{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:44:33Z","timestamp":1725533073093},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642020551"},{"type":"electronic","value":"9783642020568"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02056-8_10","type":"book-chapter","created":{"date-parts":[[2009,6,5]],"date-time":"2009-06-05T22:43:27Z","timestamp":1244241807000},"page":"149-163","source":"Crossref","is-referenced-by-count":11,"title":["Analogical Trust Reasoning"],"prefix":"10.1007","author":[{"given":"Mozhgan","family":"Tavakolifard","sequence":"first","affiliation":[]},{"given":"Peter","family":"Herrmann","sequence":"additional","affiliation":[]},{"given":"Pinar","family":"\u00d6zt\u00fcrk","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1007\/3-540-46119-1_34","volume-title":"Advances in Case-Based Reasoning","author":"S. Aguzzoli","year":"2002","unstructured":"Aguzzoli, S., Avesani, P., Massa, P.: Collaborative Case-Based Recommender Systems. In: Craw, S., Preece, A.D. (eds.) ECCBR 2002. LNCS, vol.\u00a02416, pp. 460\u2013474. Springer, Heidelberg (2002)"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-540-74949-3_16","volume-title":"Multiagent System Technologies","author":"A. Caballero","year":"2007","unstructured":"Caballero, A., Bot\u00eda, J.A., G\u00f3mez-Skarmeta, A.F.: On the Behaviour of the TRSIM Model for Trust and Reputation. In: Petta, P., M\u00fcller, J.P., Klusch, M., Georgeff, M. (eds.) MATES 2007. LNCS, vol.\u00a04687, pp. 182\u2013193. Springer, Heidelberg (2007)"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-62494-5_16","volume-title":"Security Protocols","author":"B. Christianson","year":"1997","unstructured":"Christianson, B., Harbison, W.S.: Why Isn\u2019t Trust Transitive? In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol.\u00a01189, pp. 171\u2013176. Springer, Heidelberg (1997)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Ding, L., Kolari, P., Ganjugunte, S., Finin, T., Joshi, A.: Modeling and Evaluating Trust Network Inference. Technical report, Maryland Univ. Baltimore Dept. of Computer Science and Electrical Engineering (2005)","DOI":"10.21236\/ADA439712"},{"key":"10_CR5","unstructured":"Golbeck, J., Hendler, J.: Inferring Reputation on the Semantic Web. In: Proceedings of the 13th International World Wide Web Conference (2004)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-45217-1_18","volume-title":"Cooperative Information Agents VII","author":"J. Golbeck","year":"2003","unstructured":"Golbeck, J., Parsia, B., Hendler, J.: Trust Networks on the Semantic Web. In: Klusch, M., Omicini, A., Ossowski, S., Laamanen, H. (eds.) CIA 2003. LNCS, vol.\u00a02782, pp. 238\u2013249. Springer, Heidelberg (2003)"},{"key":"10_CR7","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1145\/988672.988727","volume-title":"Proceedings of the 13th international conference on World Wide Web","author":"R. Guha","year":"2004","unstructured":"Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th international conference on World Wide Web, pp. 403\u2013412. ACM Press, New York (2004)"},{"key":"10_CR8","unstructured":"Gujral, N., DeAngelis, D., Fullam, K.K., Barber, K.S.: Modeling Multi-Dimensional Trust. In: The Proceedings of the Workshop on Trust in Agent Societies, pp. 8\u201312 (2006)"},{"key":"10_CR9","unstructured":"Holtmanns, S., Yan, Z.: Context-Aware Adaptive Trust"},{"issue":"3","key":"10_CR10","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A. J\u00f8sang","year":"2001","unstructured":"J\u00f8sang, A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a09(3), 279\u2013311 (2001)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"1-2","key":"10_CR11","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/S0004-3702(02)00259-X","volume":"141","author":"A. J\u00f8sang","year":"2002","unstructured":"J\u00f8sang, A.: The consensus operator for combining beliefs. Artificial Intelligence\u00a0141(1-2), 157\u2013170 (2002)","journal-title":"Artificial Intelligence"},{"key":"10_CR12","unstructured":"J\u00f8sang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Proceedings of the 29th Australasian Computer Science Conference, vol.\u00a048, pp. 85\u201394. Australian Computer Society (2006)"},{"key":"10_CR13","unstructured":"J\u00f8sang, A., Knapskog, S.J.: A metric for trusted systems. In: Proceedings of the 21st National Security Conference, NSA (1998)"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/11755593_14","volume-title":"Trust Management","author":"A. Josang","year":"2006","unstructured":"Josang, A., Marsh, S., Pope, S.: Exploring Different Types of Trust Propagation. In: St\u00f8len, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol.\u00a03986, pp. 179\u2013192. Springer, Heidelberg (2006)"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1002\/(SICI)1099-1174(199903)8:1<61::AID-ISAF156>3.0.CO;2-6","volume":"8","author":"C. Jung","year":"1999","unstructured":"Jung, C., Han, I., Suh, B.: Risk Analysis for Electronic Commerce Using Case-Based Reasoning. Int. J. Intell. Sys. Acc. Fin. Mgmt.\u00a08, 61\u201373 (1999)","journal-title":"Int. J. Intell. Sys. Acc. Fin. Mgmt."},{"key":"10_CR16","unstructured":"Leake, D.B.: CBR in Context: The Present and Future. Case-Based Reasoning: Experiences, Lessons, and Future Directions, 3\u201330 (1996)"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1007\/978-3-540-30468-5_31","volume-title":"On the Move to Meaningful Internet Systems 2004: CoopIS, DOA, and ODBASE","author":"P. Massa","year":"2004","unstructured":"Massa, P., Avesani, P.: Trust-Aware Collaborative Filtering for Recommender Systems. In: Meersman, R., Tari, Z. (eds.) OTM 2004. LNCS, vol.