{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T22:40:05Z","timestamp":1748990405248,"version":"3.41.0"},"publisher-location":"Cham","reference-count":67,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319291994"},{"type":"electronic","value":"9783319292014"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29201-4_4","type":"book-chapter","created":{"date-parts":[[2016,6,20]],"date-time":"2016-06-20T11:27:56Z","timestamp":1466422076000},"page":"89-126","source":"Crossref","is-referenced-by-count":6,"title":["Normative Control: Controlling Open Distributed Systems with Autonomous Entities"],"prefix":"10.1007","author":[{"given":"Jan","family":"Kantert","sequence":"first","affiliation":[]},{"given":"Sarah","family":"Edenhofer","sequence":"additional","affiliation":[]},{"given":"Sven","family":"Tomforde","sequence":"additional","affiliation":[]},{"given":"J\u00f6rg","family":"H\u00e4hner","sequence":"additional","affiliation":[]},{"given":"Christian","family":"M\u00fcller-Schloer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,21]]},"reference":[{"key":"4_CR1","isbn-type":"print","volume-title":"Agent technology: foundations, applications, and markets","author":"M.J. Wooldridge","year":"1998","unstructured":"Wooldridge, M.J.: Agent technology: foundations, applications, and markets. Springer, Berlin\/Heidelberg\/New York (1998). ISBN:3-540-63591-2","ISBN":"https:\/\/id.crossref.org\/isbn\/3540635912"},{"unstructured":"Tomforde, S., H\u00e4hner, J., Seebach, H., Reif, W., Sick, B., Wacker, A., Scholtes, I.: Engineering and mastering interwoven systems. In: ARCS 2014 \u2013 27th International Conference on Architecture of Computing Systems, Workshop Proceedings, Luebeck, University of Luebeck, Institute of Computer Engineering, 25\u201328 Feb 2014, pp.\u00a01\u20138 (2014). http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6775093","key":"4_CR2"},{"doi-asserted-by":"crossref","unstructured":"Kantert, J., Wildemann, S., von Zengen, G., Edenhofer, S., Tomforde, S., Wolf, L., H\u00e4hner, J., M\u00fcller-Schloer, C.: Improving reliability and endurance using end-to-end trust in distributed low-power sensor networks. In: Pinho, L., Karl, W., Cohen, A., Brinkschulte, U. (eds.) Proceedings of the 28th International Conference on Architecture of Computing Systems (ARCS 2015), vol.\u00a09017, pp.\u00a0135\u2013145. Springer (2015). ISBN:978-3-319-16085-6","key":"4_CR3","DOI":"10.1007\/978-3-319-16086-3_11"},{"doi-asserted-by":"crossref","unstructured":"Kantert, J., Edenhofer, S., Tomforde, S., M\u00fcller-Schloer, C.: Distributed rendering in an open self-organised trusted desktop grid. In: ICAC 2015, pp.\u00a0267\u2013272. IEEE, Grenobles (2015)","key":"4_CR4","DOI":"10.1109\/ICAC.2015.66"},{"doi-asserted-by":"crossref","unstructured":"Bernard, Y., Klejnowski, L., H\u00e4hner, J., M\u00fcller-Schloer, C.: Towards trust in desktop grid systems. In: Proceedings of CCGrid 2010, Melbourne, pp.\u00a0637\u2013642 (2010)","key":"4_CR5","DOI":"10.1109\/CCGRID.2010.73"},{"doi-asserted-by":"crossref","unstructured":"Castelfranchi, C., Falcone, R.: Trust Theory: A Socio-Cognitive and Computational Model. Wiley, Chichester (2010). ISBN:0470028750, 9780470028759","key":"4_CR6","DOI":"10.1002\/9780470519851"},{"key":"4_CR7","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/978-3-0348-0130-0_21","volume-title":"Organic Computing \u2013 A Paradigm Shift for Complex Systems","author":"S. Tomforde","year":"2011","unstructured":"Tomforde, S., Prothmann, H., Branke, J., H\u00e4hner, J., Mnif, M., M\u00fcller-Schloer, C., Richter, U., Schmeck, H.: Observation and control of organic systems. In: M\u00fcller-Schloer, C., Schmeck, H., Ungerer, T. (eds.) Organic Computing \u2013 A Paradigm Shift for Complex Systems, pp.