{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:38:03Z","timestamp":1743053883417,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748342"},{"type":"electronic","value":"9783540748359"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74835-9_32","type":"book-chapter","created":{"date-parts":[[2007,9,7]],"date-time":"2007-09-07T14:03:08Z","timestamp":1189173788000},"page":"485-500","source":"Crossref","is-referenced-by-count":5,"title":["Towards Modeling Trust Based Decisions: A Game Theoretic Approach"],"prefix":"10.1007","author":[{"given":"Vidyaraman","family":"Sankaranarayanan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Madhusudhanan","family":"Chandrasekaran","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shambhu","family":"Upadhyaya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Levien, R.: Advogato Trust Metric. Phd thesis, UC Berkeley (2003)"},{"key":"32_CR2","volume-title":"ACM Symposium on Applied Computing, TRECK Track","author":"B. Kemal","year":"2005","unstructured":"Kemal, B., Bruno, C., Andrew, S.T.: How to incorporate revocation status information into the trust metrics for public-key certification. In: ACM Symposium on Applied Computing, TRECK Track, ACM Press, New York (2005)"},{"issue":"2","key":"32_CR3","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. Josang","year":"2007","unstructured":"Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"issue":"3","key":"32_CR4","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TSMCA.2006.871628","volume":"36","author":"M. Ji","year":"2006","unstructured":"Ji, M., Orgun, M.A.: Trust management and trust theory revision. IEEE Transactions on Systems, Man and Cybernetics, Part A\u00a036(3), 451\u2013460 (2006)","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part A"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Ray, I., Chakraborty, S.: A vector model of trust for developing trustworthy systems. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 260\u2013275. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-30108-0_16"},{"key":"32_CR6","unstructured":"Winsborough, W., Seamons, K., Jones, V.: Automated trust negotiation. Technical report, North Carolina State University at Raleigh (2000)"},{"key":"32_CR7","first-page":"92","volume-title":"Policy 2002","author":"W.H. Winsborough","year":"2002","unstructured":"Winsborough, W.H., Li, N.: Towards practical automated trust negotiation. In: Policy 2002. Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks, pp. 92\u2013103. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"32_CR8","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/1005140.1005143","volume-title":"WPES 2003","author":"T. Yu","year":"2003","unstructured":"Yu, T., Winslett, M.: Policy migration for sensitive credentials in trust negotiation. In: WPES 2003. Proceedings of the 2003 ACM workshop on Privacy in the electronic society, pp. 9\u201320. ACM Press, New York (2003)"},{"key":"32_CR9","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1145\/501983.502004","volume-title":"CCS 2001","author":"T. Yu","year":"2001","unstructured":"Yu, T., Winslett, M., Seamons, K.E.: Interoperable strategies in automated trust negotiation. In: CCS 2001. Proceedings of the 8th ACM conference on Computer and Communications Security, pp. 146\u2013155. ACM Press, New York (2001)"},{"issue":"4","key":"32_CR10","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1002\/asi.20307","volume":"57","author":"R. Aringhieri","year":"2006","unstructured":"Aringhieri, R., Damiani, E., Vimercati, S.D.C.D., Paraboschi, S., Samarati, P.: Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems. Journal of the American Society for Information Science and Technology\u00a057(4), 528\u2013537 (2006)","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"32_CR11","doi-asserted-by":"publisher","first-page":"1589","DOI":"10.1145\/1066677.1067036","volume-title":"SAC 2005","author":"P. Avesani","year":"2005","unstructured":"Avesani, P., Massa, P., Tiella, R.: A trust-enhanced recommender system