{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T07:29:24Z","timestamp":1773300564517,"version":"3.50.1"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030397487","type":"print"},{"value":"9783030397494","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-39749-4_1","type":"book-chapter","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T18:03:07Z","timestamp":1579888987000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Logics to Reason Formally About Trust Computation and Manipulation"],"prefix":"10.1007","author":[{"given":"Alessandro","family":"Aldini","sequence":"first","affiliation":[]},{"given":"Mirko","family":"Tagliaferri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,25]]},"reference":[{"issue":"16","key":"1_CR1","doi-asserted-by":"publisher","first-page":"2933","DOI":"10.1002\/sec.1220","volume":"8","author":"A Aldini","year":"2015","unstructured":"Aldini, A.: Modeling and verification of trust and reputation systems. J. Secur. Commun. Netw. 8(16), 2933\u20132946 (2015)","journal-title":"J. Secur. Commun. Netw."},{"issue":"2","key":"1_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3155337","volume":"28","author":"Alessandro Aldini","year":"2018","unstructured":"Aldini, A.: Design and verification of trusted collective adaptive systems. Trans. Model. Comput. Simul. (TOMACS) 28(2), Article no. 9 (2018). https:\/\/doi.org\/10.1145\/3155337","journal-title":"ACM Transactions on Modeling and Computer Simulation"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Alexopoulos, N., Daubert, J., M\u00fchlh\u00e4user, M., Habib, S.M.: Beyond the hype: on using blockchains in trust management for authentication. In: IEEE Trustcom\/BigDataSE\/ICESS, pp. 546\u2013553. IEEE (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.283"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"10817","DOI":"10.1007\/s10586-017-1181-0","volume":"22","author":"A Anakath","year":"2019","unstructured":"Anakath, A., Rajakumar, S., Ambika, S.: Privacy preserving multi factor authentication using trust management. Clust. Comput. 22, 10817\u201310823 (2019)","journal-title":"Clust. Comput."},{"key":"1_CR5","volume-title":"The Logic and Limits of Trust","author":"B Barber","year":"1983","unstructured":"Barber, B.: The Logic and Limits of Trust. Rutgers University Press, New Brunswick (1983)"},{"key":"1_CR6","first-page":"31","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"P Bateson","year":"1988","unstructured":"Bateson, P.: The biological evolution of cooperation and trust. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 31\u201348. Blackwell, New York (1988)"},{"key":"1_CR7","first-page":"97","volume":"9","author":"J van Benthem","year":"2012","unstructured":"van Benthem, J., Fern\u00e1ndez-Duque, D., Pacuit, E.: Evidence logic: a new look at neighborhood structures. Adv. Modal Log. 9, 97\u2013118 (2012)","journal-title":"Adv. Modal Log."},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-29963-6_1","volume-title":"Security and Trust Management","author":"B Solhaug","year":"2012","unstructured":"Solhaug, B., St\u00f8len, K.: Uncertainty, subjectivity, trust and risk: how it all fits together. In: Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. LNCS, vol. 7170, pp. 1\u20135. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29963-6_1"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/3-540-48749-2_8","volume-title":"Secure Internet Programming","author":"M Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The role of trust management in distributed systems security. In: Vitek, J., Jensen, C.D. (eds.) Secure Internet Programming. LNCS, vol. 1603, pp. 185\u2013210. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48749-2_8"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Castelfranchi, C., Falcone, R.: Principles of trust for MAS: cognitive anatomy, social importance, and quantification. In: International Conference on Multi Agent Systems (ICMAS), pp. 72\u201379. IEEE (1988)","DOI":"10.1109\/ICMAS.1998.699034"},{"issue":"3","key":"1_CR11","doi-asserted-by":"publisher","first-page":"9:1","DOI":"10.1145\/1380584.1380587","volume":"40","author":"PC Chapin","year":"2008","unstructured":"Chapin, P.C., Skalka, C., Wang, X.S.: Authorization in trust management: features and foundations. Comput. Surv. 40(3), 9:1\u20139:48 (2008)","journal-title":"Comput. Surv."