{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T06:14:43Z","timestamp":1744784083106},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540240877"},{"type":"electronic","value":"9783540305026"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30502-6_10","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T22:22:20Z","timestamp":1294438940000},"page":"142-156","source":"Crossref","is-referenced-by-count":10,"title":["A Temporalised Belief Logic for Specifying the Dynamics of Trust for Multi-agent Systems"],"prefix":"10.1007","author":[{"given":"Chuchang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Maris A.","family":"Ozols","sequence":"additional","affiliation":[]},{"given":"Mehmet","family":"Orgun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"10_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. ACM Transactions on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/CSFW.2000.856927","volume-title":"Proceedings of the 13th IEEE Computer Security Foundations Workshop","author":"A. Dekker","year":"2000","unstructured":"Dekker, A.: C3PO: A tool for automatic sound cryptographic protocol analysis. In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, Cambridge, UK, July 3-5, pp. 77\u201387. IEEE Computer Society, Los Alamitos (2000)"},{"key":"10_CR3","doi-asserted-by":"crossref","first-page":"677","DOI":"10.3233\/JCS-2003-11407","volume":"11","author":"N. Durgin","year":"2003","unstructured":"Durgin, N., Mitchell, J., Pavlovic, D.: A compositional logic for proving security properties of protocols. Journal of Computer Security\u00a011, 677\u2013721 (2003)","journal-title":"Journal of Computer Security"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Elofson, G.: Developing trust with intelligent agents: An exploratory study. In: Proceedings of the first International Workshop on Deception, Fraud and Trust in Agent Societies, Minneapolis\/St Paul, USA, pp. 125\u2013139 (1998)","DOI":"10.1007\/978-94-017-3614-5_6"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/BF00156915","volume":"1","author":"M. Finger","year":"1992","unstructured":"Finger, M., Gabbay, D.M.: Adding a temporal dimension to a logic system. Journal of Logic, Language and Information\u00a01, 203\u2013233 (1992)","journal-title":"Journal of Logic, Language and Information"},{"issue":"1","key":"10_CR6","first-page":"71","volume":"6","author":"D.M. Gabbay","year":"1998","unstructured":"Gabbay, D.M., Shehtman, V.: Products of modal logics, part 1. Logic Journal of the IGPL\u00a06(1), 71\u2013146 (1998)","journal-title":"Logic Journal of the IGPL"},{"key":"10_CR7","volume-title":"Fibring Logics","author":"M. Dov","year":"1999","unstructured":"Dov, M.: Fibring Logics. Oxford University Press, Oxford (1999)"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/0004-3702(92)90049-4","volume":"54","author":"J.Y. Halpern","year":"1992","unstructured":"Halpern, J.Y., Moses, Y.: A guide to completeness and complexity for modal logics of knowledge and belief. Artificial Intelligence\u00a054, 319\u2013379 (1992)","journal-title":"Artificial Intelligence"},{"key":"10_CR9","doi-asserted-by":"publisher","DOI":"10.4324\/9780203290644","volume-title":"A New Introduction to Modal Logic","author":"G.E. Hughes","year":"1996","unstructured":"Hughes, G.E., Cresswell, M.J.: A New Introduction to Modal Logic. Routledge, New York (1996)"},{"key":"10_CR10","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/3-540-48437-X_18","volume-title":"Multi-Agent System Engineering","author":"C.M. Jonker","year":"1999","unstructured":"Jonker, C.M., Treur, J.: Formal analysis of models for the dynamics of trust based on experiences. In: Garijo, F.J., Boman, M. (eds.) MAAMAW 1999. LNCS (LNAI), vol.\u00a01647, pp. 221\u2013231. Springer, Heidelberg (1999)"},{"issue":"4","key":"10_CR11","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.2307\/2275487","volume":"56","author":"M. Kracht","year":"1991","unstructured":"Kracht, M., Wolter, F.: Properties of independently axiomatizable bimodal logics. The Journal of Symbolic Logic\u00a056(4), 1469\u20131485 (1991)","journal-title":"The Journal of Symbolic Logic"},{"key":"10_CR12","first-page":"83","volume":"16","author":"S. Kripke","year":"1963","unstructured":"Kripke, S.: Semantical considerations on modal logic. Acta Philosophica Fennica\u00a016, 83\u201394 (1963)","journal-title":"Acta Philosophica Fennica"},{"key":"10_CR13","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/3-540-45656-2_29","volume-title":"AI 2001: Advances in Artificial Intelligence","author":"C. Liu","year":"2001","unstructured":"Liu, C.: Logical foundations for reasoning about trust in secure digital communication. In: Stumptner, M., Corbett, D.R., Brooks, M. (eds.) Canadian AI 2001. LNCS (LNAI), vol.\u00a02256, pp. 333\u2013344. Springer, Heidelberg (2001)"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1006\/jsco.1996.0072","volume":"22","author":"C. Liu","year":"1996","unstructured":"Liu, C., Orgun, M.A.: Dealing with multiple granularity of time in temporal logic programming. Journal of Symbolic Computation\u00a022, 699\u2013720 (1996)","journal-title":"Journal of Symbolic Computation"},{"key":"10_CR15","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/3-540-36187-1_6","volume-title":"AI 2002: Advances in Artificial Intelligence","author":"C. Liu","year":"2002","unstructured":"Liu, C., Ozols, M.A.: Trust in secure communication systems \u2013 the concept, representations, and reasoning techniques. In: AI 2002: Advances in Artificial Intelligence. LNCS (LNAI), vol.\u00a02257, pp. 60\u201370. Springer, Heidelberg (2002)"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1007\/3-540-47719-5_23","volume-title":"Information Security and Privacy","author":"C. Liu","year":"2001","unstructured":"Liu, C., Ozols, M.A., Cant, T.: An axiomatic basis for reasoning about trust in pKIs. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, pp. 274\u2013291. Springer, Heidelberg (2001)"},{"issue":"1-2","key":"10_CR17","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security\u00a06(1-2), 85\u2013128 (1998)","journal-title":"Journal of Computer Security"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Rangan, P.V.: An axiomatic basis of trust in distributed systems. In: Proceedings of the 1988 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 204\u2013211 (1988)","DOI":"10.1109\/SECPRI.1988.8112"},{"key":"10_CR19","first-page":"234","volume-title":"Proceedings of the IEEE Society Symposium on Research in Security and Privacy","author":"P.F. Syverson","year":"1994","unstructured":"Syverson, P.F., van Oorschot, P.C.: On unifying some cryptographic protocol logics. In: Proceedings of the IEEE Society Symposium on Research in Security and Privacy, CA USA, pp. 234\u2013248. IEEE Computer Society Press, Oakland (1994)"},{"key":"10_CR20","unstructured":"Wooldridge, M.: Coherent social action. In: Proceedings of the Eleventh European Conference on Artificial Intelligence (ECAI-1994), Amsterdam, The Netherlands, pp. 279\u2013283 (1994)"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30502-6_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:57:53Z","timestamp":1605761873000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30502-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540240877","9783540305026"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30502-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}