\u00a0325\u2013338. Birkh\u00e4user, Basel (2011)"},{"doi-asserted-by":"crossref","unstructured":"Pitt, J., Schaumeier, J., Artikis, A.: The axiomatisation of socio-economic principles for self-organising systems. In: 2011 Fifth IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO), pp.\u00a0138\u2013147. IEEE, Michigan (2011)","key":"4_CR8","DOI":"10.1109\/SASO.2011.25"},{"key":"4_CR9","volume-title":"Artificial Intelligence: A Modern Approach","author":"S. Russell","year":"1995","unstructured":"Russell, S., Norvig, P., Intelligence, A.: Artificial Intelligence: A Modern Approach, vol.\u00a025. Prentice-Hall, Egnlewood Cliffs (1995)"},{"key":"4_CR10","volume-title":"The Selfish Gene","author":"R. Dawkin","year":"1976","unstructured":"Dawkin, R.: The Selfish Gene. Oxford University Press, New York (1976)"},{"unstructured":"Osborne, M.J.: An Introduction to Game Theory. Oxford University Press (2003). ISBN:0195128958","key":"4_CR11"},{"unstructured":"Nash, J.F.: Non-cooperative games. PhD thesis, Princeton University (1950)","key":"4_CR12"},{"key":"4_CR13","volume-title":"The Origins of Fair Play","author":"K. Binmore","year":"2006","unstructured":"Binmore, K.: The Origins of Fair Play. Max Planck Institute of Economics, Evolutionary Economics Group (2006)"},{"key":"4_CR14","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1126\/science.162.3859.1243","volume":"162","author":"G. Hardin","year":"1968","unstructured":"Hardin, G.: The tragedy of the commons. Science 162, 1243\u20131248 (1968)","journal-title":"Science"},{"key":"4_CR15","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511807763","volume-title":"Governing the Commons: The Evolution of Institutions for Collective Action","author":"E. Ostrom","year":"1990","unstructured":"Ostrom, E.: Governing the Commons: The Evolution of Institutions for Collective Action. Cambridge University Press, Cambridge (1990)"},{"unstructured":"Klejnowski, L.: Trusted community: a novel multiagent organisation for open distributed systems. PhD thesis, Leibniz Universit\u00e4t Hannover (2014). http:\/\/edok01.tib.uni-hannover.de\/edoks\/e01dh11\/668667427.pdf","key":"4_CR16"},{"unstructured":"Schmeck, H., M\u00fcller-Schloer, C., \u00c7akar, E., Mnif, M., Richter, U.: Adaptivity and self-organization in organic computing systems. ACM Trans. Auton. Adapt. Syst. (TAAS) 5, 1\u201332 (2010). ISSN:1556-4665","key":"4_CR17"},{"unstructured":"Centeno, R., Billhardt, H.: Using incentive mechanisms for an adaptive regulation of open multi-agent systems. In: Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence, vol. 1, pp.\u00a0139\u2013145 Barcelona (2011)","key":"4_CR18"},{"unstructured":"Hermoso, R., Billhardt, H., Ossowski, S.: Role evolution in open multi-agent systems as an information source for trust. In: Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems, vol. 1, pp.\u00a0217\u2013224 Toronto (2010)","key":"4_CR19"},{"doi-asserted-by":"crossref","unstructured":"Centeno, R., Billhardt, H., Hermoso, R.: An adaptive sanctioning mechanism for open multi-agent systems regulated by norms. In: 2011 23rd IEEE International Conference on Tools with Artificial Intelligence (ICTAI), Boca Raton, pp.\u00a0523\u2013530 (2011)","key":"4_CR20","DOI":"10.1109\/ICTAI.2011.85"},{"doi-asserted-by":"crossref","unstructured":"Anglano, C., Canonico, M., Guazzone, M., Botta, M., Rabellino, S., Arena, S., Girardi, G.: Peer-to-peer desktop grids in the real world: the ShareGrid project. In: Proceedings of CC-Grid 2008, vol.\u00a08(4), pp.\u00a0609\u2013614 Lyon (2008)","key":"4_CR21","DOI":"10.1109\/CCGRID.2008.23"},{"doi-asserted-by":"crossref","unstructured":"Chakravarti, A.J., Baumgartner, G., Lauria, M.: Application-specific scheduling for the organic grid. In: Proceedings of GRID 2004 Workshops, pp.