{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T22:48:45Z","timestamp":1769813325734,"version":"3.49.0"},"publisher-location":"Boston, MA","reference-count":25,"publisher":"Springer US","isbn-type":[{"value":"9780387736549","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_2","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T06:41:46Z","timestamp":1195800106000},"page":"17-29","source":"Crossref","is-referenced-by-count":13,"title":["Trust Transfer in Distributed Systems"],"prefix":"10.1007","author":[{"given":"Changyu","family":"Dong","sequence":"first","affiliation":[]},{"given":"Giovanni","family":"Russello","sequence":"additional","affiliation":[]},{"given":"Naranker","family":"Dulay","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"M. Blaze, J. Feigenbaum, and J. Lacy (1996) Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, (Washington, DC, USA), p. 164, IEEE Computer Society.","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, and Y. Ravid (2000) Access control meets public key infrastructure, or: assigning roles to strangers. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, (Berkeley, CA), pp. 2\u201314.","DOI":"10.1109\/SECPRI.2000.848442"},{"key":"2_CR3","unstructured":"N. Li, J. C. Mitchell, and W. H. Winsborough (2002) Design of a role-based trust-management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, (Washington, DC, USA), p. 114, IEEE Computer Society."},{"issue":"2","key":"2_CR4","first-page":"139","volume":"4","author":"A. J\u00f8sang","year":"2006","unstructured":"A. J\u00f8sang, E. Gray, and M. Kinateder (2006) Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems, 4(2):139\u2013161.","journal-title":"Web Intelligence and Agent Systems"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"A. Abdul-Rahman and S. Hailes (1997) A distributed trust model. In: Proceedings of the 1997 workshop on New security paradigms, (New York, NY, USA), pp. 48\u201360, ACM Press.","DOI":"10.1145\/283699.283739"},{"key":"2_CR6","unstructured":"B. Yu, M. P. Singh, and K. Sycara (2004) Developing trust in large-scale peer-to-peer systems. in: Proceedings of IEEE First Symposium on Multi-Agent Security and Survivability, pp. 1\u201310."},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"C. M. Jonker and J. Treur (1999) Formal analysis of models for the dynamics of trust based on experiences. In F. J. Garijo and M. Boman (eds), vol. 1647 of Lecture Notes in Computer Science, pp. 221\u2013231, Springer.","DOI":"10.1007\/3-540-48437-X_18"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"A. Birk (2000) Learning to trust. In: R. Falcone, M. P. Singh, and Y.-H. Tan (eds), vol. 2246 of Lecture Notes in Computer Science, pp. 133\u2013144, Springer.","DOI":"10.1007\/3-540-45547-7_8"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"B. Christianson and W. S. Harbison (1997) Why isn\u2019t trust transitive? In: Proceedings of the International Workshop on Security Protocols, (London, UK), pp. 171\u2013176, Springer-Verlag.","DOI":"10.1007\/3-540-62494-5_16"},{"key":"2_CR10","unstructured":"E. Gerck (1998) Toward real-world models of trust. http:\/\/www.safevote.com\/papers\/trustdef.htm."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"T. Grandison (2003) Trust Management for Internet Applications. PhD thesis, Imperial College London.","DOI":"10.1007\/3-540-44875-6_7"},{"key":"2_CR12","unstructured":"A. J\u00f8sang and S. Pope (2005) Semantic constraints for trust transitivity. In: S. Hartmann and M. Stumptner (eds), vol. 43 of CRPIT, pp. 59\u201368, Australian Computer Society."},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"C. Castelfranchi and R. Falcone (1998) Principles of trust for mas: Cognitive anatomy, social importance, and quantification. In: ICMAS, pp. 72\u201379, IEEE Computer Society.","DOI":"10.1109\/ICMAS.1998.699034"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"P. V. Rangan (1988) An axiomatic basis of trust in distributed systems. In: Proceedings of the 1988 IEEE Symposium on Security and Privacy, pp. 204\u2013211, IEEE Computer Society.","DOI":"10.1109\/SECPRI.1988.8112"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"M. Abadi and M. R. Tuttle (1991) A semantics for a logic of authentication (extended abstract). In: PODC, pp. 201\u2013216.","DOI":"10.1145\/112600.112618"},{"key":"2_CR16","unstructured":"J. Hintikka (1962) Knowledge and Belief. Cornell University Press."},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"W. van der Hoek (1990) Systems for knowledge and beliefs. In: J. van Eijck (ed), vol. 478 of Lecture Notes in Computer Science, pp. 267\u2013281, Springer.","DOI":"10.1007\/BFb0018447"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"N. Friedman and J. Y. Halpern (1994) A knowledge-based framework for belief change, part I: Foundations. In: R. Fagin (ed), TARK, pp. 44\u201364, Morgan Kaufmann.","DOI":"10.1016\/B978-1-4832-1453-5.50007-6"},{"key":"2_CR19","first-page":"83","volume":"16","author":"S. Kripke","year":"1963","unstructured":"S. Kripke (1963) Semantical considerations on modal logic. Acta Philosophica Fennica, 16:83\u201394.","journal-title":"Acta Philosophica Fennica"},{"key":"2_CR20","unstructured":"A. J\u00f8sang (1999) An algebra for assessing trust in certification chains. In: NDSS 99, The Internet Society."},{"key":"2_CR21","unstructured":"A. J\u00f8sang, E. Gray, and M. Kinateder (2003) Analysing Topologies of Transitive Trust. In: T. Dimitrakos and F. Martinelli (eds) Proceedings of the First International Workshop on Formal Aspects in Security and Trust, (Pisa, Italy), pp. 9\u201322."},{"key":"2_CR22","unstructured":"B. F. Chellas (1988) Modal logic: an introduction. Cambridge University Press."},{"issue":"1","key":"2_CR23","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/S0004-3702(03)00063-8","volume":"149","author":"C.-J. Liau","year":"2003","unstructured":"C.-J. Liau (2003) Belief, information acquisition, and trust in multi-agent systems-a modal logic formulation. In: Artif. Intell., 149(1):31\u201360.","journal-title":"Artif. Intell."},{"key":"2_CR24","unstructured":"The CareGrid project. http:\/\/www.caregrid.org."},{"key":"2_CR25","unstructured":"The Ponder2 project. http:\/\/www.ponder2.net."}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T20:38:26Z","timestamp":1737578306000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_2","relation":{},"subject":[]}}