{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:14:22Z","timestamp":1725538462701},"publisher-location":"Berlin, Heidelberg","reference-count":97,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540884804"},{"type":"electronic","value":"9783642018206"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01820-6_3","type":"book-chapter","created":{"date-parts":[[2009,9,18]],"date-time":"2009-09-18T16:02:59Z","timestamp":1253289779000},"page":"75-122","source":"Crossref","is-referenced-by-count":6,"title":["Virtual Persons and Identities"],"prefix":"10.1007","author":[{"given":"David-Olivier","family":"Jaquet-Chiffelle","sequence":"first","affiliation":[]},{"given":"Emmanuel","family":"Benoist","sequence":"additional","affiliation":[]},{"given":"Rolf","family":"Haenni","sequence":"additional","affiliation":[]},{"given":"Florent","family":"Wenger","sequence":"additional","affiliation":[]},{"given":"Harald","family":"Zwingelberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"3_CR1_3","first-page":"27","volume":"10","author":"A. Abdul-Rahman","year":"1997","unstructured":"Abdul-Rahman, A. (1997), \u2018The PGP trust model\u2019, EDI-Forum: the Journal of Electronic Commerce, 10(3):27\u201331.","journal-title":"EDI-Forum: the Journal of Electronic Commerce"},{"key":"3_CR2_3","first-page":"48","volume-title":"A distributed trust model","author":"A. Abdul-Rahman","year":"1997","unstructured":"Abdul-Rahman, A. and Hailes, S. (1997), \u2018A distributed trust model\u2019, NSPW'97, Workshop on New Security Paradigms, pp 48\u201360, Langdale, Cumbria, U.K."},{"key":"3_CR3_3","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A. and Hailes S (2000) \u2018Supporting trust in virtual communities\u2019, HICSS-33, 33rd Hawaii International Conference on System Sciences, pp 1769\u20131777, Maui, USA.","DOI":"10.1109\/HICSS.2000.926814"},{"issue":"1","key":"3_CR4_3","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/0167-4048(95)97025-6","volume":"14","author":"M. D. Abrams","year":"1995","unstructured":"Abrams, M. D. and Joyce, M. V. (1995), \u2018Trusted system concepts\u2019, Computers & Security, 14(1):45\u201356.","journal-title":"Computers & Security"},{"key":"3_CR5_3","unstructured":"Almendra, V. S. and Schwabe, D. (2006), \u2018Trust policies for semantic web repositories\u2019, in: Bonatti, P. A., Ding, L., Finin, T., Olmedilla, D. (eds), SWPW'06, 2nd Semantic Web Policy Workshop, pp 17\u201331, Athens, USA."},{"key":"3_CR6_3","unstructured":"Anrig, B., Browne, W., Gasson, M. (2007), \u2018The role of algorithms in profiling\u2019, in: Hilde-brandt, M. and Gutwirth, S. (eds), Profiling the European Citizen, Springer, pp 65\u201380."},{"issue":"2","key":"3_CR7_3","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.websem.2007.03.002","volume":"5","author":"D. Artz","year":"2007","unstructured":"Artz, D. and Gil, Z. (2007), \u2018A survey of trust in computer science and the semantic web\u2019, Web Semantics: Science, Services and Agents on the World Wide Web, 5(2):58\u201371.","journal-title":"Web Semantics: Science, Services and Agents on the World Wide Web"},{"issue":"3","key":"3_CR8_3","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s10683-006-9122-4","volume":"9","author":"N. Ashraf","year":"2006","unstructured":"Ashraf, N., Bohnet, I., Piankov, N. (2006), \u2018Decomposing trust and trustworthiness\u2019, Experimental Economics, 9(3):193\u2013208.","journal-title":"Experimental Economics"},{"key":"3_CR9_3","doi-asserted-by":"crossref","unstructured":"Benoist, E. (2007), \u2018Collecting data for the profiling of web-users\u2019, in: Hildebrandt. M., Gutwirth, S. (eds), Profiling the European Citizen, pp 169\u2013175, Springer.","DOI":"10.1007\/978-1-4020-6914-7_9"},{"key":"3_CR10_3","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1006\/game.1995.1027","volume":"10","author":"J. Berg","year":"1995","unstructured":"Berg, J., Dickhaut, J., McCabe, K. (1995), \u2018Trust, reciprocity and social history\u2019, Games and Economic Behavior, 10:122\u2013142.","journal-title":"Games and Economic behavior"},{"key":"3_CR11_3","unstructured":"Berners-Lee, T. (1997), Metadata architecture, available online at http:\/\/www.w3.org\/Design-Issues\/Metadata."