{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:31:32Z","timestamp":1762032692854},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540752264"},{"type":"electronic","value":"9783540752271"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-75227-1_7","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T01:32:47Z","timestamp":1189647167000},"page":"96-111","source":"Crossref","is-referenced-by-count":5,"title":["From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust"],"prefix":"10.1007","author":[{"given":"Karl","family":"Krukow","sequence":"first","affiliation":[]},{"given":"Mogens","family":"Nielsen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"7_CR1","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.comnet.2005.07.003","volume":"50","author":"Z. Despotovic","year":"2006","unstructured":"Despotovic, Z., Aberer, K.: P2P reputation management: Probabilistic estimation vs. social networks. Computer Networks\u00a050(4), 485\u2013500 (2006)","journal-title":"Computer Networks"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10462-004-0041-5","volume":"24","author":"J. Sabater","year":"2005","unstructured":"Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review\u00a024(1), 33\u201360 (2005)","journal-title":"Artificial Intelligence Review"},{"key":"7_CR3","unstructured":"Krukow, K.: Towards a Theory of Trust for the Global Ubiquitous Computer. PhD thesis, University of Aarhus, Denmark (2006), available online (submitted) \n                  \n                    http:\/\/www.brics.dk\/~krukow"},{"key":"7_CR4","unstructured":"Gambetta, D.: Can we trust trust? In Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations. University of Oxford, Department of Sociology, pp. 213\u2013237. ch. 13. Electronic edition (2000), \n                  \n                    http:\/\/www.sociology.ox.ac.uk\/papers\/gambetta213-237.pdf"},{"key":"7_CR5","volume-title":"The Edinburgh Building, Cambridge, CB2 2RU","author":"E.T. Jaynes","year":"2003","unstructured":"Jaynes, E.T.: Probability Theory: The Logic of Science. In: The Edinburgh Building, Cambridge, CB2 2RU, United Kingdom, Cambridge University Press, Cambridge (2003)"},{"key":"7_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/978-3-540-27812-2_18","volume-title":"Theory Is Forever: Essays Dedicated to Arto Salomaa on the Occasion of His 70th Birthday","author":"M. Nielsen","year":"2004","unstructured":"Nielsen, M., Krukow, K.: On the formal modelling of trust in reputation-based systems. In: Karhum\u00e4ki, J., Maurer, H., P\u0103un, G., Rozenberg, G. (eds.) Theory Is Forever: Essays Dedicated to Arto Salomaa on the Occasion of His 70th Birthday LNCS, vol.\u00a03113, pp. 192\u2013204. Springer, Heidelberg (2004)"},{"key":"7_CR7","unstructured":"Cahill, V., Seigneur, J.M.: The SECURE website (2004), \n                  \n                    http:\/\/secure.dsg.cs.tcd.ie"},{"issue":"3","key":"7_CR8","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MPRV.2003.1228527","volume":"2","author":"V. Cahill","year":"2003","unstructured":"Cahill, V., Gray, E., et al.: Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing\u00a02(3), 52\u201361 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"7_CR9","unstructured":"J\u00f8sang, A., Ismail, R.: The beta reputation system. In: Proceedings from the 15th Bled Conference on Electronic Commerce, Bled. (2002)"},{"key":"7_CR10","first-page":"188","volume-title":"HICSS 2002","author":"L. Mui","year":"2002","unstructured":"Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation (for ebusinesses). In: HICSS 2002. Proceedings from 5th Annual Hawaii International Conference on System Sciences, p. 188. IEEE, Los Alamitos (2002)"},{"key":"7_CR11","unstructured":"Buchegger, S., Le Boudec, J.Y.: A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks. In: P2PEcon 2004 (2004)"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1145\/1082473.1082624","volume-title":"AAMAS \u201905","author":"W.T.L. Teacy","year":"2005","unstructured":"Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M.: Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model. In: AAMAS \u201905. Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, pp. 997\u20131004. ACM Press, New York, NY, USA (2005)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Krukow, K., Nielsen, M., Sassone, V.: A logical framework for reputation systems. (2006), Submitted. available online \n                  \n                    www.brics.dk\/~krukow","DOI":"10.7146\/brics.v12i23.21889"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1007\/978-3-540-28644-8_31","volume-title":"CONCUR 2004 - Concurrency Theory","author":"D. Varacca","year":"2004","unstructured":"Varacca, D., V\u00f6lzer, H., Winskel, G.: Probabilistic event structures and domains. In: Gardner, P., Yoshida, N. (eds.) CONCUR 2004. LNCS, vol.\u00a03170, pp. 481\u2013496. Springer, Heidelberg (2004)"},{"issue":"1","key":"7_CR15","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1214\/aoms\/1177729694","volume":"22","author":"S. Kullback","year":"1951","unstructured":"Kullback, S., Leibler, R.A.: On information and sufficiency. Annals of Mathematical Statistics\u00a022(1), 79\u201386 (1951)","journal-title":"Annals of Mathematical Statistics"},{"key":"7_CR16","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/978-3-540-30104-2_6","volume-title":"Cooperative Information Agents VIII","author":"Z. Despotovic","year":"2004","unstructured":"Despotovic, Z., Aberer, K.: A probabilistic approach to predict peers\u2019 performance in P2P networks. In: Klusch, M., Ossowski, S., Kashyap, V., Unland, R. (eds.) CIA 2004. LNCS (LNAI), vol.\u00a03191, pp. 62\u201376. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects in Security and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75227-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T18:08:28Z","timestamp":1578506908000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75227-1_7"}},"subtitle":["(Extended Abstract)"],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540752264","9783540752271"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75227-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}