{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T23:59:55Z","timestamp":1771459195860,"version":"3.50.1"},"publisher-location":"Boston, MA","reference-count":26,"publisher":"Springer US","isbn-type":[{"value":"9780387094274","type":"print"},{"value":"9780387094281","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09428-1_2","type":"book-chapter","created":{"date-parts":[[2008,5,17]],"date-time":"2008-05-17T15:28:30Z","timestamp":1211038110000},"page":"17-32","source":"Crossref","is-referenced-by-count":7,"title":["A Trust Evaluation Method Based on Logic and Probability Theory"],"prefix":"10.1007","author":[{"given":"Reto","family":"Kohlas","sequence":"first","affiliation":[]},{"given":"Jacek","family":"Jonczy","sequence":"additional","affiliation":[]},{"given":"Rolf","family":"Haenni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"The official ebay website. http:\/\/www.ebay.com, April 2006."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"T. Beth, M. Borcherding, and B. Klein. Valuation of trust in open networks. In ES-ORICS\u201994, 3rd European Symposium on Research in Computer Security, LNCS 875, pages 3-18. Springer, 1994.","DOI":"10.1007\/3-540-58618-0_53"},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, February 1990.","journal-title":"ACM Transactions on Computer Systems"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Transactions on Infor-mation Theory, IT-22(6):644-654, 1976.","DOI":"10.1109\/TIT.1976.1055638"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"L. Gong, R. Needham, and R. Yahalom. Reasoning About Belief in Cryptographic Protocols. In Deborah Cooper and Teresa Lunt, editors, Proceedings 1990 IEEE Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society, 1990.","DOI":"10.1109\/RISP.1990.63854"},{"issue":"3","key":"2_CR6","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.ijar.2004.05.010","volume":"38","author":"R Haenni","year":"2005","unstructured":"R. Haenni. Using probabilistic argumentation for key validation in public-key cryptography. International Journal of Approximate Reasoning, 38(3):355-376, 2005.","journal-title":"International Journal of Approximate Reasoning"},{"key":"2_CR7","unstructured":"R. Haenni. Probabilistic argumentation (submitted). Elsevier, 2007."},{"key":"2_CR8","unstructured":"R. Haenni, J. Jonczy, and R. Kohlas. Two-layer models for managing authenticity and trust. In R. Song, L. Korba, and G. Yee, editors, Trust in E-Services: Technologies, Practices and Challenges. 2006."},{"key":"2_CR9","series-title":"volume 5: Algorithms for Uncertainty and Defeasible Reasoning","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-94-017-1737-3_6","volume-title":"Handbook of Defeasible Reasoning and Uncertainty Management Systems","author":"R Haenni","year":"2000","unstructured":"R. Haenni, J. Kohlas, and N. Lehmann. Probabilistic argumentation systems. In D. M. Gab-bay and P. Smets, editors, Handbook of Defeasible Reasoning and Uncertainty Management Systems, volume 5: Algorithms for Uncertainty and Defeasible Reasoning, pages 221-288. Kluwer Academic Publishers, Dordrecht, Netherlands, 2000."},{"key":"2_CR10_","doi-asserted-by":"crossref","unstructured":"R. Haenni and N. Lehmann. ABEL: an interactive tool for probabilistic argumentative reason-ing. In ECSQARU\u201903, 7th European Conference on Symbolic and Quantitative Approaches to Reasoning under Uncertainty, pages 588-593, Aalborg, Denmark, 2003.","DOI":"10.1007\/978-3-540-45062-7_48"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"J. Jonczy. Evaluating trust and authenticity with CAUTION. In iTrust\u201906, 4rd International Conference on Trust Management, pages 449-453, Pisa, Italy, 2006.","DOI":"10.1007\/11755593_34"},{"key":"2_CR12","series-title":"Security and Trust","first-page":"101","volume-title":"PST\u201905: 3rd Annual Conference on Privacy","author":"J Jonczy","year":"2005","unstructured":"J. Jonczy and R. Haenni. Credential networks: a general model for distributed trust and au-thenticity management. In A. Ghorbani and S. Marsh, editors, PST\u201905: 3rd Annual Conference on Privacy, Security and Trust, pages 101-112, St. Andrews, Canada, 2005."