},{"key":"3_CR12_3","first-page":"3","volume":"875","author":"T. Beth","year":"1994","unstructured":"Beth, T., Borcherding, M., Klein, B. (1994), \u2018Valuation of trust in open networks\u2019, ESORICS'94, 3rd European Symposium on Research in Computer Security, LNCS 875, pp 3\u201318.","journal-title":"ESORICS'94, 3rd European Symposium on Research in Computer Security, LNCS"},{"key":"3_CR13_3","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J. (1996), \u2018Decentralized trust management\u2019, SP'96, IEEE Symposium on Security and Privacy, pp 164\u2013173, Oakland, USA.","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"3_CR14_3","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A. D. (1999), \u2018The role of trust management in distributed systems security\u2019, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, pp 185\u2013210, Springer.","DOI":"10.1007\/3-540-48749-2_8"},{"key":"3_CR15_3","doi-asserted-by":"crossref","first-page":"847","DOI":"10.3917\/drs.049.0847","volume":"49","author":"D. Bourcier","year":"2001","unstructured":"Bourcier, D. (2001), \u2018De l'intelligence artificielle \u00e0 la personne virtuelle: \u00e9mergence d'une entit\u00e9 juridique?\u2019, Droit and Soci\u00e9t\u00e9, 49, pp 847\u2013871.","journal-title":"Droit and Soci\u00e9t\u00e9"},{"key":"3_CR16_3","unstructured":"Branchaud, M. and Flinn, S. (2004), \u2018Trust: A scalable trust management infrastructure\u2019, PST'04, 2nd Annual Conference on Privacy, Security and Trust, pp 207\u2013218, Fredericton, Canada."},{"key":"3_CR17_3","doi-asserted-by":"crossref","unstructured":"Castelfranchi, C. and Falcone, R. (2001), \u2018Social trust: a cognitive approach\u2019, in: Cas-telfranchi, C. and Tan, Y. H. (eds), Trust and Deception in Virtual Societies, pp 55\u201390, Kluwer Academic Publishers.","DOI":"10.1007\/978-94-017-3614-5"},{"key":"3_CR18_3","unstructured":"Challener, D., Yoder, K., Catherman, R., Safford, D., Van Doorn, L. (2007), A Practical Guide to Trusted Computing, IBM Press."},{"issue":"4","key":"3_CR19_3","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1002\/j.2325-8012.2007.tb00813.x","volume":"73","author":"A. Chaudhuri","year":"2007","unstructured":"Chaudhuri, A. and Gangadharan, L. (2007), \u2018An experimental analysis of trust and trustworthiness\u2019, Southern Economic Journal, 73(4):959\u2013985.","journal-title":"Southern Economic Journal"},{"issue":"1","key":"3_CR20_3","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jretai.2005.11.002","volume":"82","author":"J. Cho","year":"2006","unstructured":"Cho, J. (2006), \u2018The mechanism of trust and distrust formation and their relational outcomes\u2019, Journal of Retailing, 82(1):25\u201335.","journal-title":"Journal of Retailing"},{"key":"3_CR21_3","doi-asserted-by":"crossref","unstructured":"Christianson, B. and Harbison, W. S. (1997), \u2018Why isn't trust transitive?