{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:11:57Z","timestamp":1763467917556},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642020551"},{"type":"electronic","value":"9783642020568"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02056-8_5","type":"book-chapter","created":{"date-parts":[[2009,6,5]],"date-time":"2009-06-05T22:43:27Z","timestamp":1244241807000},"page":"65-80","source":"Crossref","is-referenced-by-count":13,"title":["Elimination of Subjectivity from Trust Recommendation"],"prefix":"10.1007","author":[{"given":"Omar","family":"Hasan","sequence":"first","affiliation":[]},{"given":"Lionel","family":"Brunie","sequence":"additional","affiliation":[]},{"given":"Jean-Marc","family":"Pierson","sequence":"additional","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Hoffman, K., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. Technical Report CSD TR 07-013, Department of Computer Science, Purdue University, IN, USA (2007)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proceedings of the 33rd Hawaii International Conference on System Sciences (January 2000)","DOI":"10.1109\/HICSS.2000.926814"},{"key":"5_CR3","volume-title":"Advances in Control, Communication Networks, and Transportation Systems: In Honor of Pravin Varaiya","author":"J.S. Baras","year":"2005","unstructured":"Baras, J.S., Jiang, T.: Cooperation, Trust and Games in Wireless Networks. In: Advances in Control, Communication Networks, and Transportation Systems: In Honor of Pravin Varaiya. Birkhauser, Boston (2005)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Security - ESORICS 94","author":"T. Beth","year":"1994","unstructured":"Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol.\u00a0875. Springer, Heidelberg (1994)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Capra, L.: Engineering human trust in mobile system collaborations. In: Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, Newport Beach, CA, USA (2004)","DOI":"10.1145\/1029894.1029912"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Griffiths, N.: Task delegation using experience based multidimensional trust. In: Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, The Netherlands (2005)","DOI":"10.1145\/1082473.1082548"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Meng, K., Zhang, X., chun Xiao, X., du Zhang, G.: A bi-rating based personalized trust management model for virtual communities. In: Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control (ICNSC 2006) (2006)","DOI":"10.1109\/ICNSC.2006.1673154"},{"key":"5_CR8","unstructured":"Marsh, S.P.: Formalising Trust as a Computational Concept. PhD thesis, Department of Mathematics and Computer Science, University of Stirling, Scotland, UK (1994)"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Golbeck, J., Hendler, J.: Filmtrust: Movie recommendations using trust in web-based social networks. In: Proceedings of the 3rd IEEE Consumer Communications and Networking Conference (CCNC 2006), Las Vegas, NV, USA (2006)","DOI":"10.1109\/CCNC.2006.1593032"},{"key":"5_CR10","unstructured":"Gambetta, D.: Can We Trust Trust? In: Trust: Making and Breaking Cooperative Relatioins, pp. 213\u2013237. Department of Sociology, University of Oxford (2000)"},{"key":"5_CR11","unstructured":"Toivonen, S., Lenzini, G., Uusitalo, I.: Context-aware trust evaluation functions for dynamic reconfigurable systems. In: Proceedings of the WWW\u201906 Workshop on Models of Trust for the Web (MTW 2006) (May 2006)"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48437-X_18","volume-title":"Multi-Agent System Engineering","author":"C.M. Jonker","year":"1999","unstructured":"Jonker, C.M., Treur, J.: Formal analysis of models for the dynamics of trust based on experiences. In: Garijo, F.J., Boman, M. (eds.) MAAMAW 1999. LNCS, vol.\u00a01647. Springer, Heidelberg (1999)"},{"key":"5_CR13","unstructured":"Levien, R.: Attack resistant trust metrics. Manuscript, University of California - Berkeley (2002), http:\/\/www.levien.com\/thesis\/compact.pdf"},{"key":"5_CR14","unstructured":"Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: Empirical analysis of ebay\u2019s reputation system. The Economics of the Internet and E-Commerce\u00a011 (2002)"},{"issue":"3","key":"5_CR15","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1287\/isre.13.3.334.81","volume":"13","author":"D.H. McKnight","year":"2002","unstructured":"McKnight, D.H., Choudhury, V., Kacmar, C.: Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research\u00a013(3), 334 (2002)","journal-title":"Information