{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:08:24Z","timestamp":1725505704917},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540787990"},{"type":"electronic","value":"9783540788003"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78800-3_39","type":"book-chapter","created":{"date-parts":[[2008,4,2]],"date-time":"2008-04-02T04:26:19Z","timestamp":1207110379000},"page":"501-516","source":"Crossref","is-referenced-by-count":4,"title":["SDSIrep: A Reputation System Based on SDSI"],"prefix":"10.1007","author":[{"given":"Ahmed","family":"Bouajjani","sequence":"first","affiliation":[]},{"given":"Javier","family":"Esparza","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Schwoon","sequence":"additional","affiliation":[]},{"given":"Dejvuth","family":"Suwimonteerabuth","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. In: Decision Support Systems (2005)"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Adler, T., de Alfaro, L.: A content-driven reputation system for the Wikipedia. In: Proc. 16th WWW Conference, ACM, pp. 261\u2013270 (2007)","DOI":"10.1145\/1242572.1242608"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Yl\u00f6nen, T.: RFC 2693: SPKI Certificate Theory. In: The Internet Society (1999)","DOI":"10.17487\/rfc2693"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: Proc. 12th WWW Conference (2003)","DOI":"10.1145\/775152.775242"},{"issue":"3\u20134","key":"39_CR5","doi-asserted-by":"crossref","first-page":"317","DOI":"10.3233\/JCS-2004-123-402","volume":"12","author":"S. Jha","year":"2004","unstructured":"Jha, S., Reps, T.: Model checking SPKI\/SDSI. JCS\u00a012(3\u20134), 317\u2013353 (2004)","journal-title":"JCS"},{"key":"39_CR6","first-page":"202","volume-title":"Proc. CSFW","author":"S. Schwoon","year":"2003","unstructured":"Schwoon, S., Jha, S., Reps, T., Stubblebine, S.: On generalized authorization problems. In: Proc. CSFW, pp. 202\u2013218. IEEE, Los Alamitos (2003)"},{"key":"39_CR7","volume-title":"LICS 2004","author":"J. Esparza","year":"2004","unstructured":"Esparza, J., Ku\u010dera, A., Mayr, R.: Model checking probabilistic pushdown automata. In: LICS 2004, IEEE, Los Alamitos (2004)"},{"key":"39_CR8","first-page":"89","volume-title":"Proc. CSFW","author":"N. Li","year":"2003","unstructured":"Li, N., Mitchell, J.C.: Understanding SPKI\/SDSI using first-order logic. In: Proc. CSFW, pp. 89\u2013103. IEEE, Los Alamitos (2003)"},{"key":"39_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/11901914_13","volume-title":"Automated Technology for Verification and Analysis","author":"D. Suwimonteerabuth","year":"2006","unstructured":"Suwimonteerabuth, D., Schwoon, S., Esparza, J.: Efficient algorithms for alternating pushdown systems with an application to the computation of certificate chains. In: Graf, S., Zhang, W. (eds.) ATVA 2006. LNCS, vol.\u00a04218, pp. 141\u2013153. Springer, Heidelberg (2006)"},{"key":"39_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11691372_1","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S. Jha","year":"2006","unstructured":"Jha, S., Schwoon, S., Wang, H., Reps, T.: Weighted pushdown systems and trust-management systems. In: Hermanns, H., Palsberg, J. (eds.) TACAS 2006. LNCS, vol.\u00a03920, pp. 1\u201326. Springer, Heidelberg (2006)"},{"key":"39_CR11","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: Bringing order to the web. Technical report, Stanford Digital Library Technologies Project (1998)"},{"key":"39_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/b138445","volume-title":"STACS 2005","author":"K. Etessami","year":"2005","unstructured":"Etessami, K., Yannakakis, M.: Recursive Markov chains, stochastic grammars, and monotone systems of nonlinear equations. In: Diekert, V., Durand, B. (eds.) STACS 2005. LNCS, vol.\u00a03404, Springer, Heidelberg (2005)"},{"key":"39_CR13","unstructured":"CiteSeer: Top 10,000 cited authors in computer science http:\/\/citeseer.ist.psu.edu\/allcited.html"},{"key":"39_CR14","unstructured":"CiteSeer: Estimated impact of publication venues in computer science http:\/\/citeseer.ist.psu.edu\/impact.html"},{"key":"39_CR15","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1073\/pnas.0507655102","volume":"102","author":"J.E. Hirsch","year":"2005","unstructured":"Hirsch, J.E.: An index to quantify an individual\u2019s scientific research output. Proceedings of the National Academy of Sciences\u00a0102, 165\u2013169 (2005)","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"39_CR16","unstructured":"Ley, M.: DBLP bibliography, http:\/\/www.informatik.uni-trier.de\/~ley\/db\/"},{"key":"39_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/11755593_14","volume-title":"Trust Management","author":"A. J\u00f8sang","year":"2006","unstructured":"J\u00f8sang, A., Marsh, S., Pope, S.: Exploring different types of trust propagation. In: St\u00f8len, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol.\u00a03986, pp. 179\u2013192. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Tools and Algorithms for the Construction and Analysis of Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78800-3_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:22:53Z","timestamp":1619508173000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78800-3_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540787990","9783540788003"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78800-3_39","relation":{},"subject":[]}}