\u2019, in: Christianson, B., Crispo, B., Lomas, T. M. A., Roe, M. (eds.), IWSP'97, 5th International Workshop on Security Protocols, LNCS 1189, pp 171\u2013176, Paris, France.","DOI":"10.1007\/3-540-62494-5_16"},{"issue":"2","key":"3_CR22_3","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s10550-007-0042-4","volume":"25","author":"P. Cofta","year":"2007","unstructured":"Cofta, P. (2007), \u2018Confidence, trust and identity\u2019, BT Technology Journal, 25(2):173\u2013178.","journal-title":"BT Technology Journal"},{"key":"3_CR23_3","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Samarati, P. (2007), \u2018Access control policies and languages in open environments\u2019, in: Yu, T. and Jajodia, S. (eds.), Secure Data Management in Decentralized Systems, pp 21\u201358, Springer.","DOI":"10.1007\/978-0-387-27696-0_2"},{"key":"3_CR24_3","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.entcs.2006.08.033","volume":"179","author":"F. Degerlund","year":"2007","unstructured":"Degerlund, F. (2007), \u2018Trust mass, volume and density \u2014 a novel approach to reasoning about trust\u2019, Electronic Notes in Theoretical Computer Science, 179:87\u201396.","journal-title":"Electronic Notes in Theoretical Computer Science"},{"issue":"2","key":"3_CR25_3","doi-asserted-by":"publisher","first-page":"35","DOI":"10.2307\/1251829","volume":"61","author":"P. M. Doney","year":"1997","unstructured":"Doney, P. M., Cannon, J. P. (1997), \u2018An examination of the nature of trust in buyer-seller relationships\u2019, Journal of Marketing, 61(2):35\u201351.","journal-title":"Journal of Marketing"},{"key":"3_CR26_3","doi-asserted-by":"crossref","unstructured":"Flowerday, S. and von Solms, R. (2006), \u2018Trust: An element of information security\u2019, in:Fischer-H\u00fcbner, S., Rannenberg, K., Yngstr\u00f6m, L., Lindskog, S. (eds.), SEC'06, 21st International Information Security Conference, pp 87\u201398, Karlstad, Sweden.","DOI":"10.1007\/0-387-33406-8_8"},{"key":"3_CR27_3","unstructured":"Fukuyama, F. (1995), Trust: The Social Virtues and the Creation of Prosperity, The Free Press."},{"issue":"3","key":"3_CR28_3","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/569905.569910","volume":"33","author":"D. Gefen","year":"2002","unstructured":"Gefen, D. (2002), \u2018Reflections on the dimensions of trust and trustworthiness among online consumers\u2019, ACM SIGMIS Database, 33(3):38\u201353.","journal-title":"ACM SIGMIS Database"},{"issue":"10","key":"3_CR29_3","first-page":"19","volume":"X","author":"E. Gerck","year":"2002","unstructured":"Gerck, E. (2002), \u2018Trust as qualified reliance on information\u2019, The COOK Report on Internet, X(10):19\u201324.","journal-title":"The COOK Report on Internet"},{"key":"3_CR30_3","unstructured":"Giddens, A. (1990), The Consequences of Modernity, Polity Press."},{"key":"3_CR31_3","doi-asserted-by":"crossref","unstructured":"Grandison, T. and Sloman, M. (2000), \u2018A survey of trust in internet applications\u2019, IEEE Communications Surveys and Tutorials, 3(4).","DOI":"10.1109\/COMST.2000.5340804"},{"key":"3_CR32_3","doi-asserted-by":"crossref","unstructured":"Griffiths, N. (2006), \u2018A fuzzy approach to reasoning with trust, distrust and insufficient trust\u2019, in: Klusch, M., Rovatsos, M., Payne, T. R. (eds.), CIA'06, 10th International Workshop on Cooperative Information Agents, volume 4149 of LNCS 4149, pp 360\u2013374, Edinburgh, U.K.","DOI":"10.1007\/11839354_26"},{"key":"3_CR33_3","doi-asserted-by":"crossref","unstructured":"Guha, R., Kumar, R., Raghavan, P., Tomkins, A. (2004), \u2018Propagation of trust and distrust\u2019, in: Feldman, S. I., Uretsky, M., Najork, M., Wills, C. S. (eds.), WWW'04, 13th International Conference on World Wide Web, pp 403\u2013412, New York, USA.","DOI":"10.1145\/988672.988727"},{"key":"3_CR34_3","doi-asserted-by":"crossref","unstructured":"Gutscher, A. (2007), \u2018A trust model for an open, decentralized reputation system\u2019, in: Etalle, S., Marsh, S. (eds), IFIPTM'07, 1st Joint iTrust and PST Conferences on Privacy Trust Management and Security, pp 285\u2013300, Moncton, Canada.","DOI":"10.1007\/978-0-387-73655-6_19"},{"issue":"3","key":"3_CR35_3","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.ijar.2004.05.010","volume":"38","author":"R. Haenni","year":"2005","unstructured":"Haenni, R. (2005), \u2018Using probabilistic argumentation for key validation in public-key