},{"key":"1_CR12","volume-title":"Foundations of Social Theory","author":"J Coleman","year":"1990","unstructured":"Coleman, J.: Foundations of Social Theory. Harvard University Press, Cambridge (1990)"},{"key":"1_CR13","first-page":"49","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"P Dasgupta","year":"1988","unstructured":"Dasgupta, P.: Trust as a commodity. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 49\u201372. Blackwell, New York (1988)"},{"key":"1_CR14","unstructured":"Drawel, N., Bentahar, J., Laarej, A.: Verifying temporal trust logic using CTL model checking. In: 20th International Workshop on Trust in Agent Societies. CEUR-WS (2018)"},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1162\/JEEA.2009.7.2-3.235","volume":"7","author":"E Fehr","year":"2009","unstructured":"Fehr, E.: On the economics and biology of trust. J. Eur. Econ. Assoc. 7, 235\u2013266 (2009)","journal-title":"J. Eur. Econ. Assoc."},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1177\/0032329293021004006","volume":"21","author":"R Hardin","year":"1993","unstructured":"Hardin, R.: The street-level epistemology of trust. Polit. Soc. 21, 505\u2013529 (1993)","journal-title":"Polit. Soc."},{"key":"1_CR17","volume-title":"Trust and Trustworthiness","author":"R Hardin","year":"2002","unstructured":"Hardin, R.: Trust and Trustworthiness. Russell Sage Foundation, New York (2002)"},{"issue":"1","key":"1_CR18","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1093\/jigpal\/jzp077","volume":"18","author":"A Herzig","year":"2010","unstructured":"Herzig, A., H\u00fcbner, J.F., Lorini, E., Vercouter, L.: A logic of trust and reputation. Log. J. IGPL 18(1), 214\u2013244 (2010)","journal-title":"Log. J. IGPL"},{"issue":"5","key":"1_CR19","first-page":"362","volume":"5","author":"A Husseini","year":"2011","unstructured":"Husseini, A., M\u2019Hamed, A., ElHassan, B.A., Mokhtaari, M.: A novel trust-based authentication scheme for low-resource devices in smart environments. Pers. Ubiquit. Comput. 5(5), 362\u2013369 (2011)","journal-title":"Pers. Ubiquit. Comput."},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-540-74810-6_8","volume-title":"Foundations of Security Analysis and Design IV","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A.: Trust and reputation systems. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2006-2007. LNCS, vol. 4677, pp. 209\u2013245. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74810-6_8"},{"key":"1_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42337-1","volume-title":"Subjective Logic","author":"A J\u00f8sang","year":"2016","unstructured":"J\u00f8sang, A.: Subjective Logic. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-42337-1"},{"issue":"2","key":"1_CR22","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"issue":"5","key":"1_CR23","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MITP.2017.3680960","volume":"19","author":"H Kim","year":"2017","unstructured":"Kim, H., Lee, E.A.: Authentication and authorization for the Internet of Things. IEEE IT Prof. 19(5), 27\u201333 (2017)","journal-title":"IEEE IT Prof."},{"key":"1_CR24","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/0-387-24098-5_9","volume-title":"Formal Aspects in Security and Trust","author":"H Koshutanski","year":"2005","unstructured":"Koshutanski, H., Massacci, F.: An interactive trust management and negotiation scheme. In: Dimitrakos, T., Martinelli, F. (eds.) Formal Aspects in Security and Trust. IIFIP, vol. 173, pp. 115\u2013128. Springer, Boston (2005). https:\/\/doi.org\/10.1007\/0-387-24098-5_9"},{"key":"1_CR25","first-page":"77","volume-title":"Trust and Governance","author":"M Levi","year":"1998","unstructured":"Levi, M.: A state of trust. In: Braithwaite, V., Levi, M., Cook, K., Hardin, R. (eds.) Trust and Governance, pp. 77\u2013101. Russell Sage Foundation, New York (1998)"},{"key":"1_CR26","volume-title":"Trust and Power","author":"N Luhmann","year":"1979","unstructured":"Luhmann, N.: Trust and Power. Wiley, New York (1979)"},{"issue":"2","key":"1_CR27","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1108\/10662241111123739","volume":"21","author":"FG M\u00e1rmol","year":"2011","unstructured":"M\u00e1rmol, F.G., P\u00e9rez, G.M.: Trust and reputation models comparison. Internet Res. 21(2), 138\u2013153 (2011)","journal-title":"Internet Res."