{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:16Z","timestamp":1725558676571},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_24","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:42:55Z","timestamp":1277916175000},"page":"280-292","source":"Crossref","is-referenced-by-count":0,"title":["Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks"],"prefix":"10.1007","author":[{"given":"Hany A.","family":"Samuel","sequence":"first","affiliation":[]},{"given":"Yasser H.","family":"Dakroury","sequence":"additional","affiliation":[]},{"given":"Hussein I.","family":"Shahein","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, Hailes, S.: Supporting trust in virtual communities. In: Proceedings of the Hawaii International Conference on System Sciences, Maui, Hawaii, January 4-7 (2000)","DOI":"10.1109\/HICSS.2000.926814"},{"key":"24_CR2","unstructured":"Singh, A., Liu, L.: TrustMe: Anonymous management of Trust Relationships in Decentralized p2p systems. In: Proc. of IEEE Third International Conference on Peer-to-Peer Computing (P2P 2003), Link\u00f6ping, Sweden, September 01 - 03 (2003)"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Adar, E., Huberman, B.: Free riding on gnutella, Technical report, Xerox PARC (August 2000)","DOI":"10.5210\/fm.v5i10.792"},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/586110.586138","volume-title":"Proceedings of the 9th ACM conference on computer and communication security","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., di Vimercati, D.C., Paraboschi, S., Samarati, P., Violante, F.: A Reputation-Based Approach for choosing Reliable Resources in Peer-to-peer networks. In: Proceedings of the 9th ACM conference on computer and communication security, pp. 207\u2013216. ACM Press, New York (2002)"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Azzedin, F., Maheswaran, M.: Evolving and Managing Trust in Grid Computing Systems. In: IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2002) (May 2002)","DOI":"10.1109\/CCECE.2002.1012962"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Cornelli, F., Damiani, E., Ghorbani, A.: Implementing a Reputation Aware Gnutella Servent. In: Proceedings of the International Workshop on peer-to-peer Computing Pisa, Italy, May 24 (2002)","DOI":"10.1007\/3-540-45745-3_30"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Cornelli, F., Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Choosing reputable servents in a P2P network. In: Proc. of the Eleventh International World Wide Web Conference, Honolulu, Hawaii (May 2002)","DOI":"10.1145\/511446.511496"},{"key":"24_CR8","unstructured":"Freenet Homepage, http:\/\/freenet.sourceforge.net"},{"key":"24_CR9","unstructured":"Gnutella Homepage, http:\/\/gnutella.wego.com"},{"key":"24_CR10","unstructured":"Clarke: A decentralized information storage and retrieval system, Master\u2019s thesis, university of Edinburgh (1999)"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Clarke, Sandberg, O., Wiley, B., Hong, T.W.: Freenet: A distributed anonymous information storage and retrieval system. In: Proceedings of the ICSI workshop on design issues in anonymity and Unobservability, Berkeley, California (June 2000)","DOI":"10.1007\/3-540-44702-4_4"},{"key":"24_CR12","unstructured":"Stoica, R., Morries, D., Karger, M.F.: A scalable peer-to-peer lookup service for internet applications. In: Proc. of ACM SIGCOMM 2001 (August 2001)"},{"issue":"4","key":"24_CR13","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1111\/1467-8640.t01-1-00201","volume":"18","author":"J. Carter","year":"2002","unstructured":"Carter, J., Bitting, E., Ghorbani, A.: Reputation Formalization for an information-sharing Multi-peer System. Computational Intelligence\u00a018(4), 515\u2013534 (2002)","journal-title":"Computational Intelligence"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J. Douceur","year":"2002","unstructured":"Douceur, J.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, p. 251. Springer, Heidelberg (2002)"},{"key":"24_CR15","unstructured":"Aberer, K., Desporovic, Z.: Managing trust in a peer-to-peer information system. In: Proc. of the Hawaii International Conference on System Sciences, Maui, Hawaii (January 2000)"},{"key":"24_CR16","unstructured":"Kazaa homepage, http:\/\/www.kazaa.com"},{"key":"24_CR17","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/3-540-45741-0_15","volume-title":"Cooperative Information Agents VI","author":"M. Montaner","year":"2002","unstructured":"Montaner, M., Lopez, B.: Opinion-based filtering through trust. In: Klusch, M., Ossowski, S., Shehory, O. (eds.) CIA 2002. LNCS (LNAI), vol.\u00a02446, p. 164. Springer, Heidelberg (2002)"},{"key":"24_CR18","unstructured":"Schlosser, M.T., Condie, T.E., Kamvar, S.D.: Simulating A File-Sharing P2P Network. In: 1st Workshop on Semantics in Grid and P2P Networks, Budapest, Hungary, May 20 (2003)"},{"key":"24_CR19","unstructured":"Microsoft Network Messenger Homepage, http:\/\/messenger.msn.com"},{"key":"24_CR20","unstructured":"MiloJicic, D.S., Kalogeraki, V., Luckose, R.: peer-to-peer Computing, Tech Report:HPL-2002-57, available online at, http:\/\/www.hpl.hp.com\/techreports\/2002\/HPL-2002-57.pdf"},{"key":"24_CR21","unstructured":"Napster Homepage, http:\/\/www.napster.com"},{"key":"24_CR22","volume-title":"Handbook of Applied Cryptography","author":"P.C. Oorschot Van","year":"1996","unstructured":"Van Oorschot, P.C., Menezes, A.J., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Molnar, D., Freedman, M.J.: The Free Haven project: Distributed anonymous storage service. In: Proceedings of the workshop on Design Issues in Anonymity and Unobservability (July 2000)","DOI":"10.1007\/3-540-44702-4_5"},{"key":"24_CR24","unstructured":"Kamvar, S., Schlosser, M., Garcia-Molina, H.: Eigenrep: Reputation management in p2p networks. In: Twelfth International World Wide Web conference (2003)"},{"key":"24_CR25","unstructured":"Marsh, S.: Formalizing trust as a computational concept, PhD. Thesis, university of Stirling (1994)"},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Saroiu, S., Gummadi, P.K., Gribble, S.D.: A measurement study of peer-to-peer file sharing systems. In: Proceedings of Multimedia Computing and Networking 2002 (MMCN 2002), San Jose, CA,USA (January 2002)","DOI":"10.1117\/12.449977"},{"key":"24_CR27","unstructured":"SETI@HOME: THE Search for Extraterrestrial Intelligence at Home, http:\/\/setiathome.berkely.edu\/"},{"key":"24_CR28","unstructured":"Wang, Y., Vassileva, J.: Bayesian Network Trust Model in Peer-to-Peer Networks. In: Proceedings of second international workshop on peers and peer-to-peer computing, Melbourne, Australia (July 14, 2003)"},{"key":"24_CR29","unstructured":"Yahoo Messenger Homepage, http:\/\/www.yahoo.com"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:32:37Z","timestamp":1605760357000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}