cryptography\u2019, International Journal of Approximate Reasoning, 38(3):355\u2013376.","journal-title":"International Journal of Approximate Reasoning"},{"key":"3_CR36_3","doi-asserted-by":"crossref","unstructured":"Haenni, R. (2009), \u2018Non-additive degrees of belief\u2019, in: Huber, F. and Schmidt-Petri, C. (eds.), Degrees of Belief, pp 121\u2013160, Springer.","DOI":"10.1007\/978-1-4020-9198-8_6"},{"key":"3_CR37_3","unstructured":"Haenni, R. and Jonczy, J. (2007), \u2018A new approach to PGP's web of trust\u2019, EEMA'07, European e-Identity Conference, Paris, France."},{"key":"3_CR38_3","doi-asserted-by":"crossref","unstructured":"Haenni, R., Jonczy, J., Kohlas, R. (2007), \u2018Two-layer models for managing authenticity and trust\u2019, in: Song, R., Korba, L., Yee, G. (eds.), Trust in E-Services: Technologies, Practices and Challenges, chapter VI, pp 140\u2013167, Idea Group Publishing.","DOI":"10.4018\/978-1-59904-207-7.ch006"},{"key":"3_CR39_3","first-page":"29","volume":"10","author":"P. H\u00e1jek","year":"1991","unstructured":"H\u00e1jek, P. and Vald\u00e9s, J. J. (1991), \u2018Generalized algebraic approach to uncertainty processing in rule-based expert systems (dempsteroids)\u2019, Computers and Artificial Intelligence, 10:29\u201342.","journal-title":"Computers and Artificial Intelligence"},{"key":"3_CR40_3","unstructured":"Hardin, R. (2004), Trust and Trustworthiness, vol. 4 of Series on Trust. Russell Sage Foundation Publications."},{"key":"3_CR41_3","unstructured":"Hardin, R. (2006), Trust (Key Concepts), Polity."},{"issue":"1","key":"3_CR42_3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/963770.963772","volume":"22","author":"J. L. Herlocker","year":"2004","unstructured":"Herlocker, J. L., Konstan, J. A., Terveen, L. G., Riedl, J. T. (2004), \u2018Evaluating collaborative filtering recommender systems\u2019, ACM Transactions on Information Systems, 22(1):5\u201353.","journal-title":"ACM Transactions on Information Systems"},{"key":"3_CR43_3","doi-asserted-by":"crossref","unstructured":"Hildebrandt, M. and Gutwirth, S. (eds.) (2007), Profiling the European Citizen. Springer.","DOI":"10.1007\/978-1-4020-6914-7"},{"key":"3_CR44_3","unstructured":"Jaquet-Chiffelle, D. O. (2007), \u2018Direct and Indirect Profiling in the Light of Virtual Persons\u2019, in: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen, pp 34\u2013 43, Springer."},{"key":"3_CR45_3","unstructured":"Jaquet-Chiffelle, D. O., Anrig, B., Benoist, E., Haenni, R., Hildebrandt, M., Kosta, E., Lefever, K. (eds.) (2008), FIDIS Deliverable D2.13: Virtual Persons and Identities, Download: http:\/\/www.fidis.net\/deliverables."},{"key":"3_CR46_3","unstructured":"Jaquet-Chiffelle, D. O., Anrig, B., Zwingelberg, H. (eds.) (2008), FIDIS Deliverable D17.1: Modelling New Forms of Identities: Applicability of the Model Based on Virtual Persons, Download: http:\/\/www.fidis.net."},{"issue":"2","key":"3_CR47_3","doi-asserted-by":"publisher","first-page":"55","DOI":"10.2307\/2564672","volume":"96","author":"K. Jones","year":"1999","unstructured":"Jones, K. (1999), \u2018Second-hand moral knowledge\u2019, The Journal of Philosophy, 96(2):55\u201378.","journal-title":"The Journal of Philosophy"},{"issue":"12","key":"3_CR48_3","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/355112.355128","volume":"43","author":"S. Jones","year":"2000","unstructured":"Jones, S., Wilikens, M., Morris, P., Masera, M. (2000), \u2018Trust requirements in e-business\u2019, Communications of the ACM, 43(12):81\u201387.","journal-title":"Communications of the ACM"},{"key":"3_CR49_3","unstructured":"Jonczy, J. and Haenni, R. (2005), \u2018Credential networks: a general model for distributed trust and authenticity management\u2019, in: Ghorbani, A., Marsh, S. (eds), PST\u201905, 3rd Annual Conference on Privacy, Security and Trust, pp 101\u2013112, St. Andrews, Canada."