{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:57:38Z","timestamp":1725512258214},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540723592"},{"type":"electronic","value":"9783540723608"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72360-8_19","type":"book-chapter","created":{"date-parts":[[2007,6,20]],"date-time":"2007-06-20T23:07:03Z","timestamp":1182380823000},"page":"218-228","source":"Crossref","is-referenced-by-count":2,"title":["Small-World Network Inspired Trustworthy Web Service Evaluation and Management Model"],"prefix":"10.1007","author":[{"given":"Qinghua","family":"Meng","sequence":"first","affiliation":[]},{"given":"Yongsheng","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"15","key":"19_CR1","doi-asserted-by":"publisher","first-page":"2806","DOI":"10.1016\/j.comcom.2005.10.032","volume":"29","author":"A.A. Pirzada","year":"2006","unstructured":"Pirzada, A.A., Datta, A., McDonald, C.: Incorporating trust and reputation in the DSR protocol for dependable routing. Computer Communications\u00a029(15), 2806\u20132821 (2006)","journal-title":"Computer Communications"},{"issue":"1","key":"19_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.obhdp.2006.05.005","volume":"101","author":"M.E. Schweitzer","year":"2006","unstructured":"Schweitzer, M.E., Hershey, J.C., Bradlow, E.T.: Promises and lies: Restoring violated trust. Organizational Behavior and Human Decision Processes\u00a0101(1), 1\u201319 (2006)","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"8","key":"19_CR3","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1016\/j.ijmedinf.2005.08.010","volume":"75","author":"B. Blobel","year":"2006","unstructured":"Blobel, B., et al.: Modeling privilege management and access control. International Journal of Medical Informatics\u00a075(8), 597\u2013623 (2006)","journal-title":"International Journal of Medical Informatics"},{"issue":"3","key":"19_CR4","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1016\/j.chaos.2005.08.109","volume":"293","author":"A. Antoci","year":"2006","unstructured":"Antoci, A., et al.: Generalized trust and sustainable coexistence between socially responsible firms and nonprofit organizations. Chaos, Solitons & Fractals\u00a0293(3), 783\u2013802 (2006)","journal-title":"Chaos, Solitons & Fractals"},{"issue":"4","key":"19_CR5","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.comnet.2005.07.025","volume":"50","author":"L. Mekouar","year":"2006","unstructured":"Mekouar, L., Iraqi, Y., Boutaba, R.: Peer-to-peer\u2019s most wanted: Malicious peers. Computer Networks\u00a050(4), 545\u2013562 (2006)","journal-title":"Computer Networks"},{"issue":"1","key":"19_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.mar.2005.08.001","volume":"17","author":"C. Busco","year":"2006","unstructured":"Busco, C., Riccaboni, A., Scapens, W.: Trust for accounting and accounting for trust. Management Accounting Research\u00a017(1), 11\u201341 (2006)","journal-title":"Management Accounting Research"},{"issue":"2","key":"19_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.futures.2005.04.001","volume":"38","author":"C. Selin","year":"2006","unstructured":"Selin, C.: Trust and the illusive force of scenarios. Futures\u00a038(2), 1\u201314 (2006)","journal-title":"Futures"},{"issue":"3","key":"19_CR8","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1016\/j.dss.2003.12.005","volume":"39","author":"P. Ratnasingam","year":"2005","unstructured":"Ratnasingam, P.: Trust in inter-organizational exchanges: a case study in business to business electronic commerce. Decision Support Systems\u00a039(3), 525\u2013544 (2005)","journal-title":"Decision Support Systems"},{"issue":"3","key":"19_CR9","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.ijhcs.2005.01.001","volume":"62","author":"J. Riegelsberger","year":"2005","unstructured":"Riegelsberger, J., Angela Sasse, M., McCarthy, J.D.: The mechanics of trust: A framework for research and design. International Journal of Human-Computer Studies\u00a062(3), 381\u2013422 (2005)","journal-title":"International Journal of Human-Computer Studies"},{"issue":"4","key":"19_CR10","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.amc.2003.12.020","volume":"161","author":"Y.-F. Chang","year":"2005","unstructured":"Chang, Y.-F., Chang, C.-C., Huang, H.: Digital signature with message recovery using self-certified public keys without trustworthy system authority. Applied Mathematics and Computation\u00a0161(4), 211\u2013227 (2005)","journal-title":"Applied Mathematics and Computation"},{"issue":"2","key":"19_CR11","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.istr.2005.05.004","volume":"10","author":"A.R. Sadeghi","year":"2005","unstructured":"Sadeghi, A.R., St\u00fcble, C.: Towards multilaterally secure computing platforms-with open source and trusted computing. Information Security Technical Report\u00a010(2), 83\u201395 (2005)","journal-title":"Information Security Technical Report"}],"container-title":["Lecture Notes in Computer Science","Advances in Grid and Pervasive Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72360-8_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:30:48Z","timestamp":1605763848000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72360-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540723592","9783540723608"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72360-8_19","relation":{},"subject":[]}}