{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T13:20:38Z","timestamp":1771075238002,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540928027","type":"print"},{"value":"9783540928034","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92803-4_6","type":"book-chapter","created":{"date-parts":[[2008,12,22]],"date-time":"2008-12-22T13:53:54Z","timestamp":1229954034000},"page":"99-111","source":"Crossref","is-referenced-by-count":2,"title":["Combining Cognitive with Computational Trust Reasoning"],"prefix":"10.1007","author":[{"given":"Eugen","family":"Staab","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Engel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","first-page":"72","volume-title":"ICMAS 1998: Proc. of the 3rd Int. Conference on Multi-Agent Systems","author":"C. Castelfranchi","year":"1998","unstructured":"Castelfranchi, C., Falcone, R.: Principles of trust for MAS: Cognitive anatomy, social importance, and quantification. In: ICMAS 1998: Proc. of the 3rd Int. Conference on Multi-Agent Systems, pp. 72\u201379. IEEE Computer Society, Los Alamitos (1998)"},{"key":"6_CR2","volume-title":"HICSS 2000: Proc. of the 33rd Hawaii Int. Conf. on System Sciences","author":"C. Castelfranchi","year":"2000","unstructured":"Castelfranchi, C., Falcone, R.: Trust is much more than subjective probability: Mental components and sources of trust. In: HICSS 2000: Proc. of the 33rd Hawaii Int. Conf. on System Sciences. IEEE Computer Society, Los Alamitos (2000)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Falcone, R., Castelfranchi, C.: Social trust: a cognitive approach. Trust and deception in virtual societies, 55\u201390 (2001)","DOI":"10.1007\/978-94-017-3614-5_3"},{"key":"6_CR4","unstructured":"Wang, Y., Singh, M.P.: Formal trust model for multiagent systems. In: IJCAI 2007: Proc. of the 20th Int. Joint Conf. on Artificial Intelligence, pp. 1551\u20131556 (2007)"},{"key":"6_CR5","first-page":"481","volume-title":"AINA 2006: Proc. of the 20th Int. Conf. on Advanced Information Networking and Applications","author":"L. Capra","year":"2006","unstructured":"Capra, L., Musolesi, M.: Autonomic trust prediction for pervasive systems. In: AINA 2006: Proc. of the 20th Int. Conf. on Advanced Information Networking and Applications, vol.\u00a02, pp. 481\u2013488. IEEE Computer Society, Los Alamitos (2006)"},{"key":"6_CR6","unstructured":"Esfandiari, B., Chandrasekharan, S.: On how agents make friends: Mechanisms for trust acquisition. In: Proc. of the 4th Workshop on Deception, Fraud and Trust in Agent Societies (at AAMAS 2001), pp. 27\u201334 (2001)"},{"issue":"2","key":"6_CR7","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10458-006-5952-x","volume":"12","author":"W.T.L. Teacy","year":"2006","unstructured":"Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M.: Travos: Trust and reputation in the context of inaccurate information sources. Auton. Agents Multi-Agent Syst.\u00a012(2), 183\u2013198 (2006)","journal-title":"Auton. Agents Multi-Agent Syst."},{"key":"6_CR8","first-page":"463","volume-title":"ICMAS 2000: Proc. of the 4th Int. Conf. on Multi-Agent Systems","author":"M. Witkowski","year":"2000","unstructured":"Witkowski, M., Pitt, J.: Objective trust-based agents: Trust and trustworthiness in a Multi-Agent trading society. In: ICMAS 2000: Proc. of the 4th Int. Conf. on Multi-Agent Systems, pp. 463\u2013464. IEEE Computer Society, Los Alamitos (2000)"},{"key":"6_CR9","unstructured":"Zacharia, G.: Collaborative reputation mechanisms for online communities. Master\u2019s thesis, Massachusetts Institute of Technology (1999)"},{"key":"6_CR10","first-page":"194","volume-title":"Proc. of the 4th Workshop on Deception, Fraud and Trust in Agent Societies","author":"J. Sabater","year":"2001","unstructured":"Sabater, J., Sierra, C.: REGRET: Reputation in gregarious societies. In: Proc. of the 4th Workshop on Deception, Fraud and Trust in Agent Societies, pp. 194\u2013195. ACM Press, New York (2001)"},{"issue":"2","key":"6_CR11","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10458-005-6825-4","volume":"13","author":"T.D. Huynh","year":"2006","unstructured":"Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. Auton. Agents Multi-Agent Syst.\u00a013(2), 119\u2013154 (2006)","journal-title":"Auton. Agents Multi-Agent Syst."