},{"key":"3_CR50_3","unstructured":"Josang, A. (1999), \u2018An algebra for assessing trust in certification chains\u2019, NDSS'99: 6th Annual Symposium on Network and Distributed System Security, San Diego, USA."},{"issue":"3","key":"3_CR51_3","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A. Josang","year":"2001","unstructured":"Josang, A. (2001), \u2018A logic for uncertain probabilities\u2019, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3):279\u2013311.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"2","key":"3_CR52_3","first-page":"139","volume":"4","author":"A. Josang","year":"2006","unstructured":"Josang, A., Gray, E., Kinateder, M. (2006), \u2018Simplification and analysis of transitive trust networks\u2019, Web Intelligence and Agent Systems, 4(2):139\u2013161.","journal-title":"Web Intelligence and Agent Systems"},{"issue":"2","key":"3_CR53_3","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. Josang","year":"2007","unstructured":"Josang, A., Ismail, R., Boyd, B. (2007), \u2018A survey of trust and reputation systems for online service provision\u2019, Decision Support Systems, 43(2):618\u2013644.","journal-title":"Decision Support Systems"},{"key":"3_CR54_3","doi-asserted-by":"crossref","unstructured":"Josang, A. and Lo Presti, S. (2004), \u2018Anlysing the relationship between risk and trust\u2019, in: Jensen, C. D., Poslad, S., Dimitrakos, T. (eds.), iTrust'04: 2nd International Conference on Trust Management, LNCS 2995, pp 135\u2013145, Oxford, U.K.","DOI":"10.1007\/978-3-540-24747-0_11"},{"key":"3_CR55_3","unstructured":"Kantorowicz, E. H. (1957), The King's Two Bodies \u2014 A Study in Mediaeval Political Theology, Princeton University Press."},{"key":"3_CR56_3","doi-asserted-by":"crossref","unstructured":"Kinateder, M. and Rothermel, K. (2003), \u2018Architecture and algorithms for a distributed reputation system\u2019, iTrust'03: 1st International Conference on Trust Management, LNCS 2692, pp 1\u201316, Heraklion, Greece.","DOI":"10.1007\/3-540-44875-6_1"},{"key":"3_CR57_3","volume-title":"Decentralized Trust Evaluation and Public-Key Authentication","author":"R. Kohlas","year":"2007","unstructured":"Kohlas, R. (2007), Decentralized Trust Evaluation and Public-Key Authentication, PhD thesis, University of Bern, Switzerland."},{"key":"3_CR58_3","unstructured":"Koops, B. J. and Jaquet-Chiffelle, D. O. (eds.) (2008), FIDIS Deliverable D17.2: New (Id)entities and the Law: Perspectives on Legal Personhood for Non-Humans, Download http:\/\/www.fidis.net."},{"key":"3_CR59_3","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1080\/00140139208967392","volume":"35","author":"J. Lee","year":"1992","unstructured":"Lee, J. and Moray, N. (1992), \u2018Trust, control strategies and allocation of function in human-machine systems\u2019, Ergonomics, 35:1243\u20131270.","journal-title":"Ergonomics"},{"key":"3_CR60_3","unstructured":"Lewicki, R. J. (2006), \u2018Trust and distrust\u2019, in: Kupfer Schneider, A. and Honeyman, C. (eds.), The Negotiator's Fieldbook: The Desk Reference for the Experienced Negotiator, ch. 22, pp 191\u2013202, American Bar Association."},{"key":"3_CR61_3","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1146\/annurev.polisci.3.1.475","volume":"3","author":"M. Levi","year":"2000","unstructured":"Levi, M. and Stoker, L. (2000), \u2018Political trust and trustworthiness\u2019, Annual Review of Political Science, 3:475\u2013507.","journal-title":"Annual Review of Political Science"},{"key":"3_CR62_3","unstructured":"Levien, R. and Aiken, A. (1998), \u2018Attack-resistant trust metrics for public key certification\u2019, Security'98, 7th USENIX Security Symposium, pp 229\u2013242, San Antonio, USA."