{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:14:34Z","timestamp":1725531274613},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642016387"},{"type":"electronic","value":"9783642016394"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01639-4_38","type":"book-chapter","created":{"date-parts":[[2009,4,20]],"date-time":"2009-04-20T10:12:15Z","timestamp":1240222335000},"page":"404-409","source":"Crossref","is-referenced-by-count":1,"title":["A Specialised Architecture for Embedding Trust Evaluation Capabilities in Intelligent Mobile Agents"],"prefix":"10.1007","author":[{"given":"Justin R.","family":"Pike","sequence":"first","affiliation":[]},{"given":"Elizabeth M.","family":"Ehlers","sequence":"additional","affiliation":[]},{"given":"Ockmer L.","family":"Oosthuizen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Lange, D.B., Oshima, M.: Seven Good Reasons for Mobile Agents. Communications of the ACM, 88\u201389 (1999)","DOI":"10.1145\/295685.298136"},{"key":"38_CR2","unstructured":"Bierman, E., Cloete, E.: Classification of Malicious Host Threats in Mobile Agent Computing. In: The 2002 Annual Research Conference of SAICSIT on Enablement through Technology, pp. 141\u2013148. SAICSIT, South Africa (2002)"},{"key":"38_CR3","series-title":"Trust and Deception in Virtual Societies","first-page":"55","volume-title":"Social Trust: A Cognitive Approach","author":"C. Castelfranchi","year":"2000","unstructured":"Castelfranchi, C., Falcone, R.: Social Trust: A Cognitive Approach. Trust and Deception in Virtual Societies, pp. 55\u201390. Kluwer Academic Publishers, Norwell (2000)"},{"key":"38_CR4","first-page":"89","volume-title":"2nd International Joint Conference on Autonomous Agents and Multiagent Systems","author":"C. Castelfranchi","year":"2003","unstructured":"Castelfranchi, C., Falcone, R.: Trust in Information Sources as a Source for Trust: A Fuzzy Approach. In: 2nd International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 89\u201396. ACM Press, New York (2003)"},{"key":"38_CR5","first-page":"1394","volume-title":"3rd International Joint Conference on Autonomous Agents and Multiagent Systems","author":"R. Falcone","year":"2004","unstructured":"Falcone, R., Pezzulo, G., Castelfranchi, C., Calvi, G.: Why a Cognitive Trustier Performs Better: Simulating Trust-based Contract Nets. In: 3rd International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 1394\u20131395. IEEE Computer Society, Los Alamitos (2004)"},{"key":"38_CR6","first-page":"183","volume-title":"Autonomous Agents and Multi-Agent Systems","author":"W.T.L. Teacy","year":"2006","unstructured":"Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M.: TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources. In: Autonomous Agents and Multi-Agent Systems, pp. 183\u2013198. Springer, Heidelberg (2006)"},{"key":"38_CR7","unstructured":"Huynh, D., Jennings, N.R., Shadbolt, N.R.: Developing an Integrated Trust and Reputation Model for Open Multi-Agent Systems. In: 7th International Workshop on Trust in Agent Societies, pp. 65\u201374 (2004)"},{"key":"38_CR8","first-page":"505","volume-title":"4th International Joint Conference on Autonomous Agents and Multiagent Systems","author":"S. Casare","year":"2005","unstructured":"Casare, S., Sichman, J.: Towards a Functional Ontology of Reputation. In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 505\u2013511. ACM Press, New York (2005)"},{"key":"38_CR9","first-page":"1005","volume-title":"4th International Joint Conference on Autonomous Agents and Multiagent Systems","author":"R. Ashri","year":"2005","unstructured":"Ashri, R., Ramchurn, S.D., Sabater, J., Luck, M., Jennings, N.R.: Trust Evaluation Through Relationship Analysis. In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 1005\u20131011. ACM Press, New York (2005)"},{"key":"38_CR10","first-page":"1026","volume-title":"2nd International Joint Conference on Autonomous Agents and Multiagent Systems","author":"R. Jurca","year":"2003","unstructured":"Jurca, R., Faltings, B.: An Incentive Compatible Reputation Mechanism. In: 2nd International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 1026\u20131027. ACM Press, New York (2003)"},{"key":"38_CR11","first-page":"52","volume-title":"IEEE Concurrency","author":"N.M. Karnik","year":"1998","unstructured":"Karnik, N.M., Tripathi, A.R.: Design Issues in Mobile Agent Programming Systems. In: IEEE Concurrency, pp. 52\u201361. IEEE Computer Society, Los Alamitos (1998)"},{"key":"38_CR12","first-page":"231","volume-title":"7th IEEE International Conference on E-Commerce Technology","author":"C. Lin","year":"2005","unstructured":"Lin, C., Varadharajan, V., Wang, Y., Pruthi, V.: Trust Enhanced Security for Mobile Agents. In: 7th IEEE International Conference on E-Commerce Technology, pp. 231\u2013238. IEEE, Los Alamitos (2005)"}],"container-title":["Lecture Notes in Computer Science","Agent Computing and Multi-Agent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01639-4_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T12:12:27Z","timestamp":1548418347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01639-4_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642016387","9783642016394"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01639-4_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}