application: Moleskiing. In: SAC 2005, pp. 1589\u20131593. ACM Press, New York (2005)"},{"key":"32_CR12","first-page":"467","volume-title":"IAT 2006","author":"F. Asselin","year":"2006","unstructured":"Asselin, F., Jaumard, B., Nongaillard, A.: A technique for large automated mechanism design problems. In: IAT 2006. Proceedings of the IEEE\/WIC\/ACM international conference on Intelligent Agent Technology, Washington, DC, USA, pp. 467\u2013473. IEEE Computer Society, Los Alamitos (2006)"},{"key":"32_CR13","first-page":"748","volume-title":"Proceedings of the Third International Joint Conference on Autonomous Agents and MultiAgent Systems","author":"R. Dash","year":"2004","unstructured":"Dash, R., Ramchurn, S., Jennings, N.: Trust-based mechanism design. In: Proceedings of the Third International Joint Conference on Autonomous Agents and MultiAgent Systems, pp. 748\u2013755. ACM Press, New York (2004)"},{"key":"32_CR14","first-page":"471","volume-title":"IAT 2005","author":"Y.H. Lam","year":"2005","unstructured":"Lam, Y.H., Zhang, Z., Ong, K.L.: Trading in open marketplace using trust and risk. In: IAT 2005. Proceedings of the IEEE\/WIC\/ACM International Conference on Intelligent Agent Technology, Washington, DC, USA, pp. 471\u2013474. IEEE Computer Society, Los Alamitos (2005)"},{"key":"32_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1007\/11429760_26","volume-title":"Trust Management","author":"D. Cvrcek","year":"2005","unstructured":"Cvrcek, D., Moody, K.: Combining trust and risk to reduce the cost of attacks. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 372\u2013383. Springer, Heidelberg (2005)"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Josang, A., Presti, S.: Analysing the relationship between risk and trust. In: Proceedings of the Second International Conference on Trust Management, Oxford (2004)","DOI":"10.1007\/978-3-540-24747-0_11"},{"issue":"2","key":"32_CR17","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1016\/S0899-8256(03)00119-2","volume":"46","author":"J.C. Cox","year":"2004","unstructured":"Cox, J.C.: How to identify trust and reciprocity. Games and Economic Behavior\u00a046(2), 260\u2013281 (2004)","journal-title":"Games and Economic Behavior"},{"key":"32_CR18","first-page":"93","volume-title":"43rd IEEE Conference on Decision and Control","author":"J.S. Baras","year":"2004","unstructured":"Baras, J.S., Jiang, T.: Cooperative games, phase transitions on graphs and distributed trust in manet. In: 43rd IEEE Conference on Decision and Control, vol.\u00a01, pp. 93\u201398. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"Wu, D.J., Kimbrough, S.O., Fang, Z.: Artificial agents play the \u2019mad mex trust game\u2019: a computational approach. In: HICSS. Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Hawaii, pp. 389\u2013398 (2002)","DOI":"10.1109\/HICSS.2002.993887"},{"key":"32_CR20","unstructured":"Josang, A.: Trust-based decision making for electronic transactions. In: Fourth Nordic Workshop on Secure IT Systems (NORDSEC 1999), Stockholm, Sweden, Stockholm University Report 99-005 (1999)"},{"key":"32_CR21","unstructured":"Chen, W., Clarke, L., Kurose, J.F., Towsley, D.F.: Optimizing cost-sensitive trust-negotiation protocols. In: INFOCOM, pp. 1431\u20131442 (2005)"},{"key":"32_CR22","volume-title":"Game Theory: A nontechnical introduction","author":"M. Davis","year":"1983","unstructured":"Davis, M.: Game Theory: A nontechnical introduction. Dover, Mineola, NY (1983)"},{"key":"32_CR23","volume-title":"Games and Decisions","author":"R.D. Luce","year":"1989","unstructured":"Luce, R.D., Raiffa, H.: Games and Decisions. Dover, Mineola, NY (1989)"},{"issue":"1","key":"32_CR24","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TSMCC.2005.860571","volume":"36","author":"J.K. Archibald","year":"2006","unstructured":"Archibald, J.K., Hill, J.C., Johnson, F.R., Stirling, W.C.: Satisficing negotiations. IEEE Transactions on Systems, Man, and Cybernetics, Part C\u00a036(1), 4\u201318 (2006)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C"},{"key":"32_CR25","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1145\/1082473.1082526","volume-title":"AAMAS 2005","author":"T. Candale","year":"2005","unstructured":"Candale, T., Sen, S.: Effect of referrals on convergence to satisficing distributions. In: AAMAS 2005. Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, pp. 347\u2013354. ACM Press, New York (2005)"},{"issue":"1","key":"32_CR26","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s00182-006-0010-0","volume":"34","author":"G. Carmona","year":"2006","unstructured":"Carmona, G.: A strong anti-folk theorem. International Journal of Game Theory\u00a034(1), 131\u2013151 (2006)","journal-title":"International Journal of Game Theory"},{"key":"32_CR27","series-title":"Lecture Notes in Computer Science","first-page":"339","volume-title":"Trust Management","author":"S. Vidyaraman","year":"2006","unstructured":"Vidyaraman, S., Upadhyaya, S.: A trust assignment model based on alternate actions payoff. In: St\u00f8len, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol.\u00a03986, pp. 339\u2013353. Springer, Heidelberg (2006)"},{"issue":"1","key":"32_CR28","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11066-006-9002-2","volume":"7","author":"B.A. Huberman","year":"2005","unstructured":"Huberman, B.A., Wu, F., Zhang, L.: Ensuring trust in one time exchanges: solving the qos problem. NETNOMICS\u00a07(1), 27\u201337 (2005)","journal-title":"NETNOMICS"},{"key":"32_CR29","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1145\/1016527.1016531","volume-title":"PINS 2004","author":"R. Mahajan","year":"2004","unstructured":"Mahajan, R., Rodrig, M., Wetherall, D., Zahorjan, J.: Experiences applying game theory to system design. In: PINS 2004. Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems, pp. 183\u2013190. ACM Press, New York (2004)"},{"key":"32_CR30","unstructured":"Restificar, A., Haddawy, P.: Constructing utility models from observed negotiation actions. In: Proceedings of the Eighteenth Joint International Conference on Artificial Intelligence, pp. 1404\u20131405 (2003)"},{"key":"32_CR31","unstructured":"Afriat, S.: The construction of utility functions from expenditure data. Cowles Foundation Discussion Papers 177, Cowles Foundation, Yale University (1964)"},{"issue":"1","key":"32_CR32","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/S1364-6613(02)00006-2","volume":"7","author":"A.M. Colman","year":"2003","unstructured":"Colman, A.M.: Depth of strategic reasoning in games. Trends in Cognitive Sciences\u00a07(1), 2\u20134 (2003)","journal-title":"Trends in Cognitive Sciences"},{"issue":"1","key":"32_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0010-0277(02)00054-9","volume":"85","author":"T. Hedden","year":"2002","unstructured":"Hedden, T., Zhang, J.: What do you think i think you think?: Strategic reasoning in matrix games. Cognition\u00a085(1), 1\u201336 (2002)","journal-title":"Cognition"},{"issue":"3","key":"32_CR34","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/0167-2681(94)90103-1","volume":"25","author":"D.O. Stahl","year":"1994","unstructured":"Stahl, D.O., Wilson, P.W.: Experimental evidence on players\u2019 models of other players. Journal of Economic Behavior & Organization\u00a025(3), 309\u2013327 (1994)","journal-title":"Journal of Economic Behavior & Organization"},{"issue":"1","key":"32_CR35","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1006\/game.1996.0044","volume":"14","author":"D. Monderer","year":"1996","unstructured":"Monderer, D., Shapley, L.S.: Potential games. Games and Economic Behavior\u00a014(1), 124\u2013143 (1996)","journal-title":"Games and Economic Behavior"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74835-9_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T21:43:51Z","timestamp":1737409431000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74835-9_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540748342","9783540748359"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74835-9_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}