},{"key":"1_CR28","volume-title":"Formalising Trust as a Computational Concept","author":"S Marsh","year":"1994","unstructured":"Marsh, S.: Formalising Trust as a Computational Concept. University of Stirling, Scotland (1994)"},{"key":"1_CR29","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.comnet.2015.07.011","volume":"90","author":"H Mousa","year":"2015","unstructured":"Mousa, H., Mokhtar, S.B., Hasan, O., Younes, O., Hadhoud, M., Brunie, L.: Trust management and reputation systems in mobile participatory sensing applications: a survey. Comput. Netw. 90, 49\u201373 (2015)","journal-title":"Comput. Netw."},{"key":"1_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-19751-2_10","volume-title":"Formal Aspects of Security and Trust","author":"T Muller","year":"2011","unstructured":"Muller, T.: Semantics of trust. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 141\u2013156. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19751-2_10"},{"issue":"3","key":"1_CR31","first-page":"635","volume":"81","author":"H Nissenbaum","year":"2001","unstructured":"Nissenbaum, H.: Securing trust online: wisdom or oxymoron. Boston Univ. Law Rev. 81(3), 635\u2013664 (2001)","journal-title":"Boston Univ. Law Rev."},{"issue":"7","key":"1_CR32","doi-asserted-by":"publisher","first-page":"e3444","DOI":"10.1002\/dac.3444","volume":"31","author":"H Nunoo-Mensah","year":"2018","unstructured":"Nunoo-Mensah, H., Boateng, K.O., Gadze, J.D.: The adoption of socio- and bio-inspired algorithms for trust models in wireless sensor networks: a survey. Int. J. Commun. Syst. 31(7), e3444 (2018)","journal-title":"Int. J. Commun. Syst."},{"key":"1_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67149-9","volume-title":"Neighborhood Semantics for Modal Logic","author":"E Pacuit","year":"2017","unstructured":"Pacuit, E.: Neighborhood Semantics for Modal Logic. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67149-9"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Rasmusson, L., Jansson, S.: Simulated social control for secure Internet commerce. In: Proceedings of the Workshop on New Security Paradigms, pp. 18\u201325 (1996)","DOI":"10.1145\/304851.304857"},{"issue":"10","key":"1_CR35","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1111\/soc4.12391","volume":"10","author":"BG Robbins","year":"2016","unstructured":"Robbins, B.G.: What is trust? A multidisciplinary review, critique, and synthesis. Sociol. Compass 10(10), 972\u2013986 (2016)","journal-title":"Sociol. Compass"},{"key":"1_CR36","volume-title":"The Strategy of Conflict","author":"T Schelling","year":"1960","unstructured":"Schelling, T.: The Strategy of Conflict. Harvard University Press, Cambridge (1960)"},{"key":"1_CR37","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1007\/978-3-030-02053-8_157","volume-title":"Human Systems Engineering and Design","author":"J-M Seigneur","year":"2019","unstructured":"Seigneur, J.-M., Ahram, T., Taiar, R.: A survey on trust in augmented human technologies. In: Ahram, T., Karwowski, W., Taiar, R. (eds.) IHSED 2018. AISC, vol. 876, pp. 1033\u20131037. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-02053-8_157"},{"key":"1_CR38","unstructured":"Singh, M.P.: Trust as dependence: a logical approach. In: 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 863\u2013870 (2011)"},{"issue":"2","key":"1_CR39","first-page":"85","volume":"2","author":"S Singh","year":"2007","unstructured":"Singh, S., Bawa, S.: A privacy, trust and policy based authorization framework for services in distributed environments. Int. J. Comput. Sci. 2(2), 85\u201392 (2007)","journal-title":"Int. J. Comput. Sci."