Systems Research"},{"issue":"4","key":"5_CR16","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1111\/j.1467-6494.1967.tb01454.x","volume":"35","author":"J.B. Rotter","year":"1967","unstructured":"Rotter, J.B.: A new scale for the measurement of interpersonal trust. Journal of Personality\u00a035(4), 651 (1967)","journal-title":"Journal of Personality"},{"issue":"5","key":"5_CR17","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1037\/h0031464","volume":"26","author":"J.B. Rotter","year":"1971","unstructured":"Rotter, J.B.: Generalized expectancies for interpersonal trust. American Psychologist\u00a026(5), 443 (1971)","journal-title":"American Psychologist"},{"key":"5_CR18","first-page":"190","volume-title":"Cooperation and Prosocial Behaviour","author":"S.D. Boon","year":"1991","unstructured":"Boon, S.D., Holmes, J.G.: The Dynamics of Interpersonal Trust: Resolving Uncertainty in the Face of Risk. In: Cooperation and Prosocial Behaviour, p. 190. Cambridge University Press, Cambridge (1991)"},{"key":"5_CR19","unstructured":"McCord, M., Ratnasingam, P.: The impact of trust on the technology acceptance model in business to consumer e-commerce. In: Proc. of the Intl. Conf. of the Information Resources Mgmt. Association: Innovations Through IT, New Orleans, LA, USA (May 2004)"},{"key":"5_CR20","unstructured":"Kaluscha, E.A.: The Importance of Initial Consumer Trust in B2C Electronic Commerce - A Structural Equation Modeling Approach. PhD thesis, University of Klagenfurt, Austria (2004)"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Ziegler, C.N., Lausen, G.: Spreading activation models for trust propagation. In: Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE 2004) (2004)","DOI":"10.1109\/EEE.2004.1287293"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-45217-1_18","volume-title":"Cooperative Information Agents VII","author":"J. Golbeck","year":"2003","unstructured":"Golbeck, J., Parsia, B., Hendler, J.: Trust networks on the semantic web. In: Klusch, M., Omicini, A., Ossowski, S., Laamanen, H. (eds.) CIA 2003. LNCS, vol.\u00a02782, pp. 238\u2013249. Springer, Heidelberg (2003)"},{"key":"5_CR23","unstructured":"Chen, R., Yeager, W.: Poblano: A distributed trust model for peer-to-peer networks. Technical report, Sun Microsystems (2000)"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom (1997)","DOI":"10.1145\/283699.283739"},{"key":"5_CR25","volume-title":"Studies in Machiavellianism","author":"R. Christie","year":"1970","unstructured":"Christie, R., Geis, F.L.: Studies in Machiavellianism. Academic Press, New York (1970)"},{"issue":"8","key":"5_CR26","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1145\/345124.345159","volume":"43","author":"H. Hirsh","year":"2000","unstructured":"Hirsh, H., Basu, C., Davison, B.D.: Learning to personalize. Communications of the ACM\u00a043(8), 102 (2000)","journal-title":"Communications of the ACM"},{"key":"5_CR27","unstructured":"Langley, P.: Adaptive user interfaces and personalization (2008), http:\/\/www.isle.org\/~langley\/adapt.html (retrieved January 5, 2009)"},{"key":"5_CR28","unstructured":"Fog, A.: Branch prediction in the pentium family (2008), http:\/\/x86.org\/articles\/branch\/branchprediction.htm (retrieved January 5, 2009)"},{"key":"5_CR29","unstructured":"National Institute of Standards and Technology (NIST): Nist\/sematech e-handbook of statistical methods - percentiles (2008), http:\/\/www.itl.nist.gov\/div898\/handbook\/prc\/section2\/prc252.htm (retrieved January 5, 2009)"},{"key":"5_CR30","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814068","volume-title":"Random Graphs","author":"B. Bollobas","year":"2001","unstructured":"Bollobas, B.: Random Graphs. Cambridge University Press, Cambridge (2001)"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Watts, D.J., Strogatz, S.H.: Collective dynamics of \u2019small-world\u2019 networks. Nature\u00a0393 (June 1998)","DOI":"10.1038\/30918"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Albert, R., Barabasi, A.L.: Statistical mechanics of complex networks. Reviews of Modern Physics\u00a074 (January 2002)","DOI":"10.1103\/RevModPhys.74.47"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02056-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T18:05:38Z","timestamp":1558375538000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02056-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642020551","9783642020568"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02056-8_5","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}