{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:05:24Z","timestamp":1725505524764},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540747918"},{"type":"electronic","value":"9783540747925"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74792-5_8","type":"book-chapter","created":{"date-parts":[[2008,1,29]],"date-time":"2008-01-29T12:32:45Z","timestamp":1201609965000},"page":"175-184","source":"Crossref","is-referenced-by-count":10,"title":["Towards a Formal Framework for Computational Trust"],"prefix":"10.1007","author":[{"given":"Vladimiro","family":"Sassone","sequence":"first","affiliation":[]},{"given":"Karl","family":"Krukow","sequence":"additional","affiliation":[]},{"given":"Mogens","family":"Nielsen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/3-540-48749-2_8","volume-title":"Secure Internet Programming","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The role of trust management in distributed systems security. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 185\u2013210. Springer, Heidelberg (1999)"},{"key":"8_CR2","volume-title":"Proceedings from Software Engineering and Formal Methods (SEFM\u201903)","author":"M. Carbone","year":"2003","unstructured":"Carbone, M., Nielsen, M., Sassone, V.: A formal model for trust in dynamic networks. In: Proceedings from Software Engineering and Formal Methods (SEFM\u201903), IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-540-30538-5_14","volume-title":"FSTTCS 2004: Foundations of Software Technology and Theoretical Computer Science","author":"M. Carbone","year":"2004","unstructured":"Carbone, M., Nielsen, M., Sassone, V.: A calculus for trust management. In: Lodaya, K., Mahajan, M. (eds.) FSTTCS 2004. LNCS, vol.\u00a03328, pp. 161\u2013173. Springer, Heidelberg (2004)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of TGC\u201906","author":"K. Chatzikokolakis","year":"2007","unstructured":"Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. In: Proceedings of TGC\u201906. LNCS, Springer, Heidelberg (to appear, 2007)"},{"key":"8_CR5","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-540-30104-2_6","volume-title":"Cooperative Information Agents VIII","author":"Z. Despotovic","year":"2004","unstructured":"Despotovic, Z., Aberer, K.: A probabilistic approach to predict peers\u2019 performance in P2P networks. In: Klusch, M., Ossowski, S., Kashyap, V., Unland, R. (eds.) CIA 2004. LNCS (LNAI), vol.\u00a03191, pp. 62\u201376. Springer, Heidelberg (2004)"},{"issue":"4","key":"8_CR6","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.comnet.2005.07.003","volume":"50","author":"Z. Despotovic","year":"2006","unstructured":"Despotovic, Z., Aberer, K.: P2P reputation management: Probabilistic estimation vs. social networks. Computer Networks\u00a050(4), 485\u2013500 (2006)","journal-title":"Computer Networks"},{"key":"8_CR7","unstructured":"Gambetta, D.: Can we trust trust. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213\u2013237. University of Oxford, Department of Sociology, Ch. 13. Electronic edition (2000), \n                    \n                      http:\/\/www.sociology.ox.ac.uk\/papers\/gambetta213-237.pdf"},{"key":"8_CR8","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511790423","volume-title":"Probability Theory: The Logic of Science","author":"E.T. Jaynes","year":"2003","unstructured":"Jaynes, E.T.: Probability Theory: The Logic of Science. Cambridge University Press, Cambridge (2003)"},{"key":"8_CR9","unstructured":"J\u00f8sang, A., Ismail, R.: The beta reputation system. In: Proceedings from the 15th Bled Conference on Electronic Commerce, Bled (2002)"},{"key":"8_CR10","unstructured":"Krukow, K.: Towards a Theory of Trust for the Global Ubiquitous Computer. PhD thesis, University of Aarhus, Denmark (August 2006), Available at \n                    \n                      http:\/\/www.brics.dk\/~krukow"},{"key":"8_CR11","unstructured":"Krukow, K., Nielsen, M., Sassone, V.: A logical framework for reputation systems. Journal of Computer Security (to appear, 2007), Available online \n                    \n                      http:\/\/eprints.ecs.soton.ac.uk\/13656\/"},{"issue":"1","key":"8_CR12","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1214\/aoms\/1177729694","volume":"22","author":"S. Kullback","year":"1951","unstructured":"Kullback, S., Leibler, R.A.: On information and sufficiency. Annals of Mathematical Statistics\u00a022(1), 79\u201386 (1951)","journal-title":"Annals of Mathematical Statistics"},{"key":"8_CR13","first-page":"188","volume-title":"Proceedings from 5th Annual Hawaii International Conference on System Sciences (HICSS\u201902)","author":"L. Mui","year":"2002","unstructured":"Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation (for ebusinesses). In: Proceedings from 5th Annual Hawaii International Conference on System Sciences (HICSS\u201902), p. 188. IEEE, Los Alamitos (2002)"},{"key":"8_CR14","series-title":"ENTCS","volume-title":"Festschrift for Gordon D. Plotkin","author":"M. Nielsen","year":"2007","unstructured":"Nielsen, M., Krukow, K., Sassone, V.: A bayesian model for event-based trust. In: Festschrift for Gordon D. Plotkin. ENTCS, Elsevier, Amsterdam (to appear, 2007)"},{"issue":"2","key":"8_CR15","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L.R. Rabiner","year":"1989","unstructured":"Rabiner, L.R.: A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE\u00a077(2), 257\u2013286 (1989)","journal-title":"Proceedings of the IEEE"},{"issue":"1","key":"8_CR16","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10462-004-0041-5","volume":"24","author":"J. Sabater","year":"2005","unstructured":"Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review\u00a024(1), 33\u201360 (2005)","journal-title":"Artificial Intelligence Review"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1145\/1082473.1082624","volume-title":"AAMAS \u201905: Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems","author":"W.T.L. Teacy","year":"2005","unstructured":"Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M.: Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model. In: AAMAS \u201905: Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, pp. 997\u20131004. ACM Press, New York (2005)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Components and Objects"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74792-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T02:09:14Z","timestamp":1551406154000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74792-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540747918","9783540747925"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74792-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}