},{"key":"1_CR40","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-319-95276-5_8","volume-title":"Trust Management XII","author":"M Tagliaferri","year":"2018","unstructured":"Tagliaferri, M., Aldini, A.: From knowledge to trust: a logical framework for pre-trust computations. In: Gal-Oz, N., Lewis, P.R. (eds.) IFIPTM 2018. IAICT, vol. 528, pp. 107\u2013123. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95276-5_8"},{"key":"1_CR41","unstructured":"Tagliaferri, M., Aldini, A.: A taxonomy of computational models for trust computing in decision-making procedures. In: 17th European Conference on Cyber Warfare and Security (ECCWS), pp. 571\u2013578. ACPI (2018)"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Tagliaferri, M., Aldini, A.: A trust logic for pre-trust computations. In: 21th International Conference on Information Fusion (FUSION). IEEE (2018)","DOI":"10.23919\/ICIF.2018.8455621"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Tagliaferri, M., Aldini, A.: A trust logic for the varieties of trust. In: Camara, J., Steffen, M. (eds.) SEFM 2019. LNCS. Springer (2019, to appear)","DOI":"10.1007\/978-3-030-57506-9_10"},{"issue":"1","key":"1_CR44","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1086\/406755","volume":"46","author":"RL Trivers","year":"1971","unstructured":"Trivers, R.L.: The evolution of reciprocal altruism. Q. Rev. Biol. 46(1), 35\u201357 (1971)","journal-title":"Q. Rev. Biol."},{"key":"1_CR45","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195130614.001.0001","volume-title":"Natural Selection and Social Theory: Selected Papers of Robert Trivers","author":"RL Trivers","year":"2002","unstructured":"Trivers, R.L.: Natural Selection and Social Theory: Selected Papers of Robert Trivers. Oxford University Press, New York (2002)"},{"key":"1_CR46","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-319-22261-5_4","volume-title":"Interdisciplinary Perspectives on Trust","author":"EM Uslaner","year":"2016","unstructured":"Uslaner, E.M.: Who do you trust? In: Shockley, E., Neal, T.M.S., PytlikZillig, L.M., Bornstein, B.H. (eds.) Interdisciplinary Perspectives on Trust, pp. 71\u201383. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-22261-5_4"},{"issue":"2","key":"1_CR47","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1086\/467284","volume":"36","author":"O Williamson","year":"1993","unstructured":"Williamson, O.: Calculativeness, trust, and economic organization. J. Law Econ. 36(2), 453\u2013486 (1993)","journal-title":"J. Law Econ."},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"Yu, B., Singh, M.P.: Detecting deception in reputation management. In: 2nd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 73\u201380. ACM (2003)","DOI":"10.1145\/860575.860588"},{"key":"1_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-540-88313-5_19","volume-title":"Computer Security - ESORICS 2008","author":"CC Zhang","year":"2008","unstructured":"Zhang, C.C., Winslett, M.: Distributed authorization by multiparty trust negotiation. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 282\u2013299. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88313-5_19"}],"container-title":["Lecture Notes in Computer Science","Emerging Technologies for Authorization and Authentication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-39749-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T23:03:31Z","timestamp":1737673411000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-39749-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030397487","9783030397494"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-39749-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ETAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Emerging Technologies for Authorization and Authentication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"etaa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iit.cnr.it\/etaa2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}