\u00a0146\u2013155. IEEE, Washington, DC (2004). ISBN:0-7695-2256-4","key":"4_CR22","DOI":"10.1109\/GRID.2004.11"},{"doi-asserted-by":"crossref","unstructured":"Anderson, D.P., Fedak, G.: The computational and storage potential of volunteer computing. In: Proceedings of CCGRID 2006, pp.\u00a073\u201380. IEEE, Singapore (2006). ISBN:0-7695-2585-7","key":"4_CR23","DOI":"10.1109\/CCGRID.2006.101"},{"key":"4_CR24","first-page":"1","volume":"96","author":"R. Jain","year":"1996","unstructured":"Jain, R., Babic, G., Nagendra, B., Lam, C.-C.: Fairness, call establishment latency and other performance metrics. ATM-Forum 96, 1\u20136 (1996)","journal-title":"ATM-Forum"},{"doi-asserted-by":"crossref","unstructured":"Demers, A., Keshav, S., Shenker, S.: Analysis and simulation of a fair queueing algorithm. In: Symposium Proceedings on Communications Architectures & Protocols, pp.\u00a01\u201312. ACM, New York (1989)","key":"4_CR25","DOI":"10.1145\/75246.75248"},{"doi-asserted-by":"crossref","unstructured":"Bennett, J.C., Zhang, H.: WF2Q: worst-case fair weighted fair queueing. In: INFOCOM \u201996. Fifteenth Annual Joint Conference of the IEEE Computer Societies. Networking the Next Generation. Proceedings IEEE, vol.\u00a01, pp.\u00a0120\u2013128. IEEE, San Francisco (1996)","key":"4_CR26","DOI":"10.1109\/INFCOM.1996.497885"},{"key":"4_CR27","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1017\/S0269888905000317","volume":"19","author":"B. Horling","year":"2004","unstructured":"Horling, B., Lesser, V.: A survey of multi-agent organizational paradigms. Knowl. Eng. Rev. 19, 281\u2013316 (2004)","journal-title":"Knowl. Eng. Rev."},{"key":"4_CR28","doi-asserted-by":"crossref","first-page":"1384","DOI":"10.1108\/03684920510614722","volume":"34","author":"M. Oussalah","year":"2005","unstructured":"Oussalah, M., Griffiths, N.: Cooperative clans. Kybernetes 34, 1384\u20131403 (2005)","journal-title":"Kybernetes"},{"key":"4_CR29","isbn-type":"print","volume-title":"Rules of Encounter: Designing Conventions for Automated Negotiation Among Computers","author":"J.S. Rosenschein","year":"1994","unstructured":"Rosenschein, J.S., Zlotkin, G.: Rules of Encounter: Designing Conventions for Automated Negotiation Among Computers. MIT, Cambridge (1994). ISBN:0-262-18159-2","ISBN":"https:\/\/id.crossref.org\/isbn\/0262181592"},{"key":"4_CR30","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/0004-3702(91)90051-K","volume":"47","author":"C. Hewitt","year":"1991","unstructured":"Hewitt, C.: Open information systems semantics for distributed artificial intelligence. Artif. Intell. 47, 79\u2013106 (1991)","journal-title":"Artif. Intell."},{"doi-asserted-by":"crossref","unstructured":"Anglano, C., Brevik, J., Canonico, M., Nurmi, D., Wolski, R.: Fault-aware scheduling for bag-of-tasks applications on desktop grids. In: Proceedings of GRID 2006, pp.\u00a056\u201363. IEEE, Singapore (2006). ISBN:1-4244-0343-X","key":"4_CR31","DOI":"10.1109\/ICGRID.2006.310998"},{"doi-asserted-by":"crossref","unstructured":"Choi, S., Kim, H., Byun, E., Baik, M., Kim, S., Park, C., Hwang, C.: Characterizing and classifying desktop grid. In: Proceedings of CCGRID 2007, pp.\u00a0743\u2013748. IEEE, Rio de Janeiro (2007)","key":"4_CR32","DOI":"10.1109\/CCGRID.2007.31"},{"unstructured":"Choi, S., Buyya, R., Kim, H., Byun, E.: A taxonomy of desktop grids and its mapping to state of the art systems. Technical report, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, pp.\u00a01\u201361 (2008)","key":"4_CR33"},{"unstructured":"Wang, Y., Vassileva, J.: Trust-based community formation in peer-to-peer file sharing networks. In: Proceedings on Web Intelligence, pp.