{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T21:45:28Z","timestamp":1767649528030},"publisher-location":"Berlin, Heidelberg","reference-count":55,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748090"},{"type":"electronic","value":"9783540748106"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74810-6_8","type":"book-chapter","created":{"date-parts":[[2007,8,17]],"date-time":"2007-08-17T01:44:24Z","timestamp":1187315064000},"page":"209-245","source":"Crossref","is-referenced-by-count":67,"title":["Trust and Reputation Systems"],"prefix":"10.1007","author":[{"given":"Audun","family":"J\u00f8sang","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Hailes, S.: Supporting Trust in Virtual Communities. In: Proceedings of the Hawaii International Conference on System Sciences, Maui, Hawaii, January 4-7, 2000 (2000)","DOI":"10.1109\/HICSS.2000.926814"},{"key":"8_CR2","first-page":"10","volume-title":"Proceedings of the Tenth International Conference on Information and Knowledge Management (CIKM 2001)","author":"K. Aberer","year":"2001","unstructured":"Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Paques, H., Liu, L., Grossman, D. (eds.) Proceedings of the Tenth International Conference on Information and Knowledge Management (CIKM 2001), pp. 10\u2013317. ACM Press, New York (2001)"},{"issue":"1","key":"8_CR3","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/0167-4048(95)97025-6","volume":"14","author":"M.D. Abrams","year":"1995","unstructured":"Abrams, M.D.: Trusted System Concepts. Computers and Security\u00a014(1), 45\u201356 (1995)","journal-title":"Computers and Security"},{"issue":"10","key":"8_CR4","first-page":"8","volume":"5","author":"E. Adar","year":"2000","unstructured":"Adar, E., Huberman, B.A.: Free Riding on Gnutella. First Monday (Peer-reviewed Journal on the Internet)\u00a05(10), 8 (2000)","journal-title":"First Monday (Peer-reviewed Journal on the Internet)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Conference on Security and Privacy, Oakland, CA (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"issue":"3","key":"8_CR6","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MPRV.2003.1228527","volume":"2","author":"V. Cahill","year":"2003","unstructured":"Cahill, V., Shand, B., Gray, E., et al.: Using Trust for Secure Collaboration in Uncertain Environments. Pervasive Computing\u00a02(3), 52\u201361 (2003)","journal-title":"Pervasive Computing"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Carbone, M., Nielsen, M., Sassone, V.: A Formal Model for Trust in Dynamic Networks. In: Proc. of International Conference on Software Engineering and Formal Methods (SEFM 2003), Brisbane (September 2003)","DOI":"10.1109\/SEFM.2003.1236207"},{"key":"8_CR8","volume-title":"Proceedings of the Security Protocols International Workshop","author":"B. Christianson","year":"1996","unstructured":"Christianson, B., Harbison, W.S.: Why Isn\u2019t Trust Transitive? In: Proceedings of the Security Protocols International Workshop, University of Cambridge, Cambridge (1996)"},{"key":"8_CR9","unstructured":"Clausen, A.: The Cost of Attack of PageRank. In: Proceedings of The International Conference on Agents, Web Technologies and Internet Commerce (IAWTIC 2004), Gold Coast (July 2004)"},{"key":"8_CR10","volume-title":"Proceedings of the eleventh international conference on World Wide Web (WWW 2002)","author":"F. Cornelli","year":"2002","unstructured":"Cornelli, F., et al.: Choosing Reputable Servents in a P2P Network. In: Proceedings of the eleventh international conference on World Wide Web (WWW 2002), ACM, New York (2002)"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/586110.586138","volume-title":"Proceedings of the 9th ACM conference on Computer and Communications Security (CCS 2002)","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., et al.: A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: Proceedings of the 9th ACM conference on Computer and Communications Security (CCS 2002), pp. 207\u2013216. ACM, New York (2002)"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/3-540-45705-4_23","volume-title":"E-Commerce and Web Technologies","author":"D. Fahrenholtz","year":"2002","unstructured":"Fahrenholtz, D., Lamesdorf, W.: Transactional Security for a Distributed Reputation Management System. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) EC-Web 2002. LNCS, vol.\u00a02455, pp. 214\u2013223. Springer, Heidelberg (2002)"},{"key":"8_CR13","unstructured":"Falcone, R., Castelfranchi, C.: How trust enhances and spread trust. In: Proceedings of the 4th Int. Workshop on Deception Fraud and Trust in Agent Societies, in the 5th International Conference on Autonomous Agents (AGENTS 2001) (May 2001)"},{"key":"8_CR14","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/978-94-017-3614-5_3","volume-title":"Trust and Deception in Virtual Societies","author":"R. Falcone","year":"2001","unstructured":"Falcone, R., Castelfranchi, C.: Social Trust: A Cognitive Approach. In: Castelfranchi, C., Tan, Y.H. (eds.) Trust and Deception in Virtual Societies, pp. 55\u201399. Kluwer, Dordrecht (2001)"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"L.C. Freeman","year":"1979","unstructured":"Freeman, L.C.: Centrality on Social Networks. Social Networks\u00a01, 215\u2013239 (1979)","journal-title":"Social Networks"},{"key":"8_CR16","first-page":"213","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"D. Gambetta","year":"1990","unstructured":"Gambetta, D.: Can We Trust Trust? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213\u2013238. Basil Blackwell, Oxford (1990)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys and Tutorials, 3 (2000)","DOI":"10.1109\/COMST.2000.5340804"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Gupta, M., Judge, P., Ammar, M.: A reputation system for peer-to-peer networks. In: Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video (NOSSDAV) (2003)","DOI":"10.1145\/776322.776346"},{"key":"8_CR19","unstructured":"Ismail, R., Boyd, C., J\u00f8sang, A., Russel, S.: Strong Privacy in Reputation Systems. In: Proceedings of the 4th International Workshop on Information Security Applications (WISA), Jeju Island, Korea (August 2003)"},{"key":"8_CR20","unstructured":"Ismail, R., Boyd, C., J\u00f8sang, A., Russel, S.: An Efficient Off-Line Reputation Scheme Using Articulated Certificates. In: Proceedings of the Second International Workshop on Security in Information Systems (WOSIS 2004) (2004)"},{"key":"8_CR21","unstructured":"ISO: ISO\/IEC IS17799 - Information technology \u2013 Code of practice for information security management. ISO\/IEC (2005)"},{"key":"8_CR22","volume-title":"Proc. of the 1996 New Security Paradigms Workshop","author":"A. J\u00f8sang","year":"1996","unstructured":"J\u00f8sang, A.: The right type of trust for distributed systems. In: Meadows, C. (ed.) Proc. of the 1996 New Security Paradigms Workshop, ACM, New York (1996)"},{"key":"8_CR23","unstructured":"J\u00f8sang, A.: Trust-Based Decision Making for Electronic Transactions. In: Yngstr\u00f6m, L., Svensson, T. (eds.) Proceedings of the 4th Nordic Workshop on Secure Computer Systems (NORDSEC 1999). Stockholm University, Sweden (1999)"},{"issue":"3","key":"8_CR24","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A. J\u00f8sang","year":"2001","unstructured":"J\u00f8sang, A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a09(3), 279\u2013311 (2001)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"8_CR25","unstructured":"J\u00f8sang, A.: Probabilistic Logic Under Uncertainty. In: Proceedings of Computing: The Australian Theory Symposium (CATS 2007), CRPIT Ballarat, Australia, vol. 65 (January 2007)"},{"key":"8_CR26","unstructured":"J\u00f8sang, A., Ismail, R.: The Beta Reputation System. In: Proceedings of the 15th Bled Electronic Commerce Conference (June 2002)"},{"issue":"2","key":"8_CR27","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., Haller, J.: Dirichlet Reputation Systems. In: Proceedings of the International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria (April 2007)","DOI":"10.1109\/ARES.2007.71"},{"key":"8_CR29","series-title":"Lecture Notes in Computer Science","volume-title":"Trust Management","author":"A. J\u00f8sang","year":"2004","unstructured":"J\u00f8sang, A., Lo Presti, S.: Analysing the Relationship Between Risk and Trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol.\u00a02995, Springer, Heidelberg (2004)"},{"key":"8_CR30","unstructured":"J\u00f8sang, A., Pope, S.: Semantic Constraints for Trust Tansitivity. In: Hartmann, S., Stumptner, M. (eds.) Proceedings of the Asia-Pacific Conference of Conceptual Modelling (APCCM) (Conferences in Research and Practice in Information Technology), Newcastle, Australia, vol. 43 (February 2005)"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proceedings of the Twelfth International World Wide Web Conference, Budapest (May 2003)","DOI":"10.1145\/775152.775242"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Krukow, K., Nielsen, M.: From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust. In: Proceedings of the Workshop of Formal Aspects of Security and Trust (FAST 2006), Ontario, Canada (August 2006)","DOI":"10.1007\/978-3-540-75227-1_7"},{"key":"8_CR33","unstructured":"Levien, R.: Attack Resistant Trust Metrics. PhD thesis, University of California at Berkeley (2004)"},{"key":"8_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-45036-X_6","volume-title":"Web Communication Technologies and Internet-Related Social Issues - HSI 2003","author":"C.Y. Liau","year":"2003","unstructured":"Liau, C.Y., et al.: Efficient Distributed Reputation Scheme for Peer-to-Peer Systems. In: Chung, C.-W., Kim, C.-k., Kim, W., Ling, T.-W., Song, K.-H. (eds.) HSI 2003. LNCS, vol.\u00a02713, pp. 54\u201363. Springer, Heidelberg (2003)"},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Manchala, D.W.: Trust Metrics, Models and Protocols for Electronic Commerce Transactions. In: Proceedings of the 18th International Conference on Distributed Computing Systems (1998)","DOI":"10.1109\/ICDCS.1998.679731"},{"volume-title":"Social Structure and Network Analysis","year":"1982","key":"8_CR36","unstructured":"Marsden, P.V., Lin, N. (eds.): Social Structure and Network Analysis. Sage Publications, Beverly Hills (1982)"},{"key":"8_CR37","unstructured":"McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report MISRC Working Paper Series 96-04, University of Minnesota, Management Information Systems Reseach Center (1996)"},{"key":"8_CR38","unstructured":"Merriam-Webster: Merriam-Webster Online (accessed June 2007), Available from http:\/\/www.m-w.com\/"},{"key":"8_CR39","unstructured":"Mui, L., Mohtashemi, M., Ang, C.: A Probabilistic Rating Framework for Pervasive Computing Environments. In: Proceedings of the MIT Student Oxygen Workshop (SOW 2001) (2001)"},{"key":"8_CR40","unstructured":"Mui, L., Mohtashemi, M., Ang, C., Szolovits, P., Halberstadt, A.: Ratings in Distributed Systems: A Bayesian Approach. In: Proceedings of the Workshop on Information Technologies and Systems (WITS) (2001)"},{"key":"8_CR41","doi-asserted-by":"crossref","unstructured":"Mui, L., Mohtashemi, M., Halberstadt, A.: A Computational Model of Trust and Reputation. In: Proceedings of the 35th Hawaii International Conference on System Science (HICSS) (2002)","DOI":"10.1109\/HICSS.2002.994181"},{"key":"8_CR42","unstructured":"OASIS: Conformance Requirements for the OASIS Security Assertion Markup Language (SAML) V2.0, Committee Draft. Organization for the Advancement of Structured Information Standards (January 15, 2005)"},{"key":"8_CR43","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank Citation Ranking: Bringing Order to the Web. Technical report, Stanford Digital Library Technologies Project (1998)"},{"key":"8_CR44","volume-title":"Proceedings of the 1996 New Security Paradigms Workshop","author":"L. Rasmusson","year":"1996","unstructured":"Rasmusson, L., Janssen, S.: Simulated Social Control for Secure Internet Commerce. In: Meadows, C. (ed.) Proceedings of the 1996 New Security Paradigms Workshop, ACM, New York (1996)"},{"key":"8_CR45","series-title":"Advances in Applied Microeconomics","doi-asserted-by":"publisher","DOI":"10.1016\/S0278-0984(02)11030-3","volume-title":"The Economics of the Internet and E-Commerce","author":"P. Resnick","year":"2002","unstructured":"Resnick, P., Zeckhauser, R.: Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay\u2019s Reputation System. In: Baye, M.R. (ed.) The Economics of the Internet and E-Commerce. Advances in Applied Microeconomics, vol.