{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:30:33Z","timestamp":1725496233293},"publisher-location":"Boston, MA","reference-count":13,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_3","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T06:41:46Z","timestamp":1195800106000},"page":"31-45","source":"Crossref","is-referenced-by-count":2,"title":["Trust without Truth"],"prefix":"10.1007","author":[{"given":"Michel","family":"Deriaz","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Website: http:\/\/www.google.com\/gmm\/"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"M. Deriaz and J.-M. Seigneur, \u201cTrust and Security in Spatial Messaging: FoxyTag, the Speed Camera Case Study\u201d, in Proceedings of the 3rd International Conference on Privacy, Security and Trust, ACM, 2006.","DOI":"10.1145\/1501434.1501459"},{"key":"3_CR3","unstructured":"N. Dimmock, \u201cUsing trust and risk for access control in Global Computing\u201d, PhD thesis, University of Cambridge, 2005."},{"key":"3_CR4","unstructured":"Website: http:\/\/secure.dsg.cs.tcd.ie\/"},{"key":"3_CR5","unstructured":"R. Guha, \u201cOpen Rating Systems\u201d, 1st Workshop on Friend of a Friend, Social Networking and the Semantic Web, 2004."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"N. Mezzetti, \u201cA Socially Inspired Reputation Model\u201d, in Proceedings of EuroPKI, 2004.","DOI":"10.1007\/978-3-540-25980-0_16"},{"key":"3_CR7","unstructured":"M. Deriaz, \u201cWhat is Trust? My Own Point of View\u201d, ASG technical report, 2006."},{"key":"3_CR8","unstructured":"S. Buchegger and J.-Y. Le Boudec, \u201cA Robust Reputation System for P2P and Mobile Ad-hoc Networks\u201d, in Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems, 2004."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"D. Quercia, S. Hailes, and L. Capra, \u201cB-trust: Bayesian Trust Framework for Pervasive Computing\u201d, in Proceedings of the 4th International Conference on Trust Management (iTrust), LNCS, Springer, 2006.","DOI":"10.1007\/11755593_22"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"J. Burrell and G.K. Gay, \u201cE-graffiti: evaluating real-world use of a contextaware system\u201d, in Interacting with Computers, 14(4) p. 301\u2013312.","DOI":"10.1016\/S0953-5438(02)00010-3"},{"key":"3_CR11","unstructured":"P. Persson, F. Espinoza, P. Fagerberg, A. Sandin, and R. C\u00f6ster, \u201cGeoNotes: A Location-based Information System for Public Spaces\u201d, in H\u00f6\u00f6k, Benyon, and Munro (eds.), Readings in Social Navigation of Information Space, Springer (2000)."},{"key":"3_CR12","unstructured":"Website: http:\/\/www.foxytag.com"},{"key":"3_CR13","unstructured":"M. Deriaz and J.-M. Seigneur, \u201cFoxyTag\u201d, ASG technical report, 2006."}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:12:47Z","timestamp":1619669567000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_3","relation":{},"subject":[]}}