{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:10:44Z","timestamp":1748751044901,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319248035"},{"type":"electronic","value":"9783319248042"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24804-2_6","type":"book-chapter","created":{"date-parts":[[2015,11,14]],"date-time":"2015-11-14T09:32:43Z","timestamp":1447493563000},"page":"77-93","source":"Crossref","is-referenced-by-count":5,"title":["Incorporating Mitigating Circumstances into Reputation Assessment"],"prefix":"10.1007","author":[{"given":"Simon","family":"Miles","sequence":"first","affiliation":[]},{"given":"Nathan","family":"Griffiths","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,15]]},"reference":[{"key":"6_CR1","unstructured":"Burnett, C., Norman, T.J., Sycara, K.: Bootstrapping trust evaluations through stereotypes. In: Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems, pp. 241\u2013248 (2010)"},{"key":"6_CR2","unstructured":"Burnett, C., Norman, T.J., Sycara, K.: Trust decision-making in multi-agent systems. In: Proceedings of the 22nd International Joint Conference on Artificial Intelligence, pp. 115\u2013120 (2011)"},{"issue":"4","key":"6_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MIS.2013.53","volume":"29","author":"C Burnett","year":"2014","unstructured":"Burnett, C., Norman, T.J., Sycara, K., Oren, N.: Supporting trust assessment and decision-making in coalitions. IEEE Intell. Syst. 29(4), 18\u201324 (2014)","journal-title":"IEEE Intell. Syst."},{"key":"6_CR4","unstructured":"Burnett, C., Oren, N.: Sub-delegation and trust. In: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, pp. 1359\u20131360 (2012)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-540-85259-9_6","volume-title":"Secure Data Management","author":"C Dai","year":"2008","unstructured":"Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: An approach to evaluate data trustworthiness based on data provenance. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2008. LNCS, vol. 5159, pp. 82\u201398. Springer, Heidelberg (2008)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Griffiths, N., Miles, S.: An architecture for justified assessments of service provider reputation. In: Proceedings of the 10th IEEE International Conference on e-Business Engineering, pp. 345\u2013352 (2013)","DOI":"10.1109\/ICEBE.2013.53"},{"issue":"2","key":"6_CR7","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10458-005-6825-4","volume":"13","author":"TD Huynh","year":"2006","unstructured":"Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. J. Auton. Agent. Multi Agent Syst. 13(2), 119\u2013154 (2006)","journal-title":"J. Auton. Agent. Multi Agent Syst."},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"key":"6_CR9","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1613\/jair.301","volume":"4","author":"LP Kaelbling","year":"1996","unstructured":"Kaelbling, L.P., Littman, M.L., Moore, A.W.: Reinforcement learning: a survey. J. Artif. Intell. Res. 4, 237\u2013285 (1996)","journal-title":"J. Artif. Intell. Res."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Miles, S., Griffiths, N.: Accounting for circumstances in reputation assessment. In: Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (2015)","DOI":"10.1007\/978-3-319-24804-2_6"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10462-011-9277-z","volume":"40","author":"I Pinyol","year":"2013","unstructured":"Pinyol, I., Sabater-Mir, J.: Computational trust and reputation models for open multi-agent systems: a review. Artif. Intell. Rev. 40, 1\u201325 (2013)","journal-title":"Artif. Intell. Rev."},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Rajbhandari, S., Contes, A., Rana, O.F., et al.: Trust assessment using provenance in service oriented applications. In: Proceedings of the 10th IEEE International Enterprise Distributed Object Computing Conference Workshops, p. 65 (2006)","DOI":"10.1109\/EDOCW.2006.70"},{"issue":"9\u201310","key":"6_CR13","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1080\/08839510490509027","volume":"18","author":"J Sabater","year":"2004","unstructured":"Sabater, J.: Evaluating the ReGreT system. Appl. Artif. Intell. 18(9\u201310), 797\u2013813 (2004)","journal-title":"Appl. Artif. Intell."},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Sensoy, M., Yilmaz, B., Norman, T.J.: STAGE: stereotypical trust assessment through graph extraction. Comput. Intell. (2014)","DOI":"10.1111\/coin.12046"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.artint.2012.09.001","volume":"193","author":"WTL Teacy","year":"2012","unstructured":"Teacy, W.T.L., Luck, M., Rogers, A., Jennings, N.R.: An efficient and versatile approach to trust and reputation using hierarchical bayesian modelling. Artif. Intell. 193, 149\u2013185 (2012)","journal-title":"Artif. Intell."},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M.: Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model. In: Proceedings of the 4th International Conference on Autonomous Agents and Multiagent Systems, pp. 997\u20131004 (2005)","DOI":"10.1145\/1082473.1082624"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Townend, P., Webster, C., Venters, C., et al.: Personalised provenance reasoning models and risk assessment in business systems: a case study. In: Proceedings of the 7th IEEE International Symposium on Service Oriented System Engineering, pp. 329\u2013334 (2013)","DOI":"10.1109\/SOSE.2013.53"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Urbano, J., Roacha, A.P., Oliveira, E.: Refining the trustworthiness assessment of suppliers through extraction of stereotypes. In: Proceedings of the 12th International Conference on Enterprise Information Systems, pp. 85\u201392 (2010)","DOI":"10.5220\/0002908600850092"},{"key":"6_CR19","unstructured":"W3C. PROV model primer (2013). http:\/\/www.w3.org\/TR\/prov-primer\/"},{"key":"6_CR20","unstructured":"W3C. Sparql 1.1 overview (2013). http:\/\/www.w3.org\/TR\/sparql11-overview\/"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Wang, X., Govindan, K., Mohapatra, P.: Provenance-based information trustworthiness evaluation in multi-hop networks. In: Proceedings of the IEEE Global Telecommunications Conference, pp. 1\u20135 (2010)","DOI":"10.1109\/GLOCOM.2010.5684158"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Yu, B., Singh, M.P.: Searching social networks. In: Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multi Agent Systems, pp. 65\u201372 (2003)","DOI":"10.1145\/860575.860587"}],"container-title":["Communications in Computer and Information Science","Advances in Social Computing and Multiagent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24804-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T11:54:21Z","timestamp":1748692461000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24804-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319248035","9783319248042"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24804-2_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]}}}