{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:28Z","timestamp":1725562408141},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221258"},{"type":"electronic","value":"9783540259527"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_5","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T00:17:37Z","timestamp":1281313057000},"page":"56-65","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Autonomous Trust Management Model for Mobile Agents"],"prefix":"10.1007","author":[{"given":"Yichuan","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Zhengyou","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Yiping","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Shiyong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/3-540-44594-3","volume-title":"Intelligent Agent and Application","author":"S. Zhong-Zhi","year":"2000","unstructured":"Zhong-Zhi, S.: Intelligent Agent and Application, pp. 9\u201311. Science Press, China (2000) (in Chinese)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Hu, Y.-J.: Some Thoughts on Agent Trust and Delegartion. In: AGENTS 2001, Montreal, Quebec, Canada, May 28-June 1 (2001)","DOI":"10.1145\/375735.376424"},{"key":"5_CR3","unstructured":"Kagal, L., Finin, T., Joshi, A.: Developing Secure Agent Systems Using Delegation Based Trust Management. In: Security of Mobile MultiAgent Systems (SEMAS 2002) held at Autonomous Agents and MultiAgent Systems, AAMAS 2002 (2002)"},{"key":"5_CR4","unstructured":"Poslad, S., Calisti, M.: Towards Improved Trust and Security in FIPA Agent Platforms. In: Autonomous Agents 2000 Workshop on Deception, Fraud and Trust in Agent Societies, Spain (2000)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: ACM New Security Paradigms Workshop (1997)","DOI":"10.1145\/283699.283739"},{"key":"5_CR6","unstructured":"Abdul-Rahman, A.: The PGP Trust Model. EDI-Forum (April 1997), http:\/\/www.cs.ucl.ac.uk\/staff\/F.AbdulRahman\/docs\/"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Mass, Y., Shehory, O.: Distributed Trust in Open Multi-Agent Systems. In: Workshop on Deception, Fraud and Trust in Agent Societies, Autonomous Agents 2000 (2000)","DOI":"10.1007\/3-540-45547-7_10"},{"issue":"3","key":"5_CR8","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MIC.2002.1003138","volume":"6","author":"M.N. Huhns","year":"2002","unstructured":"Huhns, M.N.: Trusted Autonomy. IEEE Internet Computing\u00a06(3), 92\u201395 (2002)","journal-title":"IEEE Internet Computing"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Capkun, S., Buttyan, L., Hubaux, J.-P.: Self-Organized Public-Key Managment for Mobile Ad Hoc Networks. IEEE Trans. on Mobile Computing\u00a02(1) (January 2003)","DOI":"10.1109\/TMC.2003.1195151"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Cpakun, S., Hubaux, J.-P., Buttyan, L.: Mobileity Helps Security in Ad Hoc Networks. In: Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC) (June 2003)","DOI":"10.1145\/778421.778422"},{"key":"5_CR11","unstructured":"Aura, T.: On the structure of delegation networks, Licentiate \u2019s thesis. Technical Report A48, Helsinki University of Technology, Digital Systems laboratory (December 1997)"},{"key":"5_CR12","unstructured":"Jsang, A.: An algebra for assessing trust in certification chains. In: Kochmar, J. (ed.) Proceedings of the Network and Distributed Systems Security (NDSS 1999) Symposium. The Internet Society (1999)"},{"key":"5_CR13","unstructured":"Winsborough, W., Seamons, K., Jones, V.: Automated Trust Negotiation. In: DARPA Information Survivability Conference and Exposition (DISCEX 2000) (January 2000)"},{"key":"5_CR14","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography, 2nd edn. John Wiley and Sons, Inc., Chichester (1996)","edition":"2"},{"key":"5_CR15","volume-title":"Data Structures with C++","author":"W. Ford","year":"1996","unstructured":"Ford, W., Topp, W.: Data Structures with C++. Prentice Hall, Inc., Englewood Cliffs (1996)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:59:47Z","timestamp":1605761987000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}