},{"issue":"2","key":"3_CR63_3","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MC.2007.76","volume":"40","author":"H. Li","year":"2000","unstructured":"Li, H. and Singhal, M. (2000), \u2018Trust management in distributed systems\u2019, Computer, 40(2):45\u201353.","journal-title":"Computer"},{"key":"3_CR64_3","unstructured":"Luhmann, N. (2000), Vertrauen \u2014 ein Mechanismus der Reduktion sozialer Komplexit\u00e4t, UTP, Stuttgart, Germany, 4th ed."},{"key":"3_CR65_3","unstructured":"Mahoney, G., Myrvold, W., Shoja, G. C. (2005), \u2018Generic reliability trust model\u2019, in: Ghor-bani. A. and Marsh, S. (eds.), PST'05: 3rd Annual Conference on Privacy, Security and Trust, pp 113\u2013120, St. Andrews, Canada."},{"issue":"2","key":"3_CR66_3","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/4236.832944","volume":"4","author":"D. W. Manchala","year":"2000","unstructured":"Manchala, D. W. (2000), \u2018E-commerce trust metrics and models\u2019, IEEE Internet Computing, 4(2):36\u201344.","journal-title":"IEEE Internet Computing"},{"key":"3_CR67_3","volume-title":"Formalising Trust as a Computational Concept","author":"S. P. Marsh","year":"1994","unstructured":"Marsh, S. P. (1994), Formalising Trust as a Computational Concept, PhD thesis, University of Stirling, Scotland, U.K."},{"key":"3_CR68_3","doi-asserted-by":"crossref","unstructured":"Marsh, S. and Dibben, M. R. (2005), \u2018Trust, untrust, distrust and mistrust \u2014 an exploration of the dark(er) side\u2019 in: Herrmann, P., Issarny, V., Shiu, S. (eds.), iTrust'05: 3rd International Conference on Trust Management, LNCS 3477, pp 17\u201333, Rocquencourt, France.","DOI":"10.1007\/11429760_2"},{"key":"3_CR69_3","doi-asserted-by":"crossref","unstructured":"Maurer, U. (1996), \u2018Modelling a public-key infrastructure\u2019, in: Bertino, E., Kurth, H., Mar-tella, G., Montolivo, E. (eds.), ESORICS, European Symposium on Research in Computer Security, LNCS 1146, pp 324\u2013350.","DOI":"10.1007\/3-540-61770-1_45"},{"key":"3_CR70_3","volume-title":"The meanings of trust, Technical report, Carlson School of Management","author":"H. D. McKnight","year":"1996","unstructured":"McKnight, H. D. and Chervany, N. L. (1996), The meanings of trust, Technical report, Carlson School of Management, University of Minnesota, Minneapolis, USA."},{"volume-title":"\u2018Trust\u2019, The Stanford Encyclopedia of Philosophy, Center for the Study of Language and Information","year":"2006","key":"3_CR71_3","unstructured":"McLeod, C., Zalta, E. N. (ed) (2006), \u2018Trust\u2019, The Stanford Encyclopedia of Philosophy, Center for the Study of Language and Information, Stanford University, USA."},{"issue":"5\u20136","key":"3_CR72_3","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/S0020-7373(87)80013-5","volume":"27","author":"B. M. Muir","year":"1987","unstructured":"Muir, B. M. (1987), \u2018Trust between humans and machines, and the design of decision aids\u2019, International Journal of Man-Machine Studies, 27(5\u20136):527\u2013539.","journal-title":"International Journal of Man-Machine Studies"},{"issue":"2","key":"3_CR73_3","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1177\/0192512101222004","volume":"22","author":"K. Newton","year":"2001","unstructured":"Newton, K. (2001), \u2018Trust, social capital, civil society, and democracy\u2019, International Political Science Review, 22(2):201\u2013214.","journal-title":"International Political Science Review"},{"key":"3_CR74_3","volume-title":"Knowledge-Based Systems as Companions: Trust, Human Computer Interaction and Complex Systems","author":"J. H. Numan","year":"1998","unstructured":"Numan, J. H. (1998), Knowledge-Based Systems as Companions: Trust, Human Computer Interaction and Complex Systems, PhD thesis, University of Groningen, The Netherlands."