{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T05:07:55Z","timestamp":1738904875816,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540927181"},{"type":"electronic","value":"9783540927198"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92719-8_43","type":"book-chapter","created":{"date-parts":[[2008,12,17]],"date-time":"2008-12-17T14:17:41Z","timestamp":1229523461000},"page":"477-487","source":"Crossref","is-referenced-by-count":0,"title":["Trust Management Model and Evaluation Method for Online Travel"],"prefix":"10.1007","author":[{"given":"Wen-jing","family":"Cui","sequence":"first","affiliation":[]},{"given":"Hai-yang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Sui","sequence":"additional","affiliation":[]},{"given":"Li-zhen","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Keefe, C.: Leading Travel Industry Consumer Survey Reports Significantly More Travelers Plan And Book Trips Online. TIA (2005)","key":"43_CR1"},{"key":"43_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1007\/11610113_136","volume-title":"Frontiers of WWW Research and Development - APWeb 2006","author":"Q. Sui","year":"2006","unstructured":"Sui, Q., Wang, H.: IPVita: An Intelligent Platform of Virtual Travel Agency. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol.\u00a03841, pp. 1205\u20131208. Springer, Heidelberg (2006)"},{"doi-asserted-by":"crossref","unstructured":"Seng, C., Arbaugh, W.A.: A Secure Trust Establishment Model. In: 2006 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol.\u00a01, pp. 78\u201385 (2006)","key":"43_CR3","DOI":"10.1109\/SUTC.2006.1636162"},{"doi-asserted-by":"crossref","unstructured":"Nefti, S., Meziane, F., Kasiran, K.: A Fuzzy Trust Model for E-commerce. In: Seventh IEEE International Conference, pp. 401\u2013404 (2005)","key":"43_CR4","DOI":"10.1109\/ICECT.2005.4"},{"doi-asserted-by":"crossref","unstructured":"Resnick, P., Zechhauser, P., Friedman, E., Kuwabara, K.: Reputation Systems: Facilitating Trust in Internet Interactions. Communications of the ACM, 45\u201348 (December 2000)","key":"43_CR5","DOI":"10.1145\/355112.355122"},{"unstructured":"Resnick, P., Zeckhauser, R.: Trust among strangers in Internet transactions: Empirical analysis of eBay\u2019s reputation system. In: Working Paper for the NBER Workshop on Empirical Studies of Electronic Commerce (2001)","key":"43_CR6"},{"unstructured":"http:\/\/www.ebay.com.cn","key":"43_CR7"},{"unstructured":"http:\/\/www.taobao.com.cn","key":"43_CR8"},{"unstructured":"http:\/\/www.onsale.com","key":"43_CR9"},{"unstructured":"http:\/\/www.alibaba.com","key":"43_CR10"},{"unstructured":"http:\/\/auction.amazon.com","key":"43_CR11"},{"key":"43_CR12","series-title":"Lecture Notes in Computer Science","first-page":"3","volume-title":"Computer Security - ESORICS 94","author":"T. Beth","year":"1994","unstructured":"Beth, T., Borcherding, M., Kelein, B.: Valuation of Trust in Open Networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol.\u00a0875, pp. 3\u201318. Springer, Heidelberg (1994)"},{"doi-asserted-by":"crossref","unstructured":"Wang., Y., Vassileva., J.: Bayesian Network Trust Model in Peer-to-Peer Networks. In: Proceedings of Second International Workshop Peers and Peer-to-Peer Computing, Melbourne, Australia (2003)","key":"43_CR13","DOI":"10.1007\/978-3-540-25840-7_3"},{"doi-asserted-by":"crossref","unstructured":"Hussain, F.K., Chang, E., Dillon, T.S.: Markov model for modeling and managing dynamic trust. In: 3rd IEEE International Conference, pp. 725\u2013733 (2005)","key":"43_CR14","DOI":"10.1109\/INDIN.2005.1560464"},{"unstructured":"J\u00f8sang, A.: Subjective Evidential Reasoning. In: Proceeding of the 9th International conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU 2002), Anecy, France (2002)","key":"43_CR15"},{"key":"43_CR16","first-page":"164","volume-title":"Proc. 17th Symposium on Security and Privacy","author":"M. Blaze","year":"1996","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. 17th Symposium on Security and Privacy, pp. 164\u2013173. IEEE, Oakland (1996)"},{"key":"43_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J. Douceur","year":"2002","unstructured":"Douceur, J.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, p. 251. Springer, Heidelberg (2002)"},{"key":"43_CR18","volume-title":"Web Intelligence and agent Systems","author":"A. J\u00f8sang","year":"2005","unstructured":"J\u00f8sang, A., Gray, E., Kinateder, M.: A Model for Analyzing Transitive Trust. In: Web Intelligence and agent Systems. IOS Press, Amsterdam (2005)"},{"key":"43_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/3-540-49135-X_9","volume-title":"Security Protocols","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Keromytis, A.: Trust management for public-key infrastructures. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol.\u00a01550, pp. 59\u201363. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Computer Supported Cooperative Work in Design IV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92719-8_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T07:02:58Z","timestamp":1738825378000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92719-8_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540927181","9783540927198"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92719-8_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}