\u00a0341\u2013348. IEEE, Beijing (2004)","key":"4_CR34"},{"key":"4_CR35","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1016\/j.future.2006.12.001","volume":"23","author":"P. Domingues","year":"2007","unstructured":"Domingues, P., Sousa, B., Moura Silva, L.: Sabotage-tolerance and trustmanagement in desktop grid computing. Future Generat. Comput. Syst. 23, 904\u2013912 (2007)","journal-title":"Future Generat. Comput. Syst."},{"key":"4_CR36","volume-title":"Legal Reasoning: A Cognitive Approach to Law","author":"G. Sartor","year":"2005","unstructured":"Sartor, G.: Legal Reasoning: A Cognitive Approach to Law. Springer, Berlin\/Heidelberg (2005)"},{"key":"4_CR37","first-page":"353","volume":"3","author":"D. Nute","year":"1994","unstructured":"Nute, D.: Defeasible logic. Handb. Log. Artif. Intell. Log. Program. 3, 353\u2013395 (1994)","journal-title":"Handb. Log. Artif. Intell. Log. Program."},{"doi-asserted-by":"crossref","unstructured":"Nute, D.: Defeasible reasoning: a philosophical analysis in prolog. In: Aspects of Artificial Intelligence, pp.\u00a0251\u2013288. Springer, Berlin\/Heidelberg (1988)","key":"4_CR38","DOI":"10.1007\/978-94-009-2699-8_9"},{"doi-asserted-by":"crossref","unstructured":"Nute, D.: Defeasible logic. In: Proceedings of the Applications of Prolog 14th International Conference on Web Knowledge Management and Decision Support, pp.\u00a0151\u2013169. Springer, Berlin\/Heidelberg (2003). ISBN:3-540-00680-X","key":"4_CR39","DOI":"10.1007\/3-540-36524-9_13"},{"key":"4_CR40","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1093\/logcom\/3.4.379","volume":"3","author":"D. Billington","year":"1993","unstructured":"Billington, D.: Defeasible logic is stable. J. Log. Comput. 3, 379\u2013400 (1993)","journal-title":"J. Log. Comput."},{"key":"4_CR41","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/978-3-642-32524-3_36","volume-title":"Intelligent Distributed Computing VI","author":"A. Urzica\u0103","year":"2013","unstructured":"Urzica\u0103, A., Gratie, C.: Policy-based instantiation of norms in MAS. In: Fortino, G., Badica, C., Malgeri, M., Unland, R. (eds.) Intelligent Distributed Computing VI, vol.\u00a0446, pp.\u00a0287\u2013296. Springer, Calabria (2013)"},{"unstructured":"Balke, T., da Costa Pereira, C., Dignum, F., Lorini, E., Rotolo, A., Vasconcelos, W., Villata, S.: Norms in MAS: definitions and related concepts. In: Normative Multi-Agent Systems, vol.\u00a04, pp.\u00a01\u201331. Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, Dagstuhl (2013). ISBN:978-3-939897-51-4","key":"4_CR42"},{"key":"4_CR43","volume-title":"Norms and Action: A Logical Enquiry","author":"G.H. Wright Von","year":"1963","unstructured":"Von Wright, G.H.: Norms and Action: A Logical Enquiry. Routledge & Kegan Paul, London (1963)"},{"key":"4_CR44","first-page":"41","volume":"5","author":"R. Tuomela","year":"1995","unstructured":"Tuomela, R., Bonnevier-Tuomela, M.: Norms and agreements. Eur. J. Law Philos. Comput. Sci. 5, 41\u201346 (1995)","journal-title":"Eur. J. Law Philos. Comput. Sci."},{"unstructured":"Hollander, C.D., Wu, A.S.: The current state of normative agent-based systems. J. Artif. Soc. Soc. Simul. 14, 6 (2011). ISSN:1460-7425","key":"4_CR45"},{"key":"4_CR46","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1023\/A:1008319631231","volume":"7","author":"M.P. Singh","year":"1999","unstructured":"Singh, M.P.: An ontology for commitments in multiagent systems. Artif. Intell. Law 7, 97\u2013113 (1999)","journal-title":"Artif. Intell. Law"},{"doi-asserted-by":"crossref","unstructured":"Governatori, G., Rotolo, A.: BIO logical agents: norms, beliefs, intentions in defeasible logic. Auton. Agents Multi-Agent Syst. 17, 36\u201369 (2008). ISSN:1387-2532","key":"4_CR47","DOI":"10.1007\/s10458-008-9030-4"},{"key":"4_CR48","isbn-type":"print","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/978-3-642-02562-4_2","volume-title":"Engineering Societies in the Agents World IX","author":"A. Artikis","year":"2009","unstructured":"Artikis, A., Pitt, J.: Specifying open agent systems: a survey. In: Artikis, A., Picard, G., Vercouter, L. (eds.) Engineering Societies in the Agents World IX, vol.