},{"key":"6_CR12","first-page":"221","volume-title":"Ad Hoc Networking","author":"Z.J. Haas","year":"2001","unstructured":"Haas, Z.J., Deng, J., Liang, B., Papadimitratos, P., Sajama, S.: Wireless ad hoc networks. In: Perkins, C.E. (ed.) Ad Hoc Networking, pp. 221\u2013225. Addison-Wesley, Reading (2001)"},{"issue":"8","key":"6_CR13","doi-asserted-by":"publisher","first-page":"1102","DOI":"10.1109\/TKDE.2007.1045","volume":"19","author":"M. \u015eensoy","year":"2007","unstructured":"\u015eensoy, M., Yolum, P.: Ontology-based service representation and selection. IEEE Trans. Knowl. Data Eng.\u00a019(8), 1102\u20131115 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Marilly, E., Martinot, O., Betg\u00e9-Brezetz, S., Del\u00e8gue, G.: Requirements for service level agreement management. In: IPOM 2002: Proc. of the IEEE Workshop on IP Operations and Management, pp. 57\u201362 (2002)","DOI":"10.1109\/IPOM.2002.1045756"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"740","DOI":"10.1007\/11532095","volume-title":"Adaptive Agents and Multi-Agent Systems II","author":"R. Falcone","year":"2005","unstructured":"Falcone, R., Castelfranchi, C.: Trust dynamics: How trust is influenced by direct experiences and by trust itself. In: Kudenko, D., Kazakov, D., Alonso, E. (eds.) AAMAS 2004. LNCS, vol.\u00a03394, pp. 740\u2013747. Springer, Heidelberg (2005)"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","volume-title":"Adaptive Agents and Multi-Agent Systems II","author":"W. Mao","year":"2005","unstructured":"Mao, W., Gratch, J.: A utility-based approach to intention recognition. In: Kudenko, D., Kazakov, D., Alonso, E. (eds.) AAMAS 2004. LNCS, vol.\u00a03394, Springer, Heidelberg (2005)"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/11750734_20","volume-title":"Computational Logic in Multi-Agent Systems","author":"R. Demolombe","year":"2006","unstructured":"Demolombe, R., Fernandez, A.M.O.: Intention recognition in the situation calculus and probability theory frameworks. In: Toni, F., Torroni, P. (eds.) CLIMA 2005. LNCS, vol.\u00a03900, pp. 358\u2013372. Springer, Heidelberg (2006)"},{"key":"6_CR18","unstructured":"Staab, E., Engel, T.: Formalizing excusableness of failures in multi-agent systems. In: PRIMA 2007: Proc. of the 10th Pacific Rim Int. Workshop on Multi-Agents, pp. 124\u2013135 (2007)"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-540-39396-2_8","volume-title":"Intelligent Virtual Agents","author":"W. Mao","year":"2003","unstructured":"Mao, W., Gratch, J.: The social credit assignment problem. In: Rist, T., Aylett, R.S., Ballin, D., Rickel, J. (eds.) IVA 2003. LNCS, vol.\u00a02792, pp. 39\u201347. Springer, Heidelberg (2003)"},{"key":"6_CR20","volume-title":"The Judgment of Responsibility","author":"B. Weiner","year":"1995","unstructured":"Weiner, B.: The Judgment of Responsibility. Guilford Press, New York (1995)"},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/S0019-8501(99)00113-3","volume":"29","author":"D.M. Lambert","year":"2000","unstructured":"Lambert, D.M., Cooper, M.C.: Issues in supply chain management. Industrial Marketing Management\u00a029, 65\u201383 (2000)","journal-title":"Industrial Marketing Management"},{"key":"6_CR22","volume-title":"Causality: models, reasoning, and inference","author":"J. Pearl","year":"2000","unstructured":"Pearl, J.: Causality: models, reasoning, and inference. Cambridge University Press, Cambridge (2000)"},{"key":"6_CR23","unstructured":"Staab, E., Fusenig, V., Engel, T.: Using correlation for collusion detection in grid settings. Technical Report 000657499, University of Luxembourg (July 2008)"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-85834-8_6","volume-title":"Cooperative Information Agents XII","author":"E. Staab","year":"2008","unstructured":"Staab, E., Fusenig, V., Engel, T.: Towards trust-based acquisition of unverifiable information. In: Klusch, M., P\u011bchou\u010dek, M., Polleres, A. (eds.) CIA 2008. LNCS, vol.\u00a05180, pp. 41\u201354. Springer, Heidelberg (2008)"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-540-75119-9_21","volume-title":"Cooperative Information Agents XI","author":"M. Reh\u00e1k","year":"2007","unstructured":"Reh\u00e1k, M., Pechoucek, M.: Trust modeling with context representation and generalized identities. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling, L. (eds.) CIA 2007. LNCS, vol.