{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:26:56Z","timestamp":1761611216086},"publisher-location":"Boston, MA","reference-count":23,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_19","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T01:41:46Z","timestamp":1195782106000},"page":"285-300","source":"Crossref","is-referenced-by-count":22,"title":["A Trust Model for an Open, Decentralized Reputation System"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Gutscher","sequence":"first","affiliation":[]}],"member":"297","reference":[{"unstructured":"Ashley, J.M., Copeland, M., Grahn, J., Wheeler, D.A.: The GNU Privacy Handbook. The Free Software Foundation. (1999)","key":"19_CR1"},{"doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. In: Decision Support Systems. (2007)","key":"19_CR2","DOI":"10.1016\/j.dss.2005.05.019"},{"doi-asserted-by":"crossref","unstructured":"Grandison, T., Sloman, M.: A survey of trust in internet application. IEEE Communications Surveys & Tutorials 3(4) (2000)","key":"19_CR3","DOI":"10.1109\/COMST.2000.5340804"},{"unstructured":"Good, N., Schafer, J.B., Konstan, J.A., Borchers, A., Sarwar, B., Herlocker, J., Riedl, J.: Combining collaborative filtering with personal agents for better recommendations. In: Proceedings of the Sixteenth National Conference on Artificial Intelligence. (1999) 439\u2013446","key":"19_CR4"},{"unstructured":"Suryanarayana, G., Taylor, R.N.: A survey of trust management and resource discovery technologies in peer-to-peer applications. Technical Report UCI-ISR-04-6, Institute for Software Research, University of California (2004)","key":"19_CR5"},{"doi-asserted-by":"crossref","unstructured":"Demolombe, R.: Reasoning about trust: A formal logical framework. In: Proceedings of the Second International Conference of Trust Management (iTrust 2004). (2004) 291\u2013303","key":"19_CR6","DOI":"10.1007\/978-3-540-24747-0_22"},{"unstructured":"Marsh, S., Dibben, M.R.: Trust, Untrust, Distrust and Mistrust \u2014An Exploration of the Dark(er) Side. In Herrmann, P., Issarny, V., Shiu, S., eds.: Proceedings of Third iTrust International Conference (iTrust 2005), Paris, France, May 23\u201326, 2005. Volume 3477., Springer (May 2005) 17\u201333","key":"19_CR7"},{"doi-asserted-by":"crossref","unstructured":"Vasalou, A., Pitt, J.: Reinventing forgiveness: A formal investigation of moral facilitation. In: Proceedings of the Third International Conference of Trust Management (iTrust 2005). (2005) 146\u2013160","key":"19_CR8","DOI":"10.1007\/11429760_11"},{"doi-asserted-by":"crossref","unstructured":"Jonker, C.M., Schalken, J.J.P., Theeuwes, J., Treur, J.: Human experiments in trust dynamics. In: Proceedings of the Second International Conference of Trust Management (iTrust 2004). (2004) 206\u2013220","key":"19_CR9","DOI":"10.1007\/978-3-540-24747-0_16"},{"unstructured":"Marsh, S.P.: Formalising Trust as a Computational Concept. PhD thesis, Department of Mathematics and Computer Science, University of Stirling (1994)","key":"19_CR10"},{"doi-asserted-by":"crossref","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton Univ. Press (1976)","key":"19_CR11","DOI":"10.1515\/9780691214696"},{"doi-asserted-by":"crossref","unstructured":"Sentz, K., Ferson, S.: Combination of Evidence in Dempster-Shafer Theory (2002)","key":"19_CR12","DOI":"10.2172\/800792"},{"doi-asserted-by":"crossref","unstructured":"Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Networks. In: Proceedings 3rd European Symposium on Research in Computer Security (ESORICS) 1994, Springer-Verlag (1994) 3\u201318","key":"19_CR13","DOI":"10.1007\/3-540-58618-0_53"},{"unstructured":"J\u00f8sang, A.: Artificial Reasoning with Subjective Logic (1997)","key":"19_CR14"},{"unstructured":"J\u00f8sang, A., Knapskog, S.: A Metric for Trusted Systems. In: Proceedings 21st National Security Conference 1998. (1998)","key":"19_CR15"},{"unstructured":"J\u00f8sang, A., Gray, E., Kinateder, M.: Simplification and analysis of transitive trust networks. In: Web Intelligence and Agent Systems Journal. (2006) 139\u2013161","key":"19_CR16"},{"doi-asserted-by":"crossref","unstructured":"Kohlas, R., Maurer, U.: Confidence Valuation in a Public-key Infrastructure Based on Uncertain Evidence. In: In the proceedings of Public Key Cryptography 2000. Volume 1751 of Lecture Notes in Computer Science. (January 2000) 93\u2013112","key":"19_CR17","DOI":"10.1007\/978-3-540-46588-1_8"},{"doi-asserted-by":"crossref","unstructured":"Maurer, U.: Modelling a Public-Key Infrastructure. In Bertino, E., ed.: Proc. 1996 European Symposium on Research in Computer Security (ESORICS\u2019 96). Volume 1146 of Lecture Notes in Computer Science., Springer-Verlag (1996) 325\u2013350","key":"19_CR18","DOI":"10.1007\/3-540-61770-1_45"},{"doi-asserted-by":"crossref","unstructured":"Reiter, M.K., Stubblebine, S.: Toward acceptable metrics of authentication. In: Proceedings of IEEE Symposium on Security and Privacy. (1997) 10\u201320","key":"19_CR19","DOI":"10.1109\/SECPRI.1997.601308"},{"issue":"2","key":"19_CR20","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","volume":"24","author":"Y.L. Sun","year":"2006","unstructured":"Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. In: IEEE Journal on Selected Areas in Communications, Volume 24, Issue 2. (Feb 2006) 305\u2013317","journal-title":"IEEE Journal on Selected Areas in Communications"},{"unstructured":"Langheinrich, M.: When Trust Does Not Compute The Role of Trust in Ubiquitous Computing. Workshop on Privacy at Ubicomp 2003 (October 2003)","key":"19_CR21"},{"unstructured":"Gambetta, D. In: Can We Trust Trust? Basil Blackwell (1988) 213\u2013237 Reprinted in electronic edition from Department of Sociology, University of Oxford, chapter 13, pp. 213-237.","key":"19_CR22"},{"unstructured":"J\u00f8sang, A., Gray, E., Kinateder, M.: Analysing Topologies of Transitive Trust. In Dimitrakos, T., Martinelli, F., eds.: Proceedings of the First International Workshop on Formal Aspects in Security & Trust (FAST2003), Pisa, Italy (September 2003) 9\u201322","key":"19_CR23"}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,28]],"date-time":"2021-08-28T17:21:11Z","timestamp":1630171271000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_19","relation":{},"subject":[]}}