{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:33:53Z","timestamp":1725536033689},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033148"},{"type":"electronic","value":"9783642033155"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03315-5_10","type":"book-chapter","created":{"date-parts":[[2009,7,25]],"date-time":"2009-07-25T07:15:46Z","timestamp":1248506146000},"page":"135-150","source":"Crossref","is-referenced-by-count":5,"title":["Enhancing Multilateral Security in and by Reputation Systems"],"prefix":"10.1007","author":[{"given":"Sandra","family":"Steinbrecher","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"9","key":"10_CR1","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/s11623-007-0221-y","volume":"31","author":"K. Borcea-Pfitzmann","year":"2007","unstructured":"Borcea-Pfitzmann, K., Hansen, M., Liesebach, K., Pfitzmann, A., Steinbrecher, S.: Managing one\u2019s identities in organisational and social settings. DuD, Datenschutz und Datensicherheit\u00a031(9), 671\u2013675 (2007)","journal-title":"DuD, Datenschutz und Datensicherheit"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Buskens, V., Raub, W.: Embedded trust: Control and learning. In: Lawler, E., Thye, S. (eds.) Group Cohesion, Trust, and Solidarity. Advances in Group Processes, vol.\u00a019, pp. 167\u2013202 (2001)","DOI":"10.1016\/S0882-6145(02)19007-2"},{"key":"10_CR3","volume-title":"Data Protection Law, Approaching Its Rationale, Logic and Limits","author":"L. Bygrave","year":"2002","unstructured":"Bygrave, L.: Data Protection Law, Approaching Its Rationale, Logic and Limits. Kluwer Law International, The Hague (2002)"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/1911840","volume":"56","author":"C. Camerer","year":"1988","unstructured":"Camerer, C., Weigelt, K.: Experimental tests of a sequential equilibrium reputation model. Econometrica\u00a056, 1\u201336 (1988)","journal-title":"Econometrica"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/3-540-39805-8_28","volume-title":"Advances in Cryptology - EUROCRYPT \u201985","author":"D. Chaum","year":"1986","unstructured":"Chaum, D.: Showing credentials without identification. Signatures transferred between unconditionally unlinkable pseudonyms. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol.\u00a0219, pp. 241\u2013244. Springer, Heidelberg (1986)"},{"key":"10_CR6","first-page":"84","volume-title":"DIM 2005, Proceedings of the 2005 ACM Workshop on Digital Identity Management","author":"S. Clau\u00df","year":"2005","unstructured":"Clau\u00df, S., Kesdogan, D., K\u00f6lsch, T., Pimenidis, L., Schiffner, S., Steinbrecher, S.: Privacy enhancing identity management: Protection against re-identification and profiling. In: Goto, A. (ed.) DIM 2005, Proceedings of the 2005 ACM Workshop on Digital Identity Management, Fairfax, Virgina, USA, November 2005, pp. 84\u201393. ACM, New York (2005)"},{"issue":"2","key":"10_CR7","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/S1389-1286(01)00217-1","volume":"37","author":"S. Clau\u00df","year":"2001","unstructured":"Clau\u00df, S., K\u00f6hntopp, M.: Identity management and its support of multilateral security. Computer Networks\u00a037(2), 205\u2013219 (2001)","journal-title":"Computer Networks"},{"key":"10_CR8","first-page":"8","volume":"67","author":"S. Clau\u00df","year":"2002","unstructured":"Clau\u00df, S., Pfitzmann, A., Hansen, M., Van Herreweghen, E.: Privacy-enhancing identity management. The IPTS Report\u00a067, 8\u201316 (2002)","journal-title":"The IPTS Report"},{"key":"10_CR9","first-page":"49","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"P. Dasgupta","year":"2000","unstructured":"Dasgupta, P.: Trust as a commodity. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 49\u201372. Department of Sociology, University Oxford (2000)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Dellarocas, C.: The digitization of word-of-mouth: Promise and challenges of online feedback mechanisms. Management Science, 1407\u20131424 (October 2003)","DOI":"10.1287\/mnsc.49.10.1407.17308"},{"issue":"3","key":"10_CR11","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1287\/isre.1060.0092","volume":"17","author":"C. Dellarocas","year":"2006","unstructured":"Dellarocas, C.: Research note \u2013 how often should reputation mechanisms update a trader\u2019s reputation profile? Information Systems Research\u00a017(3), 271\u2013285 (2006)","journal-title":"Information Systems Research"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"key":"10_CR13","unstructured":"ENISA. Position paper. reputation-based systems: a security analysis (2007), http:\/\/www.enisa.europa.eu\/doc\/pdf\/deliverables\/enisa_pp_reputation_based_system.pdf (letzter Abruf 09.02.08)"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1162\/105864001300122476","volume":"10","author":"E. Friedman","year":"1999","unstructured":"Friedman, E., Resnick, P.: The social cost of cheap pseudonyms. Journal of Economics and Management Strategy\u00a010, 173\u2013199 (1999)","journal-title":"Journal of Economics and Management Strategy"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","volume-title":"Designing Privacy Enhancing Technologies","author":"M. Hansen","year":"2001","unstructured":"Hansen, M., Pfitzmann, A.