},{"key":"2_CR13","unstructured":"J. Jonczy, M. W \u00fcthrich, and R. Haenni. A probabilistic trust model for GnuPG. In 23C3, 23rd Chaos Communication Congress, pages 61-66, Berlin, Germany, 2006."},{"key":"2_CR14","unstructured":"A. J\u00f8sang. An algebra for assessing trust in certification chains. In NDSS\u201999: 6th Annual Symposium on Network and Distributed System Security, San Diego, USA, 1999."},{"issue":"3","key":"2_CR15","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A J\u00f8sang","year":"2001","unstructured":"A. J\u00f8sang. A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3):279-311, 2001.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"J. Kohlas and P. A. Monney. A Mathematical Theory of Hints. An Approach to the Dempster-Shafer Theory of Evidence, volume 425 of Lecture Notes in Economics and Mathematical Systems. Springer, 1995.","DOI":"10.1007\/978-3-662-01674-9"},{"key":"2_CR17","series-title":"Kommunikation in Verteilten Systemen","first-page":"213","volume-title":"KiVS\u201907","author":"R Kohlas","year":"2007","unstructured":"R. Kohlas, R. Haenni, and J. Jonczy. A new model for public-key authentication. In T. Braun, G. Carle, and B. Stiller, editors, KiVS\u201907, Kommunikation in Verteilten Systemen, pages 213-224, Berne, Switzerland, 2007."},{"key":"2_CR18","series-title":"Third International Workshop on Practice and Theory in Public Key Cryptography, LNCS 1751","first-page":"93","volume-title":"PKC\u20192000","author":"R Kohlas","year":"2000","unstructured":"R. Kohlas and U. Maurer. Confidence valuation in a public-key infrastructure based on un-certain evidence. In H. Imai and Y. Zheng, editors, PKC\u20192000, Third International Workshop on Practice and Theory in Public Key Cryptography, LNCS 1751, pages 93-112, Melbourne, Australia, 2000. Springer."},{"key":"2_CR19","unstructured":"R. Levien and A. Aiken. Attack-resistant trust metrics for public key certification. In 7th on USENIX Security Symposium, pages 229-242, 1998."},{"key":"2_CR20","series-title":"Security and Trust","first-page":"113","volume-title":"PST\u201905: 3rd Annual Conference on Privacy","author":"G Mahoney","year":"2005","unstructured":"G. Mahoney, W. Myrvold, and G. C. Shoja. Generic reliability trust model. In A. Ghorbani and S. Marsh, editors, PST\u201905: 3rd Annual Conference on Privacy, Security and Trust, pages 113-120, St. Andrews, Canada, 2005."},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"U. Maurer. Modelling a public-key infrastructure. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, ESORICS, European Symposium on Research in Computer Security, LNCS 1146, pages 324-350. Springer, 1996.","DOI":"10.1007\/3-540-61770-1_45"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"M. K. Reiter and S. G. Stubblebine. Path independence for authentication in large-scale sys-tems. In CCS\u201997, 4th ACM Conference on Computer and Communications Security, pages 57-66, Z \u00fcrich, Switzerland, 1997. Academic Press.","DOI":"10.1145\/266420.266435"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"M. K. Reiter and S. G. Stubblebine. Toward acceptable metrics of authentication. In SP\u201997: 18th IEEE Symposium on Security and Privacy, pages 10-20, Oakland, USA, 1997.","DOI":"10.1109\/SECPRI.1997.601308"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"R. L. Rivest, A. Shamir, and L. M. Adelman. A method for obtaining digital signatures and public-key cryptosystems. Technical Report TM-82, MIT, Cambridge, USA, 1977.","DOI":"10.21236\/ADA606588"},{"key":"2_CR25","unstructured":"C. G. Zarba. Many-sorted logic. http:\/\/theory.stanford.edu\/\u02dczarba\/snow\/ch01.pdf."},{"key":"2_CR26","unstructured":"P. R. Zimmermann. PGP User\u2019s Guide Volume I: Essential Topics, 1994."}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Trust Management II"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09428-1_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:33:06Z","timestamp":1605648786000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09428-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387094274","9780387094281"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09428-1_2","relation":{},"subject":[]}}