{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:41:40Z","timestamp":1725514900812},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540731306"},{"type":"electronic","value":"9783540731313"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73131-3_7","type":"book-chapter","created":{"date-parts":[[2007,8,21]],"date-time":"2007-08-21T16:08:15Z","timestamp":1187712495000},"page":"117-131","source":"Crossref","is-referenced-by-count":0,"title":["Reasoning About Willingness in Networks of Agents"],"prefix":"10.1007","author":[{"given":"S.","family":"Dehousse","sequence":"first","affiliation":[]},{"given":"S.","family":"Faulkner","sequence":"additional","affiliation":[]},{"given":"H.","family":"Mouratidis","sequence":"additional","affiliation":[]},{"given":"M.","family":"Kolp","sequence":"additional","affiliation":[]},{"given":"P.","family":"Giorgini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/3-540-48749-2_8","volume-title":"Secure Internet Programming","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Keromytis, A.D.: The Role of Trust Management in Distributed Systems Security. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 185\u2013210. Springer, Heidelberg (1999)"},{"key":"7_CR2","unstructured":"Carter, J., Bitting, E., Ghorbani, A.A.: Reputation Formalization within Information Sharing Multiagent Architectures. In: Proc. of Computational Intelligence, pp. 45\u201364 (2002)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Castelfranchi, C., Falcone, R.: Principles of trust for MAS: cognitive anatomy, social importance, and quantification. In: Proc. of Int. Conf. of Multi-Agent Systems (ICMAS\u201998), pp. 72\u201379 (1998)","DOI":"10.1109\/ICMAS.1998.699034"},{"key":"7_CR4","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1007\/11552451_118","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"S. Faulkner","year":"2005","unstructured":"Faulkner, S., Dehousse, S.: A Delegation Model for Designing Collaborative Multi-agent Systems. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol.\u00a03682, pp. 858\u2013865. Springer, Heidelberg (2005)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Filling the gap between Requirements Engineering and Public Key\/Trust Management. In: Proc. of 2nd Int. Conf. on Trust Management, iTrust\u201904 (2004)","DOI":"10.1007\/978-3-540-25980-0_8"},{"key":"7_CR6","volume-title":"Proc. of 13th IEEE Int. Conf. on Requirements Engineering (RE\u201905)","author":"P. Giorgini","year":"2005","unstructured":"Giorgini, P., Masscci, F., Mylopoulos, J., Zannone, N.: Modeling Security Requirements Through Ownership, Permission and Delegation. In: Proc. of 13th IEEE Int. Conf. on Requirements Engineering (RE\u201905), IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Liu, L., Yu, E.S.K., Mylopoulos, J.: Security and Privacy Requirements Analysis within a Social Setting. In: Proc. of 11th IEEE Int. Conf. on Requirements Engineering (RE\u201903), pp. 151\u2013161 (2003)","DOI":"10.1109\/ICRE.2003.1232746"},{"key":"7_CR8","volume-title":"An Introduction to MultiAgent Systems","author":"M. Wooldridge","year":"2002","unstructured":"Wooldridge, M.: An Introduction to MultiAgent Systems. John Wiley and Sons, Chichester (2002)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","first-page":"548","volume-title":"Entity-Relationship Approach - ER \u201994. Business Modelling and Re-Engineering","author":"E.S.K. Yu","year":"1994","unstructured":"Yu, E.S.K., Mylopoulos, J.: From E-R to \u201cA-R\u201d - Modelling Strategic Actor Relationships for Business Process Reengineering. In: Loucopoulos, P. (ed.) ER 1994. LNCS, vol.\u00a0881, pp. 548\u2013565. Springer, Heidelberg (1994)"},{"key":"7_CR10","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/3-540-45547-7_11","volume-title":"Trust in Cyber-societies","author":"E. Yu","year":"2001","unstructured":"Yu, E., Liu, L.: Modelling Trust for System Design Using the i* Strategic Actors Framework. In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) AA-WS 2000. LNCS (LNAI), vol.\u00a02246, pp. 175\u2013194. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Software Engineering for Multi-Agent Systems V"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73131-3_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:03:28Z","timestamp":1619517808000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73131-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540731306","9783540731313"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73131-3_7","relation":{},"subject":[]}}