\u00a03290, pp. 492\u2013508. Springer, Heidelberg (2004)"},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/1297231.1297235","volume-title":"Proceedings of the 2007 ACM conference on Recommender systems","author":"P. Massa","year":"2007","unstructured":"Massa, P., Avesani, P.: Trust-aware recommender systems. In: Proceedings of the 2007 ACM conference on Recommender systems, pp. 17\u201324. ACM Press, New York (2007)"},{"issue":"1","key":"10_CR19","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1002\/j.1099-1174.1994.tb00054.x","volume":"3","author":"B.W. Morris","year":"1994","unstructured":"Morris, B.W.: SCAN: a case-based reasoning model for generating information system control recommendations. International Journal of Intelligent Systems in Accounting, Finance and Management\u00a03(1), 47\u201363 (1994)","journal-title":"International Journal of Intelligent Systems in Accounting, Finance and Management"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1803","DOI":"10.1007\/978-3-540-76843-2_47","volume-title":"On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS","author":"R. Neisse","year":"2007","unstructured":"Neisse, R., Wegdam, M., van Sinderen, M., Lenzini, G.: Trust Management Model and Architecture for Context-Aware Service Platforms. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part II. LNCS, vol.\u00a04804, pp. 1803\u20131820. Springer, Heidelberg (2007)"},{"key":"10_CR21","first-page":"93","volume-title":"Proceedings of the 11th international conference on Intelligent User Interfaces","author":"P. Pu","year":"2006","unstructured":"Pu, P., Chen, L.: Trust building with explanation interfaces. In: Proceedings of the 11th international conference on Intelligent User Interfaces, pp. 93\u2013100. ACM, New York (2006)"},{"issue":"6","key":"10_CR22","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1016\/j.knosys.2007.04.004","volume":"20","author":"P. Pu","year":"2007","unstructured":"Pu, P., Chen, L.: Trust-inspiring explanation interfaces for recommender systems. Knowledge-Based Systems\u00a020(6), 542\u2013556 (2007)","journal-title":"Knowledge-Based Systems"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Quercia, D., Hailes, S., Capra, L.: Lightweight Distributed Trust Propagation. In: Seventh IEEE International Conference on Data Mining, ICDM 2007, pp. 282\u2013291 (2007)","DOI":"10.1109\/ICDM.2007.64"},{"key":"10_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-540-85502-6_31","volume-title":"Advances in Case-Based Reasoning","author":"J.A. Recio-Garc\u00eda","year":"2008","unstructured":"Recio-Garc\u00eda, J.A., Bridge, D.G., D\u00edaz-Agudo, B., Gonz\u00e1lez-Calero, P.A.: CBR for CBR: A case-based template recommender system for building case-based systems. In: Althoff, K.-D., Bergmann, R., Minor, M., Hanft, A. (eds.) ECCBR 2008. LNCS, vol.\u00a05239, pp. 459\u2013473. Springer, Heidelberg (2008)"},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-540-75119-9_21","volume-title":"Cooperative Information Agents XI","author":"M. Rehak","year":"2007","unstructured":"Rehak, M., Pechoucek, M.: Trust modeling with context representation and generalized identities. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling, L. (eds.) CIA 2007. LNCS, vol.\u00a04676, pp. 298\u2013312. Springer, Heidelberg (2007)"},{"key":"10_CR26","unstructured":"Strang, T., Linnhoff-Popien, C.: A context modeling survey. In: Workshop on Advanced Context Modelling, Reasoning and Management as part of UbiComp (2004)"},{"key":"10_CR27","volume-title":"Proceedings of The Workshop on Web Personalization, Reputation and Recommender Systems (WPRRS 2008)","author":"M. Tavakolifard","year":"2008","unstructured":"Tavakolifard, M., Knapskog, S., Herrmann, P.: Cross-Situation Trust Reasoning. In: Proceedings of The Workshop on Web Personalization, Reputation and Recommender Systems (WPRRS 2008). IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"10_CR28","volume-title":"Proceedings of The 4th ACM International Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2008)","author":"M. Tavakolifard","year":"2008","unstructured":"Tavakolifard, M., Knapskog, S., Herrmann, P.: Trust Transferability Among Similar Contexts. In: Proceedings of The 4th ACM International Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2008). ACM, New York (2008)"},{"key":"10_CR29","unstructured":"Toivonen, S., Lenzini, G., Uusitalo, I.: Context-aware trust evaluation functions for dynamic reconfigurable systems. In: Proceedings of the Models of Trust for the Web Workshop (MTW 2006), held in conjunction with the 15th International World Wide Web Conference (WWW 2006), May 2006, vol.\u00a022 (2006)"},{"issue":"4","key":"10_CR30","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1037\/0033-295X.84.4.327","volume":"84","author":"A. Tversky","year":"1977","unstructured":"Tversky, A., et al.: Features of similarity. Psychological Review\u00a084(4), 327\u2013352 (1977)","journal-title":"Psychological Review"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Wan, K., Alagar, V.: An Intensional Functional Model of Trust. In: Proceedings of IFIPTM 2008 - Joint iTrust and PST Conferences on Privacy, Trust Management and Security, pp. 69\u201385. Springer, Boston (2008)","DOI":"10.1007\/978-0-387-09428-1_5"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02056-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T00:41:02Z","timestamp":1633567262000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02056-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642020551","9783642020568"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02056-8_10","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}