},{"issue":"8","key":"3_CR75_3","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1177\/0018726701548003","volume":"54","author":"A. Oliver","year":"2001","unstructured":"Oliver, A. and Montgomery, K. (2001), \u2018A system cybernetic approach to the dynamics of individual- and organizational-level trust\u2019, Human relations, 54(8):1045\u20131063.","journal-title":"Human relations"},{"issue":"1\u20132","key":"3_CR76_3","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1023\/B:ELEC.0000009279.89570.27","volume":"4","author":"M. A. Patton","year":"2004","unstructured":"Patton, M. A. and Josang, A. (2004), \u2018Technologies for trust in electronic commerce\u2019, Electronic Commerce Research, 4(1\u20132):9\u201321.","journal-title":"Electronic Commerce Research"},{"issue":"6","key":"3_CR77_3","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/65.806987","volume":"13","author":"R. Perlman","year":"1999","unstructured":"Perlman, R. (1999), \u2018An overview of PKI trust models\u2019, IEEE Network, 13(6):38\u201343.","journal-title":"IEEE Network"},{"key":"3_CR78_3","volume-title":"Anonymity, Unlinkability, Undetectability, Unob-servability, Pseudonymity, and Identity Management \u2014 A Consolidated Proposal for Terminology, v.031","author":"A. Pfitzmann","year":"2008","unstructured":"Pfitzmann, A. and Hansen, M. (2008), \u2018Anonymity, Unlinkability, Undetectability, Unob-servability, Pseudonymity, and Identity Management \u2014 A Consolidated Proposal for Terminology, v.031\u2019, Technical Report, Faculty of Computer Science, Technical University, Dresden, Germany."},{"key":"3_CR79_3","unstructured":"Preece, J. and Maloney-Krichmar, D. (2003), \u2018Online communities: Focusing on sociability and usability\u2019, in: Jacko, J. and Sears, A. (eds.), The Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies and Emerging Applications, pp 596\u2013620, Lawrence Erlbaum Associates."},{"key":"3_CR80_3","doi-asserted-by":"crossref","unstructured":"Richardson, M., Agrawal, R., Domingos, P. (2003), \u2018Trust management for the semantic web\u2019, in: Fensel, D., Sycara, K. P., Mylopoulos, J. (eds.), ISWC'03, 2nd International Semantic Web Conference, LNCS 2870, pp 351\u2013368, Sanibel Island, USA.","DOI":"10.1007\/978-3-540-39718-2_23"},{"key":"3_CR81_3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1037\/0003-066X.35.1.1","volume":"35","author":"J. B. Rotter","year":"1980","unstructured":"Rotter, J. B. (1980), \u2018Interpersonal trust, trustworthiness, and gullibility\u2019, American Psychologist, 35:1\u20137.","journal-title":"American Psychologist"},{"key":"3_CR82_3","doi-asserted-by":"crossref","unstructured":"Ruohomaa, S. and Kutvonen, L. (2005), \u2018Trust management survey\u2019, in: Herrmann, P., Issarny, V., Shiu, S. (eds.), iTrust'05: 3rd International Conference on Trust Management, LNCS 3477, pp 77\u201392, Rocquencourt, France.","DOI":"10.1007\/11429760_6"},{"key":"3_CR83_3","doi-asserted-by":"crossref","unstructured":"Ruth, P., Xu, D., Bhargava, B., Regnier, F. (2004), \u2018E-notebook middleware for accountability and reputation based trust in distributed data sharing communities\u2019, in: Jensen, C. D., Poslad, S., Dimitrakos, T. (eds.), iTrust'04, 2rd International Conference on Trust Management, LNCS 2995, Oxford, U.K.","DOI":"10.1007\/978-3-540-24747-0_13"},{"key":"3_CR84_3","doi-asserted-by":"crossref","unstructured":"Ryutov, T., Zhou, L., Neuman, C., Leithead, T., Seamons, K. E. (2005), \u2018Adaptive trust negotiation and access control\u2019, SACMAT'05, 10th ACM Symposium on Access Control Models and Technologies, pp 139\u2013146, Stockholm, Sweden.","DOI":"10.1145\/1063979.1064004"},{"key":"3_CR85_3","unstructured":"Seligman, A. B. (2000), The Problem of Trust, Princeton University Press."