\u00a011, Elsevier Science, Amsterdam (2002)"},{"key":"8_CR46","doi-asserted-by":"crossref","unstructured":"Sabater, J., Sierra, C.: REGRET: A reputation model for gregarious societies. In: Proceedings of the 4th Int. Workshop on Deception, Fraud and Trust in Agent Societies, in the 5th Int. Conference on Autonomous Agents (AGENTS 2001), Montreal, Canada, pp. 61\u201369 (2001)","DOI":"10.1145\/375735.376110"},{"key":"8_CR47","series-title":"Lecture Notes in Artificial Intelligence","volume-title":"Adaptive Agents and Multi-Agent Systems","author":"J. Sabater","year":"2003","unstructured":"Sabater, J., Sierra, C.: Reputation and Social Network Analysis in Multi-Agent Systems. In: Alonso, E., Kudenko, D., Kazakov, D. (eds.) Adaptive Agents and Multi-Agent Systems. LNCS (LNAI), vol.\u00a02636, Springer, Heidelberg (2003)"},{"issue":"1","key":"8_CR48","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/844331.844337","volume":"3","author":"J. Sabater","year":"2002","unstructured":"Sabater, J., Sierra, C.: Social ReGreT, a reputation model based on social relations. SIGecom Exchanges\u00a03(1), 44\u201356 (2002)","journal-title":"SIGecom Exchanges"},{"key":"8_CR49","doi-asserted-by":"crossref","unstructured":"Schneider, J., et al.: Disseminating Trust Information in Wearable Communities. In: Proceedings of the 2nd International Symposium on Handheld and Ubiquitous Computing (HUC2K) (September 2000)","DOI":"10.1007\/BF02391568"},{"key":"8_CR50","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/CSFW.1993.246634","volume-title":"Proceedings of the 1993 Computer Security Foundations Workshop","author":"G.J. Simmons","year":"1993","unstructured":"Simmons, G.J.: An introduction to the mathematics of trust in security protocols. In: Proceedings of the 1993 Computer Security Foundations Workshop, pp. 121\u2013127. IEEE Computer Society Press, Los Alamitos, CA (1993)"},{"issue":"2","key":"8_CR51","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/s00199-002-0257-z","volume":"21","author":"S. Tadelis","year":"2003","unstructured":"Tadelis, S.: Firm Reputation with Hidden Information. Economic Theory\u00a021(2), 635\u2013651 (2003)","journal-title":"Economic Theory"},{"key":"8_CR52","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1086\/467284","volume":"36","author":"O.E. Williamson","year":"1993","unstructured":"Williamson, O.E.: Calculativeness, Trust and Economic Organization. Journal of Law and Economics\u00a036, 453\u2013486 (1993)","journal-title":"Journal of Law and Economics"},{"issue":"2","key":"8_CR53","first-page":"48","volume":"4","author":"A. Withby","year":"2005","unstructured":"Withby, A., J\u00f8sang, A., Indulska, J.: Filtering Out Unfair Ratings in Bayesian Reputation Systems. The Icfain Journal of Management Research\u00a04(2), 48\u201364 (2005)","journal-title":"The Icfain Journal of Management Research"},{"key":"8_CR54","doi-asserted-by":"crossref","unstructured":"Ziegler, C.-N., Lausen, G.: Spreading Activation Models for Trust Propagation. In: Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service (EEE 2004), Taipei (March 2004)","DOI":"10.1109\/EEE.2004.1287293"},{"key":"8_CR55","volume-title":"The Official PGP User\u2019s Guide","author":"P.R. Zimmermann","year":"1995","unstructured":"Zimmermann, P.R.: The Official PGP User\u2019s Guide. MIT Press, Cambridge (1995)"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design IV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74810-6_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:24:11Z","timestamp":1605745451000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74810-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540748090","9783540748106"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74810-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}