{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:05:24Z","timestamp":1737435924965,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540735465"},{"type":"electronic","value":"9783540735472"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73547-2_38","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T14:54:52Z","timestamp":1186844092000},"page":"361-371","source":"Crossref","is-referenced-by-count":4,"title":["Calculating Trust Using Aggregation Rules in Social Networks"],"prefix":"10.1007","author":[{"given":"Sanguk","family":"Noh","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","volume-title":"The Evolution of Cooperation","author":"R. Axelrod","year":"1984","unstructured":"Axelrod, R.: The Evolution of Cooperation. Basic Books, New York (1984)"},{"issue":"4","key":"38_CR2","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1111\/1467-8640.00200","volume":"18","author":"S. Braynov","year":"2002","unstructured":"Braynov, S., Sandholm, T.: Contracting with Uncertain Level of Trust. Computational Intelligence\u00a018(4), 501\u2013514 (2002)","journal-title":"Computational Intelligence"},{"key":"38_CR3","volume-title":"Foundations of Social Theory","author":"J. Coleman","year":"1990","unstructured":"Coleman, J.: Foundations of Social Theory. Harvard University Press, Cambridge (1990)"},{"key":"38_CR4","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1023\/A:1020691116541","volume":"11","author":"A. Daskalopulu","year":"2002","unstructured":"Daskalopulu, A., Dimitrakos, T., Maibaum, T.: Evidence-Based Electronic Contract Performance Monitoring. INFORMS Journal of Group Decision and Negotiation\u00a011, 469\u2013485 (2002)","journal-title":"INFORMS Journal of Group Decision and Negotiation"},{"key":"38_CR5","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1111\/j.2517-6161.1968.tb00722.x","volume":"30","author":"A.P. Dempster","year":"1968","unstructured":"Dempster, A.P.: A Generalization of Bayesian Inference. Journal of the Royal Statistical Society, Series B\u00a030, 205\u2013247 (1968)","journal-title":"Journal of the Royal Statistical Society, Series B"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Golbeck, J.: Generating Predictive Movie Recommendations from Trust in Social Networks. In: Proceedings of the Fourth International Conference on Trust Management, Pisa, Italy (2006)","DOI":"10.21236\/ADA447900"},{"key":"38_CR7","unstructured":"Josang, A., Knapskog, S.J.: A Metric for Trusted Systems. In: Proceedings of the 21st National Information Systems Security Conference, Virginia, USA (1998)"},{"key":"38_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44875-6_1","volume-title":"Trust Management","author":"M. Kinateder","year":"2003","unstructured":"Kinateder, M., Rothermel, K.: Architecture and Algorithms for a Distributed Reputation System. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol.\u00a02692, pp. 1\u201316. Springer, Heidelberg (2003)"},{"key":"38_CR9","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/S0031-3203(99)00223-X","volume":"34","author":"L.I. Kuncheva","year":"2001","unstructured":"Kuncheva, L.I., Bezdek, J.C., Duin, R.: Decision Templates for Multiple Classifier Fusion: An Experimental Comparison. Pattern Recognition\u00a034, 299\u2013314 (2001)","journal-title":"Pattern Recognition"},{"key":"38_CR10","unstructured":"Marsh, S.: Formalizing Trust as a Computational Concept, Ph.D. thesis, University of Stirling, UK (1994)"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Mui, L., Mohtashemi, M., Halberstadt, A.: A Computational Model of Trust and Reputation. In: Proceedings of the 35th Hawaii International Conference on System Sciences (2002)","DOI":"10.1109\/HICSS.2002.994181"},{"key":"38_CR12","doi-asserted-by":"publisher","first-page":"155","DOI":"10.2307\/1907266","volume":"28","author":"J. Nash","year":"1950","unstructured":"Nash, J.: The Bargaining Problem. Econometrica\u00a028, 155\u2013162 (1950)","journal-title":"Econometrica"},{"key":"38_CR13","volume-title":"The Economics of the Internet and E-Commerce. vol. 11. Advances in Applied Microeconomics","author":"P. Resnick","year":"2002","unstructured":"Resnick, P., Zeckhauser, R.: Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay\u2019s Reputation System. In: The Economics of the Internet and E-Commerce. vol. 11. Advances in Applied Microeconomics, Elsevier, North-Holland (2002)"},{"issue":"1","key":"38_CR14","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10462-004-0041-5","volume":"24","author":"J. Sabater","year":"2005","unstructured":"Sabater, J., Sierra, C.: Review on Computational Trust and Reputation Models. Artificial Intelligence Review\u00a024(1), 33\u201360 (2005)","journal-title":"Artificial Intelligence Review"},{"key":"38_CR15","first-page":"1","volume":"3","author":"G. Shafer","year":"1990","unstructured":"Shafer, G.: Perspectives on the Theory and Practice of Belief Functions. International Journal of Approximate Reasoning\u00a03, 1\u201340 (1990)","journal-title":"International Journal of Approximate Reasoning"},{"volume-title":"Readings in Uncertain Reasoning, Chapter 3 Decision Making and Belief Functions, ch. 7","year":"1990","key":"38_CR16","unstructured":"Shafer, G., Pearl, J. (eds.): Readings in Uncertain Reasoning, Chapter 3 Decision Making and Belief Functions, ch. 7. Morgan Kaufmann Publishers, Seattle (1990)"},{"issue":"3","key":"38_CR17","first-page":"81","volume":"5","author":"L.A. Zadeh","year":"1984","unstructured":"Zadeh, L.A.: Review of Books: A Mathematical Theory of Evidence. AI Magazine\u00a05(3), 81\u201383 (1984)","journal-title":"AI Magazine"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73547-2_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T08:27:13Z","timestamp":1737361633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73547-2_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540735465","9783540735472"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73547-2_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}