\u00a05485, pp.\u00a029\u201345. Springer, Saint-Etienne (2009). ISBN:978-3-642-02561-7","ISBN":"https:\/\/id.crossref.org\/isbn\/9783642025617"},{"key":"4_CR49","first-page":"1","volume-title":"Normative Multi-Agent Systems","author":"G. Boella","year":"2009","unstructured":"Boella, G., Pigozzi, G., van der Torre, L.: Normative systems in computer science \u2013 ten guidelines for normative multiagent systems. In: Boella, G., Noriega, P., Pigozzi, G., Verhagen, H. (eds.) Normative Multi-Agent Systems, pp.\u00a01\u201321. Schloss Dagstuhl \u2013 Leibniz-Zentrum fuer Informatik, Dagstuhl (2009)"},{"key":"4_CR50","isbn-type":"print","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/3-540-49057-4_7","volume-title":"Intelligent Agents V: Agents Theories, Architectures, and Languages","author":"R. Conte","year":"1999","unstructured":"Conte, R., Castelfranchi, C., Dignum, F.: Autonomous norm acceptance. In: M\u00fcller, J., Rao, A., Singh, M. (eds.) Intelligent Agents V: Agents Theories, Architectures, and Languages, vol.\u00a01555, pp.\u00a099\u2013112. Springer, Paris (1999). ISBN:978-3-540-65713-2","ISBN":"https:\/\/id.crossref.org\/isbn\/9783540657132"},{"key":"4_CR51","doi-asserted-by":"crossref","first-page":"21","DOI":"10.3233\/MGS-2011-0167","volume":"7","author":"B.T.R. Savarimuthu","year":"2011","unstructured":"Savarimuthu, B.T.R., Cranefield, S.: Norm creation, spreading and emergence: a survey of simulation models of norms in multi-agent systems. Multiagent Grid Syst. 7, 21\u201354 (2011)","journal-title":"Multiagent Grid Syst."},{"unstructured":"Singh, M.P., et\u00a0al.: The uses of norms. In: Normative Multi-Agent Systems, vol.\u00a04, pp.\u00a0191\u2013229. Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, Dagstuhl (2013). ISBN:978-3-939897-51-4","key":"4_CR52"},{"key":"4_CR53","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications","author":"S. Wasserman","year":"1994","unstructured":"Wasserman, S.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)"},{"key":"4_CR54","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S003614450342480","volume":"45","author":"M.E.J. Newman","year":"2003","unstructured":"Newman, M.E.J.: The structure and function of complex networks. SIAM Rev. 45, 167\u2013256 (2003)","journal-title":"SIAM Rev."},{"doi-asserted-by":"crossref","unstructured":"Waldschmidt, K., Damm, M.: Robustness in soc design. In: 9th EUROMICRO Conference on Digital System Design: Architectures, Methods and Tools (DSD 2006), Dubrovnik, pp.\u00a027\u201336 (2006)","key":"4_CR55","DOI":"10.1109\/DSD.2006.82"},{"doi-asserted-by":"crossref","unstructured":"Shestak, V., Siegel, H.J., Maciejewski, A.A., Ali, S.: The robustness of resource allocations in parallel and distributed computing systems. In: Architecture of Computing Systems-ARCS 2006, pp.\u00a017\u201330. Springer, Berlin\/Heidelberg (2006)","key":"4_CR56","DOI":"10.1007\/11682127_2"},{"doi-asserted-by":"crossref","unstructured":"England, D., Weissman, J., Sadagopan, J.: A new metric for robustness with application to job scheduling. In: Proceedings of 14th IEEE International Symposium on High Performance Distributed Computing (HPDC-14 2005), Research Triangle Park, pp.