\u00a04676, pp. 298\u2013312. Springer, Heidelberg (2007)"},{"key":"6_CR26","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/WOWMOM.2006.26","volume-title":"WoWMoM 2006: Proc. of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks","author":"A.D. Stefano","year":"2006","unstructured":"Stefano, A.D., Terrazzino, G., Scalia, L., Tinnirello, I., Bianchi, G., Giaconia, C.: An experimental testbed and methodology for characterizing IEEE 802.11 network cards. In: WoWMoM 2006: Proc. of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 513\u2013518. IEEE Computer Society, Los Alamitos (2006)"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Sipser, M.: Introduction to the Theory of Computation. Int. Thomson Publishing (1996)","DOI":"10.1145\/230514.571645"},{"key":"6_CR28","first-page":"91","volume-title":"iTrust 2003: Proc. of the 1st Int. Conf. on Trust Management","author":"T. Grandison","year":"2003","unstructured":"Grandison, T., Sloman, M.: Trust management tools for internet applications. In: iTrust 2003: Proc. of the 1st Int. Conf. on Trust Management, pp. 91\u2013107. Springer, Heidelberg (2003)"},{"key":"6_CR29","first-page":"177","volume-title":"iTrust 2005: Proc. of the 3rd Int. Conf. on Trust Management","author":"M. Kinateder","year":"2005","unstructured":"Kinateder, M., Baschny, E., Rothermel, K.: Towards a generic trust model - comparison of various trust update algorithms. In: iTrust 2005: Proc. of the 3rd Int. Conf. on Trust Management, pp. 177\u2013192. Springer, Heidelberg (2005)"},{"key":"6_CR30","unstructured":"McKnight, D.H., Chervany, N.L.: The meanings of trust. Technical report, University of Minnesota (1996)"},{"key":"6_CR31","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1146\/annurev.so.15.080189.000525","volume":"15","author":"J.L. Bradach","year":"1989","unstructured":"Bradach, J.L., Eccles, R.G.: Price, authority, and trust: From ideal types to plural forms. Annu. Rev. Sociol.\u00a015, 97\u2013118 (1989)","journal-title":"Annu. Rev. Sociol."},{"key":"6_CR32","unstructured":"Dearden, R., Friedman, N., Andre, D.: Model based bayesian exploration. In: UAI 1999: Proc. of the 15th Conf. on Uncertainty in Artificial Intelligence, pp. 150\u2013159 (1999)"},{"key":"6_CR33","first-page":"709","volume-title":"AAMAS 2003: Proc. of the 2nd Int. Joint Conf. on Autonomous Agents and Multiagent Systems","author":"G. Chalkiadakis","year":"2003","unstructured":"Chalkiadakis, G., Boutilier, C.: Coordination in multiagent reinforcement learning: a bayesian approach. In: AAMAS 2003: Proc. of the 2nd Int. Joint Conf. on Autonomous Agents and Multiagent Systems, pp. 709\u2013716. ACM, New York (2003)"},{"key":"6_CR34","unstructured":"Teacy, W.T.L., Chalkiadakis, G., Rogers, A., Jennings, N.R.: Sequential decision making with untrustworthy service providers. In: AAMAS 2008: Proc. of the 7th Int. Conf. on Autonomous Agents and Multiagent Systems, pp. 755\u2013762 (2008)"},{"key":"6_CR35","unstructured":"Reches, S., Hendrix, P., Kraus, S., Grosz, B.J.: Efficiently determining the appropriate mix of personal interaction and reputation information in partner choice. In: AAMAS 2008: Proc. of 7th Int. Conf. on Autonomous Agents and Multiagent Systems, pp. 583\u2013590 (2008)"},{"key":"6_CR36","volume-title":"HICSS 2000: Proc. of the 33rd Hawaii Int. Conf. on System Sciences","author":"A. Abdul-Rahman","year":"2000","unstructured":"Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: HICSS 2000: Proc. of the 33rd Hawaii Int. Conf. on System Sciences. IEEE Computer Society, Los Alamitos (2000)"},{"key":"6_CR37","series-title":"Lecture Notes in Computer Science","volume-title":"Adaptive Agents and Multi-Agent Systems II","author":"A. Whitby","year":"2005","unstructured":"Whitby, A., J\u00f8sang, A., Indulska, J.: Filtering out unfair ratings in bayesian reputation systems. In: Kudenko, D., Kazakov, D., Alonso, E. (eds.) AAMAS 2004. LNCS, vol.\u00a03394. Springer, Heidelberg (2005)"},{"key":"6_CR38","first-page":"475","volume-title":"AAMAS 2002: Proc. of the 1st Int. Joint Conf. on Autonomous agents and multiagent systems","author":"J. Sabater","year":"2002","unstructured":"Sabater, J., Sierra, C.: Reputation and social network analysis in multi-agent systems. In: AAMAS 2002: Proc. of the 1st Int. Joint Conf. on Autonomous agents and multiagent systems, pp. 475\u2013482. ACM, New York (2002)"}],"container-title":["Lecture Notes in Computer Science","Trust in Agent Societies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92803-4_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T09:53:11Z","timestamp":1738835591000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92803-4_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540928027","9783540928034"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92803-4_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}