{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T03:12:43Z","timestamp":1767237163879},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540223931"},{"type":"electronic","value":"9783540278122"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27812-2_18","type":"book-chapter","created":{"date-parts":[[2010,9,14]],"date-time":"2010-09-14T03:45:36Z","timestamp":1284435936000},"page":"192-204","source":"Crossref","is-referenced-by-count":8,"title":["On the Formal Modelling of Trust in Reputation-Based Systems"],"prefix":"10.1007","author":[{"given":"Mogens","family":"Nielsen","sequence":"first","affiliation":[]},{"given":"Karl","family":"Krukow","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48749-2_8","volume-title":"Secure Internet Programming","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The role of trust management in distributed systems security. In: Vitek, J., Jensen, C.D. (eds.) Secure Internet Programming. LNCS, vol.\u00a01603, Springer, Heidelberg (1999)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proc. IEEE Conference on Security and Privacy, Oakland (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/BFb0055488","volume-title":"Financial Cryptography","author":"M. Blaze","year":"1998","unstructured":"Blaze, M., Feigenbaum, J., Strauss, M.: Compliance checking in the policymaker trust management system. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol.\u00a01465, pp. 254\u2013274. Springer, Heidelberg (1998)"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/3-540-49135-X_9","volume-title":"Security Protocols","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: KeyNote: Trust management for public-key infrastructure. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol.\u00a01550, pp. 59\u201363. Springer, Heidelberg (1999)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Weeks, S.: Understanding trust management systems. In: Proc. IEEE Symposium on Security and Privacy, Oakland (2001)","DOI":"10.1109\/SECPRI.2001.924290"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Ellison, C.M., Frantz, B., Lampson, B., Rivest, R., Thomsa, B., Ylonen, T.: SPKI certificate theory. RFC 2693 (1999)","DOI":"10.17487\/rfc2693"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Grandison, T., Sloman, M.: A survey of trust in internet application. IEEE Communications Surveys, Fourth Quarter (2000)","DOI":"10.1109\/COMST.2000.5340804"},{"key":"18_CR8","volume-title":"Proceedings from Software Engineering and Formal Methods, SEFM 2003","author":"M. Carbone","year":"2003","unstructured":"Carbone, M., Nielsen, M., Sassone, V.: A formal model for trust in dynamic networks. In: Proceedings from Software Engineering and Formal Methods, SEFM 2003, IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Krukow, K., Nielsen, M.: Towards a formal notion of trust. In: Proceedings of the 5th ACM SIGPLAN international conference on Principles and Practice of Declarative Programming (2003)","DOI":"10.1145\/888251.888253"},{"key":"18_CR10","unstructured":"Shmatikov, V., Talcott, C.: Reputation-based trust management. Journal of Computer Security (selected papers of WITS 2003) (2004)"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Mui, L., Mohtashemi, M.: Notions of reputation in multi-agent systems: A review. In: Trust, Reputation, and Security: Theories and Practice, AAMAS 2002 International Workshop, Bologna, Italy, July 15 (2002) Selected and Invited Papers","DOI":"10.1145\/544741.544807"},{"key":"18_CR12","unstructured":"J\u00f8sang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Conference on Electronic Commerce, Bled. (2002)"},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MPRV.2003.1228527","volume":"2","author":"V. Cahill","year":"2003","unstructured":"Cahill, V., et al.: Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing\u00a02, 52\u201361 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"18_CR14","unstructured":"Cahill, V., Signeur, J.M.: Secure Environments for Collaboration among Ubiquitous Roaming Entities (2003), http:\/\/secure.dsg.cs.tcd.ie"},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/0304-3975(81)90112-2","volume":"13","author":"M. Nielsen","year":"1981","unstructured":"Nielsen, M., Plotkin, G., Winskel, G.: Petri nets, event structures and domains. Theoretical Computer Science\u00a013, 85\u2013108 (1981)","journal-title":"Theoretical Computer Science"},{"key":"18_CR16","first-page":"1","volume":"4","author":"G. Winskel","year":"1995","unstructured":"Winskel, G., Nielsen, M.: Models for concurrency. Handbook of Logic in Computer Science\u00a04, 1\u2013148 (1995)","journal-title":"Handbook of Logic in Computer Science"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A.: A logic for uncertain probabilities. Fuzziness and Knowledge-Based Systems 9(3) (2001)","DOI":"10.1016\/S0218-4885(01)00083-1"},{"key":"18_CR18","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G. Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)"}],"container-title":["Lecture Notes in Computer Science","Theory Is Forever"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27812-2_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T20:33:11Z","timestamp":1636489991000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27812-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540223931","9783540278122"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27812-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}