},{"issue":"2","key":"3_CR86_3","doi-asserted-by":"publisher","first-page":"239","DOI":"10.3197\/096327199129341815","volume":"8","author":"B. Szerszynski","year":"1999","unstructured":"Szerszynski, B. (1999), \u2018Risk and trust: The performative dimension\u2019, Environmental Values, 8(2):239\u2013252.","journal-title":"Environmental Values"},{"key":"3_CR87_3","unstructured":"Sztompka, P. (1999), Trust: a Sociological Theory, Cambridge University Press."},{"issue":"1","key":"3_CR88_3","first-page":"65","volume":"3","author":"Y. Tan","year":"1998","unstructured":"Tan, Y. and Thoen, W. (1998), \u2018Towards a generic model of trust for electronic commerce\u2019, International Journal of Electronic Commerce, 3(1):65\u201381.","journal-title":"International Journal of Electronic Commerce"},{"key":"3_CR89_3","volume-title":"Distributed trust evaluation in ad-hoc networks, Master's thesis","author":"G. Theodorakopoulos","year":"2004","unstructured":"Theodorakopoulos, G. (2004), Distributed trust evaluation in ad-hoc networks, Master's thesis, University of Maryland, College Park, USA."},{"key":"3_CR90_3","doi-asserted-by":"crossref","unstructured":"Uslaner, E. M. (2002), The Moral Foundations of Trust, Cambridge University Press.","DOI":"10.1017\/CBO9780511614934"},{"issue":"2","key":"3_CR91_3","first-page":"118","volume":"3","author":"Y. Wang","year":"2007","unstructured":"Wang, Y. and Vassileva, J. (2007), \u2018Toward trust and reputation based web service selection: A survey\u2019, International Transactions on Systems Science and Applications, 3(2):118\u2013132.","journal-title":"International Transactions on Systems Science and Applications"},{"key":"3_CR92_3","doi-asserted-by":"crossref","unstructured":"Warren, M. E. (1999), Democracy and Trust, Cambridge University Press.","DOI":"10.1017\/CBO9780511659959"},{"issue":"1","key":"3_CR93_3","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1086\/467284","volume":"36","author":"O. E. Williamson","year":"1993","unstructured":"Williamson, O. E. (1993), \u2018Calculativeness, trust, and economic organization\u2019, Journal of Law & Economics, 36(1):453\u2013486.","journal-title":"Journal of Law & Economics"},{"issue":"7","key":"3_CR94_3","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L. Xiong","year":"2004","unstructured":"Xiong, L. and Liu, L. (2004), \u2018PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities\u2019, IEEE Transactions on Knowledge and Data Engineering, 16(7):843\u2013857.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"4","key":"3_CR95_3","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1111\/1467-8640.00202","volume":"18","author":"B. Yu","year":"2002","unstructured":"Yu, B. and Singh, M. P. (2002), \u2018Distributed reputation management for electronic commerce\u2019, Computational Intelligence, 18(4):535\u2013549.","journal-title":"Computational Intelligence"},{"key":"3_CR96_3","unstructured":"Zhang, Q., Yu, T., Irwin, K. (2004), \u2018A classification scheme for trust functions in reputation-based trust management\u2019, ISWC'04, 3rd International Semantic Web Conference, Workshop on \u2018Trust, Security, and Reputation on the Semantic Web\u2019, Hiroshima, Japan."},{"issue":"4\u20135","key":"3_CR97_3","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s10796-005-4807-3","volume":"7","author":"C. N. Ziegler","year":"2005","unstructured":"Ziegler, C. N. and Lausen, G. (2005), \u2018Propagation models for trust and distrust in social networks\u2019, Information Systems Frontiers, 7(4\u20135):337\u2013358.","journal-title":"Information Systems Frontiers"}],"container-title":["The Future of Identity in the Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01820-6_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:08:55Z","timestamp":1633910935000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01820-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783540884804","9783642018206"],"references-count":97,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01820-6_3","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}