{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:44:32Z","timestamp":1725533072157},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642020551"},{"type":"electronic","value":"9783642020568"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02056-8_4","type":"book-chapter","created":{"date-parts":[[2009,6,5]],"date-time":"2009-06-05T18:43:27Z","timestamp":1244227407000},"page":"47-64","source":"Crossref","is-referenced-by-count":0,"title":["Towards Understanding the Requirements and Limitations of Reputation-Based Systems"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Hailes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/TKDE.2005.99","volume":"17","author":"G. Adomavicius","year":"2005","unstructured":"Adomavicius, G., Tuzhilin, E.: Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Transactions on Knowledge and Data Engineering\u00a017, 734\u2013749 (2005)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"4_CR2","unstructured":"Ahmed, M., Hailes, S.: Controlling contagious equilibrium. Technical report, Department of Computer Science, University College London (2009)"},{"key":"4_CR3","volume-title":"The Evolution of Cooperation","author":"R. Axelrod","year":"1984","unstructured":"Axelrod, R.: The Evolution of Cooperation. Basic Books, New York (1984)"},{"issue":"1","key":"4_CR4","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s00199-005-0045-7","volume":"30","author":"P. B\u00f3","year":"2007","unstructured":"B\u00f3, P.: Social norms, cooperation and inequality. Journal of Economic Theory\u00a030(1), 89\u2013105 (2007)","journal-title":"Journal of Economic Theory"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Boukerche, A., Li, X.: An agent-based trust and reputation management scheme for wireless sensor networks. In: IEEE GLOBECOM (2005)","DOI":"10.1109\/GLOCOM.2005.1577970"},{"key":"4_CR6","unstructured":"Buchegger, S., Le Boudec, J.Y.: The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Sophia-Antipolis, France (March 2003)"},{"key":"4_CR7","volume-title":"Proceedings of P2PEcon 2004","author":"S. Buchegger","year":"2004","unstructured":"Buchegger, S., Le Boudec, J.Y.: A robust reputation system for peer-to-peer and mobile ad-hoc networks. In: Proceedings of P2PEcon 2004, June 2004. Harvard University, Cambridge (2004)"},{"key":"4_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1159-5","volume-title":"Reputation in Artificial Societies: Social Beliefs for Social Order","author":"R. Conte","year":"2002","unstructured":"Conte, R., Paolucci, M.: Reputation in Artificial Societies: Social Beliefs for Social Order. Kluwer Academic Publishers, Dordrecht (2002)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"issue":"3","key":"4_CR10","doi-asserted-by":"publisher","first-page":"567","DOI":"10.2307\/2297904","volume":"61","author":"G. Ellison","year":"1994","unstructured":"Ellison, G.: Cooperation in the Prisoner\u2019s Dilemma with Anonymous Random Matching. Review of Economic Studies\u00a061(3), 567\u2013588 (1994)","journal-title":"Review of Economic Studies"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1257\/jep.10.3.103","volume":"10","author":"J. Farrel","year":"1996","unstructured":"Farrel, J., Rabin, M.: Cheap talk. Journal of Economic Perspectives\u00a010, 103\u2013118 (1996)","journal-title":"Journal of Economic Perspectives"},{"issue":"2","key":"4_CR12","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1162\/105864001300122476","volume":"10","author":"E. Friedman","year":"2001","unstructured":"Friedman, E., Resnick, P.: The social cost of cheap pseudonyms. Journal of Economics and Management Strategy\u00a010(2), 173\u2013199 (2001)","journal-title":"Journal of Economics and Management Strategy"},{"key":"4_CR13","unstructured":"Gambetta, D.: Can we trust trust? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, electronic edn., ch.\u00a04, pp. 49\u201372. Department of Sociology, University of Oxford, 1988\/2000 (1988)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. In: Proceedings of SASN 2004, Washington, DC, USA (October 2004)","DOI":"10.1145\/1029102.1029115"},{"key":"4_CR15","volume-title":"Trust in Society","author":"R. Gibbons","year":"2000","unstructured":"Gibbons, R.: Trust in Social Structure: Hobbes and Coase Meet Repeated Games. In: Cook, K. (ed.) Trust in Society. Russel Sage Foundation, Thousand Oaks (2000)"},{"issue":"2","key":"4_CR16","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Jurca, R., Faltings, B.: An incentive compatible reputation mechanism. In: Proceedings of the IEEE Conference on E-Commerce, pp. 285\u2013292 (2003)","DOI":"10.1145\/860722.860778"},{"issue":"1","key":"4_CR18","doi-asserted-by":"publisher","first-page":"63","DOI":"10.2307\/2297925","volume":"59","author":"M. Kandori","year":"1992","unstructured":"Kandori, M.: Social Norms and Community Enforcement. Review of Economic Studies\u00a059(1), 63\u201380 (1992)","journal-title":"Review of Economic Studies"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/11823940_30","volume-title":"Artificial Immune Systems","author":"J. Kim","year":"2006","unstructured":"Kim, J., Bentley, P., Wallenta, C., Ahmed, M., Hailes, S.: Danger is Ubiquitous: Detecting Malicious Activities in Sensor Networks using the Dendritic Cell Algorithm. In: Bersini, H., Carneiro, J. (eds.) ICARIS 2006. LNCS, vol.\u00a04163, pp. 390\u2013403. Springer, Heidelberg (2006)"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/0022-0531(82)90029-1","volume":"27","author":"D. Kreps","year":"1982","unstructured":"Kreps, D., Milgrom, P., Roberts, J., Wilson, R.: Rational Cooperation in the Finitely Repeated Prisoners Dilema. Journal of Economic Theory\u00a027, 245\u2013252 (1982)","journal-title":"Journal of Economic Theory"},{"key":"4_CR21","unstructured":"Levin, D.: Punishment in Selfish Wireless Netwroks: A Game Theoretic Analysis. In: First Workshop on the Economics of Networked Systems (2006)"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.: Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Communication and Multimedia Security (September 2002)","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Miller, N., Resnick, P., Zeckhauser, R.: Eliciting honest feedback in electronic markets. Technical report, SG Working Paper Series RWP02-039 (2002)","DOI":"10.2139\/ssrn.348940"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Quercia, D., Lad, M., Hailes, S., Capra, L., Bhatti, S.: STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions. In: Proceedings of the 21st ACM Symposium on Applied Computing, Dijon, France (April 2006)","DOI":"10.1145\/1141277.1141719"},{"key":"4_CR25","first-page":"2006","volume":"12","author":"W.T. Luke Teacy","year":"2006","unstructured":"Luke Teacy, W.T., Patel, J., Jennings, N.R., Luck, M.: Travos: Trust and reputation in the context of inaccurate information sources. Journal of Autonomous Agents and Multi-Agent Systems\u00a012 (2006)","journal-title":"Journal of Autonomous Agents and Multi-Agent Systems"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: Defending against sybil attacks via social networks. In: ACM SIGCOMM (2006)","DOI":"10.1145\/1159913.1159945"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02056-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T14:05:25Z","timestamp":1558361125000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02056-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642020551","9783642020568"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02056-8_4","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}