{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T21:10:22Z","timestamp":1737580222524,"version":"3.33.0"},"publisher-location":"Boston, MA","reference-count":18,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_12","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T06:41:46Z","timestamp":1195800106000},"page":"169-184","source":"Crossref","is-referenced-by-count":3,"title":["A trust protocol for community collaboration"],"prefix":"10.1007","author":[{"given":"Samuel","family":"Galice","sequence":"first","affiliation":[]},{"given":"Marine","family":"Minier","sequence":"additional","affiliation":[]},{"given":"St\u00e9phane","family":"Ub\u00e9da","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"The First International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2002, July 15\u201319, 2002, Bologna, Italy, Proceedings. ACM, 2002."},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Matt Blaze, Joan Feigenbaum, John Ioannidis, and Angelos D. Keromytis. The KeyNote Trust-Management System Version 2 \u2014 RFC 2704. RFC 2704, Available from http:\/\/www.faqs.org\/rfcs\/rfc2704.html , September 1999.","DOI":"10.17487\/rfc2704"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Matt Blaze, Joan Feigenbaum, and Angelos D. Keromytis. The role of trust management in distributed systems security. In Jan Vitek and Christian Damsgaard Jensen, editors, Secure Internet Programming, volume 1603 of Lecture Notes in Computer Science, pages 185\u2013210. Springer, 1999.","DOI":"10.1007\/3-540-48749-2_8"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In IEEE Symposium on Security and Privacy, pages 164\u2013173. IEEE Computer Society, 1996.","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Dan Boneh and Matthew K. Franklin. Identity-based encryption from the weil pairing. In Advances in Cryptology \u2014 Crypto\u2019 2001, volume 2139 of Lecture Notes in Computer Science, pages 213\u2013229. Springer, 2001.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Licia Capra. Engineering human trust in mobile system collaborations. In Richard N. Taylor and Matthew B. Dwyer, editors, SIGSOFT FSE, pages 107\u2013116. ACM, 2004.","DOI":"10.1145\/1029894.1029912"},{"key":"12_CR7","unstructured":"Xiofeng Chen, Fangguo Zhang, and Kwandjo Kim. A new ID-based group signature scheme from bilinear pairings. In Information Security Applications, 4th International Workshop \u2014 WISA\u2019 03, volume 2908 of Lecture Notes in Computer Science, pages 585\u2013592. Springer-Verlag, 2003."},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Samuel Galice, Marine Minier, John Mullins, and St\u00e9phane Ub\u00e9da. Cryptographic protocol to establish trusted history of interactions. In Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, page LNCS 4357, September 2006.","DOI":"10.1007\/11964254_13"},{"key":"12_CR9","unstructured":"Diego Gambetta. Can we trust trust? In Diego Gambetta, editor, Trust: Making and Breaking Cooperative Relatioins, chapter 13, pages 213\u2013237. Published Online, 2000."},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Tyrone Grandison and Morris Sloman. A survey of trust in internet applications. IEEE Communications Surveys and Tutorials, 3(4), 2000.","DOI":"10.1109\/COMST.2000.5340804"},{"issue":"3","key":"12_CR11","first-page":"77","volume":"2","author":"R. Khare","year":"1997","unstructured":"Rohit Khare and Adam Rifkin. Weaving a Web of trust. issue of the World Wide Web Journal (Volume 2, Number 3, Pages 77\u2013112), Summer 1997.","journal-title":"Weaving a Web of trust. issue of the World Wide Web Journal"},{"key":"12_CR12","unstructured":"V\u00e9ronique Legrand, Dana Hooshmand, and St\u00e9phane Ub\u00e9da. Trusted ambient community for self-securing hybrid networks. Research Report 5027, INRIA, 2003."},{"key":"12_CR13","unstructured":"Filip Perich, Jeffrey Undercoffer, Lalana Kagal, Anupam Joshi, Timothy Finin, and Yelena Yesha. In reputation we believe: Query processing in mobile ad-hoc networks. mobiquitous, 00:326\u2013334, 2004."},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Josep M. Pujol, Ramon Sang\u00fcesa, and Jordi Delgado. Extracting reputation in multi agent systems by means of social network topology. In AAMAS [1], pages 467\u2013474.","DOI":"10.1145\/544741.544853"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Daniele Quercia, Stephen Hailes, and Licia Capra. Tata: Towards anonymous trusted authentication. In Ketil St\u00f8len, William H. Winsborough, Fabio Martinelli, and Fabio Massacci, editors, iTrust, volume 3986 of Lecture Notes in Computer Science, pages 313\u2013323. Springer, 2006.","DOI":"10.1007\/11755593_23"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Jordi Sabater and Carles Sierra. Regret: reputation in gregarious societies. In Agents, pages 194\u2013195, 2001.","DOI":"10.1145\/375735.376110"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Jordi Sabater and Carles Sierra. Reputation and social network analysis in multiagent systems. In AAMAS [1], pages 475\u2013482.","DOI":"10.1145\/544741.544854"},{"key":"12_CR18","unstructured":"Girish Suryanarayana and Richard N. Taylor. A survey of trust management and resource discovery technologies in peer-to-peer applications."}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T20:38:30Z","timestamp":1737578310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_12","relation":{},"subject":[]}}