\u00a0135\u2013143 (2005)","key":"4_CR57","DOI":"10.1109\/HPDC.2005.1520948"},{"key":"4_CR58","isbn-type":"print","volume-title":"The Object Constraint Language: Precise Modeling with UML","author":"J. Warmer","year":"1999","unstructured":"Warmer, J., Kleppe, A.: The Object Constraint Language: Precise Modeling with UML. Addison-Wesley Longman, Boston (1999). ISBN:0-201-37940-6","ISBN":"https:\/\/id.crossref.org\/isbn\/0201379406"},{"doi-asserted-by":"crossref","unstructured":"Stegh\u00f6fer, J.-P., Anders, G., Reif, W., Kantert, J., M\u00fcller-Schloer, C.: An effective implementation of norms in trust-aware open self-organising systems. In: 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW), pp.\u00a076\u201377. IEEE, London (2014)","key":"4_CR59","DOI":"10.1109\/SASOW.2014.34"},{"doi-asserted-by":"crossref","unstructured":"Schmeck, H., M\u00fcller-Schloer, C., \u00c7akar, E., Mnif, M., Richter, U.: Adaptivity and self-organization in organic computing systems. ACM Trans. Auton. Adapt. Syst. 5, 10:1\u201310:32 (2010). ISSN:1556-4665","key":"4_CR60","DOI":"10.1145\/1837909.1837911"},{"doi-asserted-by":"crossref","unstructured":"Kantert, J., Klejnowski, L., Bernard, Y., M\u00fcller-Schloer, C.: Influence of norms on decision making in trusted desktop grid systems: making norms explicit. In: Proceedings of the 6th International Conference on Agents and Artificial Intelligence, vol.\u00a02, pp.\u00a0278\u2013283. SciTePress, Angers (2014)","key":"4_CR61","DOI":"10.5220\/0004918002780283"},{"doi-asserted-by":"crossref","unstructured":"Kantert, J., Scharf, H., Edenhofer, S., Tomforde, S., H\u00e4hner, J., M\u00fcller-Schloer, C.: A graph analysis approach to detect attacks in multi-agent-systems at runtime. In: 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems, pp.\u00a080\u201389. IEEE, London (2014)","key":"4_CR62","DOI":"10.1109\/SASO.2014.20"},{"doi-asserted-by":"crossref","unstructured":"Kantert, J., B\u00f6delt, S., Edenhofer, S., Tomforde, S., H\u00e4hner, J., M\u00fcller-Schloer, C.: Interactive simulation of an open trusted desktop grid system with visualisation in 3D. In: 2014 IEEE Eighth International Conference on Self-Adaptive and Self-Organizing Systems (SASO), pp.\u00a0191\u2013192. IEEE, London (2014)","key":"4_CR63","DOI":"10.1109\/SASO.2014.39"},{"doi-asserted-by":"crossref","unstructured":"Kantert, J., Edenhofer, S., Tomforde, S., H\u00e4hner, J., M\u00fcller-Schloer, C.: Defending autonomous agents against attacks in multi-agent systems using norms. In: Proceedings of the 7th International Conference on Agents and Artificial Intelligence. SciTePress, Lisbon, pp.\u00a0149\u2013156 (2015)","key":"4_CR64","DOI":"10.5220\/0005202101490156"},{"unstructured":"Van Dongen, S.M.: Graph clustering by flow simulation. PhD thesis, Utrecht University (2001). http:\/\/dspace.library.uu.nl\/bitstream\/handle\/1874\/848\/full.pdf","key":"4_CR65"},{"doi-asserted-by":"crossref","unstructured":"Zhang, T., Ramakrishnan, R., Livny, M.: BIRCH: an efficient data clustering method for very large databases. In: ACM SIGMOD Record, vol.\u00a025, pp.\u00a0103\u2013114. ACM, Montreal (1996)","key":"4_CR66","DOI":"10.1145\/233269.233324"},{"doi-asserted-by":"crossref","unstructured":"Fraga, D., Bankovi\u0107, Z., Moya, J.M.: A taxonomy of trust and reputation system attacks. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, pp.\u00a041\u201350 (2012)","key":"4_CR67","DOI":"10.1109\/TrustCom.2012.58"}],"container-title":["Trustworthy Open Self-Organising Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29201-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T22:15:45Z","timestamp":1748988945000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-29201-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319291994","9783319292014"],"references-count":67,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29201-4_4","relation":{},"subject":[],"published":{"date-parts":[[2016]]}}}