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. Version 0.8 in: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 1\u20139. Springer, Heidelberg (2001); Version 0.30 in: Balzer, R., Kpsell, S., Lazarek, H. (Hg.) Fachterminologie Datenschutz und Datensicherheit Deutsch - Russisch - Englisch; FGI - Forschungsgesellschaft Informatik, Technische Universitt Wien, Wien, February 2008, pp. 111-144 (2008); Version 0.31, http:\/\/dud.inf.tu-resden.de\/literatur\/Anon_Terminology_v0.31.pdf (2007)"},{"key":"10_CR16","first-page":"180","volume-title":"eAdoption and the Knowledge Economy: Issues, Applications, Case Studies","author":"T. Mahler","year":"2004","unstructured":"Mahler, T., Olsen, T.: Reputation systems and data protection law. In: eAdoption and the Knowledge Economy: Issues, Applications, Case Studies, pp. 180\u2013187. IOS Press, Amsterdam (2004)"},{"key":"10_CR17","unstructured":"Mui, L.: Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks. Ph.D Thesis, Massachusetts Institute of Technology (2003)"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-540-85735-8_8","volume-title":"Trust, Privacy and Security in Digital Business","author":"F. Pingel","year":"2008","unstructured":"Pingel, F., Steinbrecher, S.: Multilateral secure cross-community reputation systems. In: Furnell, S.M., Katsikas, S.K., Lioy, A. (eds.) TrustBus 2008. LNCS, vol.\u00a05185, pp. 69\u201378. Springer, Heidelberg (2008)"},{"key":"10_CR19","series-title":"Technology, Infrastructure, Economy","first-page":"21","volume-title":"Multilateral Security in Communications","author":"K. Rannenberg","year":"1999","unstructured":"Rannenberg, K., Pfitzmann, A., M\u00fcller, G.: IT security and multilateral security. In: Mller, G., Rannenberg, K. (eds.) Multilateral Security in Communications, Mnchen. Technology, Infrastructure, Economy, vol.\u00a03, pp. 21\u201329. Addison-Wesley, Reading (1999)"},{"issue":"12","key":"10_CR20","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P. Resnick","year":"2000","unstructured":"Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Communications of the ACM\u00a043(12), 45\u201348 (2000)","journal-title":"Communications of the ACM"},{"key":"10_CR21","unstructured":"Rheingold, H.: The Virtual Community: Homesteading on the Electronic Frontier. Perseus Books (1993)"},{"key":"10_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-540-30079-3_8","volume-title":"Trust and Privacy in Digital Business","author":"S. Steinbrecher","year":"2004","unstructured":"Steinbrecher, S.: Balancing privacy and trust in electronic marketplaces. In: Katsikas, S.K., L\u00f3pez, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol.\u00a03184, pp. 70\u201379. Springer, Heidelberg (2004)"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Steinbrecher, S.: Design options for privacy-respecting reputation systems within centralised internet communities. In: Proceedings of IFIP Sec 2006, 21st IFIP International Information Security Conference: Security and Privacy in Dynamic Environments (May 2006)","DOI":"10.1007\/0-387-33406-8_11"},{"key":"10_CR24","first-page":"245","volume-title":"International Information Security Workshops","author":"M. Voss","year":"2004","unstructured":"Voss, M.: Privacy preserving online reputation systems. In: International Information Security Workshops, pp. 245\u2013260. Kluwer, Dordrecht (2004)"},{"issue":"6","key":"10_CR25","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1016\/S1389-1286(00)00029-3","volume":"32","author":"G. Wolf","year":"2000","unstructured":"Wolf, G., Pfitzmann, A.: Properties of protection goals and their integration into a user interface. Computer Networks\u00a032(6), 685\u2013699 (2000)","journal-title":"Computer Networks"}],"container-title":["IFIP Advances in Information and Communication Technology","The Future of Identity in the Information Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03315-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T17:52:48Z","timestamp":1558461168000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03315-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033148","9783642033155"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03315-5_10","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}