{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,8]],"date-time":"2025-06-08T22:27:58Z","timestamp":1749421678080},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723587"},{"type":"electronic","value":"9783319723594"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72359-4_49","type":"book-chapter","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T11:19:11Z","timestamp":1512645551000},"page":"783-801","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Reasoning About Trust and Belief Change on a Social Network: A Formal Approach"],"prefix":"10.1007","author":[{"given":"Aaron","family":"Hunter","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"issue":"2","key":"49_CR1","doi-asserted-by":"crossref","first-page":"510","DOI":"10.2307\/2274239","volume":"50","author":"C Alchourr\u00f3n","year":"1985","unstructured":"Alchourr\u00f3n, C., G\u00e4rdenfors, P., Makinson, D.: On the logic of theory change: partial meet functions for contraction and revision. J. Symb. Log. 50(2), 510\u2013530 (1985)","journal-title":"J. Symb. Log."},{"issue":"1","key":"49_CR2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18\u201336 (1990)","journal-title":"ACM Trans. Comput. Syst."},{"key":"49_CR3","doi-asserted-by":"crossref","unstructured":"Boyarinov, K., Hunter, A.: Security and trust for surveillance cameras. In: IEEE Conference on Communications and Network Security (2017)","DOI":"10.1109\/CNS.2017.8228676"},{"key":"49_CR4","unstructured":"Dalal, M.: Investigations into a theory of knowledge base revision. In: Proceedings of the National Conference on Artificial Intelligence (AAAI 1988), pp. 475\u2013479 (1988)"},{"issue":"2","key":"49_CR5","first-page":"106","volume":"39","author":"XL Dong","year":"2016","unstructured":"Dong, X.L., Gabrilovich, E., Murphy, K., Dang, V., Horn, W., Lugaresi, C., Sun, S., Zhang, W.: Knowledge-based trust: estimating the trustworthiness of web sources. IEEE Data. Eng. Bull. 39(2), 106\u2013117 (2016)","journal-title":"IEEE Data. Eng. Bull."},{"issue":"3","key":"49_CR6","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1023\/A:1005294718935","volume":"63","author":"E Ferm\u00e9","year":"1999","unstructured":"Ferm\u00e9, E., Hansson, S.O.: Selective revision. Stud. Logica 63(3), 331\u2013342 (1999)","journal-title":"Stud. Logica"},{"key":"49_CR7","unstructured":"Hunter, A., Booth, R.: Trust-sensitive belief revision. In: Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI), pp. 3062\u20133068 (2015)"},{"key":"49_CR8","unstructured":"Hunter, A., Delgrande, J.P.: Belief change and cryptographic protocol verification. In: Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, 22\u201326 July 2007, Vancouver, British Columbia, Canada, pp. 427\u2013433 (2007)"},{"issue":"2","key":"49_CR9","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10458-005-6825-4","volume":"13","author":"TD Huynh","year":"2006","unstructured":"Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. Auton. Agents Multi Agent Syst. 13(2), 119\u2013154 (2006)","journal-title":"Auton. Agents Multi Agent Syst."},{"key":"49_CR10","unstructured":"J\u00f8sang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Computer Science 2006, Twenty-Nineth Australasian Computer Science Conference (ACSC 2006), Hobart, Tasmania, Australia, 16\u201319 January 2006, pp. 85\u201394 (2006)"},{"key":"49_CR11","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44600-1","volume-title":"Conditionals in Nonmonotonic Reasoning and Belief Revision","year":"2001","unstructured":"Kern-Isberner, G. (ed.): Conditionals in Nonmonotonic Reasoning and Belief Revision. LNCS (LNAI), vol. 2087. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44600-1"},{"issue":"2","key":"49_CR12","first-page":"263","volume":"52","author":"H Katsuno","year":"1992","unstructured":"Katsuno, H., Mendelzon, A.O.: Propositional knowledge base revision and minimal change. Artif. Intell. 52(2), 263\u2013294 (1992)","journal-title":"Artif. Intell."},{"key":"49_CR13","doi-asserted-by":"crossref","unstructured":"Ruohomaa, S., Kutvonen, L., Koutrouli, E.: Reputation management survey. In: Proceedings of the Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, 10\u201313 April 2007, Vienna, Austria, pp. 103\u2013111 (2007)","DOI":"10.1109\/ARES.2007.123"},{"key":"49_CR14","first-page":"272","volume":"9","author":"A Salehi-Abari","year":"2009","unstructured":"Salehi-Abari, A., White, T.: Towards con-resistant trust models for distributed agent systems. IJCAI 9, 272\u2013277 (2009)","journal-title":"IJCAI"},{"key":"49_CR15","unstructured":"Sless, L., Hazon, N., Kraus, S., Wooldridge, M.: Forming coalitions and facilitating relationships for completing tasks in social networks. In: International conference on Autonomous Agents and Multi-Agent Systems, AAMAS 2014, Paris, France, 5\u20139 May 2014, pp. 261\u2013268 (2014)"},{"issue":"4","key":"49_CR16","doi-asserted-by":"crossref","first-page":"47:1","DOI":"10.1145\/2501654.2501661","volume":"45","author":"W Sherchan","year":"2013","unstructured":"Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. 45(4), 47:1\u201347:33 (2013)","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"49_CR17","doi-asserted-by":"crossref","first-page":"129","DOI":"10.3166\/jancl.17.129-155","volume":"17","author":"J Benthem van","year":"2007","unstructured":"van Benthem, J.: Dynamic logic for belief revision. J. Appl. Non Class. Log. 17(2), 129\u2013155 (2007)","journal-title":"J. Appl. Non Class. Log."},{"key":"49_CR18","doi-asserted-by":"crossref","unstructured":"Yao, J., Chen, S., Nepal, S., Levy, D., Zic, J.: Truststore: making amazon S3 trustworthy with services composition. In: 10th IEEE\/ACM International Conference on Cluster, Cloud and Grid Computing, CCGrid 2010, 17\u201320 May 2010, Melbourne, Victoria, Australia, pp. 600\u2013605 (2010)","DOI":"10.1109\/CCGRID.2010.17"},{"issue":"4","key":"49_CR19","doi-asserted-by":"crossref","first-page":"642","DOI":"10.1109\/TPDS.2012.192","volume":"24","author":"X Yang","year":"2013","unstructured":"Yang, X., Guo, Y., Liu, Y.: Bayesian-inference-based recommendation in online social networks. IEEE Trans. Parallel Distrib. Syst. 24(4), 642\u2013651 (2013)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"49_CR20","unstructured":"Yu, B., Singh, M.P., Sycara, K.: Developing trust in large-scale peer-to-peer systems. In: IEEE First Symposium on Multi-Agent Security and Survivability, pp. 1\u201310 (2004)"},{"key":"49_CR21","doi-asserted-by":"crossref","unstructured":"Zuo, Y., Hu, W.-C., O\u2019Keefe, T.: Trust computing for social networking. In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, 27\u201329 April 2009, pp. 1534\u20131539 (2009)","DOI":"10.1109\/ITNG.2009.278"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72359-4_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T13:18:35Z","timestamp":1570454315000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72359-4_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723587","9783319723594"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72359-4_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}