, J.M., Yong, C.: Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications. Technical Report 66, Department of Computer Science, Trinity College Dublin (2002)"},{"key":"17_CR4","unstructured":"Matthews, R.: Six Degrees of Separation. World Link (2000)"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Milgram, S.: The Small World Problem. Psychology Today 61 (1967)","DOI":"10.1037\/e400002009-005"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/2786545","volume":"32","author":"J. Travers","year":"1969","unstructured":"Travers, J., Milgram, S.: An Experimental Study of the Small World Problem. Sociometry 32 (1969) 425\u2013443","journal-title":"Sociometry"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"D. Watts","year":"1998","unstructured":"Watts, D., Strogatz, S.: Collective Dynamics of\u2019 small-World\u2019 Networks. Nature 393 (1998) 440\u2013442","journal-title":"Nature"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Watts, D.: Small Worlds, The Dynamics of Networks Between Order and Randomness. Princeton University Press (1999)","DOI":"10.1515\/9780691188331"},{"key":"17_CR9","unstructured":"Watts, D., Strogatz, S.: Kevin Bacon, the Small-World, and Why It All Matters. http:\/\/www.santafe.edu\/sfi\/publications\/Bulletins\/bulletinFall99\/workInProgress\/smallWorld.html (1999)"},{"key":"17_CR10","unstructured":"Reynolds, P.: Oracle of Bacon. ( http:\/\/www.cs.virginia.edu\/oracle\/ )"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Adamic, L.: The Small World Web. In Abiteboul, S., Vercoustre, A.M., eds.: Proc. 3rd European Conf. Research and Advanced Technology for Digital Libraries, ECDL. Number 1696, Springer-Verlag (1999) 443\u2013452","DOI":"10.1007\/3-540-48155-9_27"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Kleinberg, J.: The Small-World Phenomenon: An Algorithmic Perspective. In: Proc. of the 32nd ACM Symposium on Theory of Computing. (2000)","DOI":"10.1145\/335305.335325"},{"key":"17_CR13","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1126\/science.1070120","volume":"296","author":"D. Watts","year":"2002","unstructured":"Watts, D., Dodds, P., Newman, M.: Identity and Search in Social Networks. Science 296 (2002) 1302\u20131305","journal-title":"Science"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Hubaux, J.P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: Proc. of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC). (2001)","DOI":"10.1145\/501416.501437"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Capkun, S., Buttyan, L., Hubaux, J.P.: Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph. In: New Security Paradigms Workshop, Norfolk, VA (2002)","DOI":"10.1145\/844107.844108"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Stajano, F.: Security for Ubiquitous Computing. Wiley (2002)","DOI":"10.1002\/0470848693"},{"key":"17_CR17","unstructured":"Seigneur, J.M., Farrell, S., Jensen, C.D.: Secure Ubiquitous Computing Based on Entity Recognition. In: Ubicomp\u201902 Security Workshop, Gothenburg (2002)"},{"key":"17_CR18","unstructured":"Seigneur, J.M., Farrell, S., Jensen, C.D., Gray, E., Yong, C.: End-to-end trust in pervasive computing starts with recognition. In: Proceedings of the First International Conference on Security in Pervasive Computing, Boppard, Germany (2003 [to appear])"},{"key":"17_CR19","unstructured":"ITU: Information Technology \u2014 Opens Systems Interconnection \u2014 The Directory: Authentication Framework. Number X.509 in ITU-T Recomandation. International Telecomunication Union (1993)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Kohl, J., Neuman, B.: The Kerberos Network Authentication Service (Version 5). RFC 1510, IETF (1993)","DOI":"10.17487\/rfc1510"},{"key":"17_CR21","unstructured":"IMDB: Internet Movie Database. ( http:\/\/www.imdb.com )"},{"key":"17_CR22","unstructured":"Venkatraman, M., Yu, B., Singh, M.: Trust and Reputation Management in a Small-World Network. Technical report (2002)"},{"key":"17_CR23","unstructured":"Matsuo, Y.: Clustering Using Small World Structure. In: Knowledge-Based Intelligent Information and Engineering Systems, Crema, Italy (2002)"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Newman, M.: Clustering and Preferential Attachment in Growing Networks. Phys. Rev. E 64 (2001)","DOI":"10.1103\/PhysRevE.64.025102"}],"container-title":["Lecture Notes in Computer Science","Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44875-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T10:14:32Z","timestamp":1587982472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44875-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540402244","9783540448754"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-44875-6_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}