{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T05:26:01Z","timestamp":1770269161572,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642033537","type":"print"},{"value":"9783642033544","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03354-4_10","type":"book-chapter","created":{"date-parts":[[2009,7,23]],"date-time":"2009-07-23T02:46:56Z","timestamp":1248317216000},"page":"113-125","source":"Crossref","is-referenced-by-count":7,"title":["Incentive and Trust Issues in Assured Information Sharing"],"prefix":"10.1007","author":[{"given":"Ryan","family":"Layfield","sequence":"first","affiliation":[]},{"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[]},{"given":"Bhavani","family":"Thuraisingham","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Seredynski, M. Bouvry, P. Klopotek, M.A.: Modelling the Evolution of Cooperative Behavior in Ad Hoc Networks using a Game Based Model. Computation Intelligence and Games, 96\u2013103 (2007)","DOI":"10.1109\/CIG.2007.368084"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Cascella, R.G.: The \u201cValue\u201d of Reputation in Peer-to-Peer Networks. In: Consumer Communications and Networking Conference, 516\u2013520. (2008)","DOI":"10.1109\/ccnc08.2007.120"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Oh, J.C., Gemelli, N., Wright, R.: A Rationality-based Modeling for Coalition Support. Intelligent Systems, 172\u2013177 (2004)","DOI":"10.1109\/ICHIS.2004.12"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Li, X.: A Grassroots Approach in P2P Reputation Studies. In: Distributed Computing Systems Workshops, p. 234 (2008)","DOI":"10.1109\/ICDCS.Workshops.2008.127"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Yi, X., Han, J., Yu, P.: Truth Discover with Multiple Conflicting Information Providers on the Web. IEEE Transactions on Knowledge and Data Engineering, 796\u2013808 (2007)","DOI":"10.1109\/TKDE.2007.190745"},{"key":"10_CR6","unstructured":"Eckel, C., Wilson, R.: The Human Face of Game Theory: Trust and Reciprocity in Sequential Games. In: Trust Working Group Meeting (1999)"},{"key":"10_CR7","unstructured":"Morselli, R., Katz, J., Bhattacharjee, B.: A Game-Theoretic Framework for Analyzing Trust Inference Protocols. In: Workshop on Economics of Peer-to-Peer Systems (2004)"},{"key":"10_CR8","unstructured":"Cascella, R., Battiti, R.: Social Networking and Game Theory to Foster Cooperation, http:\/\/www.enisa.europa.eu\/doc\/pdf\/Workshop\/June2007\/Papers\/reputation\/REP_UniversityTrento.pdf"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"De Paola, A., Tamburo, A.: Reputation Management in Distributed Systems. In: 2008 IEEE Symposium on Game theory, evolutionary approach, distributed systems (March 2008)","DOI":"10.1109\/ISCCSP.2008.4537308"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Song, S., Hwang, K., Zhou, R., Kwok, Y.: Trusted P2P Transactions with Fuzzy Reputation Aggregation. IEEE Internet Computer, 24\u201334 (November 2005)","DOI":"10.1109\/MIC.2005.136"},{"key":"10_CR11","unstructured":"Agarwal, N.: Equilibrium Game Theory Under the Conditions of Repeatability. In: Proceedings of the 10th International Conference on Extending Database Technology, pp. 240\u2013256 (2006)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Andrade, N., Mowbray, M., Lima, A., Wagne, G., Ripeanu, M.: Influences on cooperation in BitTorrent communities. In: Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, pp. 111\u2013115 (2005)","DOI":"10.1145\/1080192.1080198"},{"key":"10_CR13","unstructured":"Axelrod, R.: The Evolution of Cooperation. Basic Books, New York (1984)"},{"key":"10_CR14","volume-title":"Game Theory","author":"D. Fudenberg","year":"1991","unstructured":"Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Mahajan, R., Rodrig, M., Wetherall, D., Zahorjan, J.: Experiences applying game theory to system design. In: Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems, Portland, Oregon, pp. 183\u2013190 (2004)","DOI":"10.1145\/1016527.1016531"},{"key":"10_CR16","unstructured":"Monderer, D., Tennenholtz, M.: Distributed games: from mechanisms to protocols. In: Proceedings of the sixteenth national conference on Artificial intelligence and the eleventh Innovative applications of artificial intelligence conference innovative applications of artificial intelligence, Orlando, Florida, pp. 32\u201337 (1999)"},{"key":"10_CR17","volume-title":"Game Theory: Analysis of Conflict","author":"R. Myerson","year":"1991","unstructured":"Myerson, R.: Game Theory: Analysis of Conflict. Harvard University Press, Cambridge (1991)"},{"key":"10_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8983-3","volume-title":"Genetic Programming Theory and Practice.","author":"R. Riolo","year":"2003","unstructured":"Riolo, R., Worzel., B.: Genetic Programming Theory and Practice. Kluwer Academic, Boston (2003)"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Buragohain, C., Agrawal, D., Suri, S.: A Game Theoretic Framework for Incentives in P2P Systems. Peer-to-Peer Computing, 48\u201356 (2003)","DOI":"10.1109\/PTP.2003.1231503"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Gupta, M., Judge, P., Ammar, M.: A Reputation System for Peer-to-Peer Networks. In: Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video, Monterey, CA, pp. 144\u2013152 (2003)","DOI":"10.1145\/776322.776346"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-540-73538-0_10","volume-title":"Data and Applications Security XXI","author":"R. Layfield","year":"2007","unstructured":"Layfield, R., Kantarcioglu, M., Thuraisingham, B.: Enforcing Honesty in Assured Information Sharing Within a Distributed System. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.\u00a04602, pp. 113\u2013128. Springer, Heidelberg (2007)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Kamvar, S., Schlosser, M., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web, Budapest, Hungary, pp. 640\u2013651 (2003)","DOI":"10.1145\/775240.775242"},{"key":"10_CR23","unstructured":"Grossman, W.: New Tack Wins Prisoner\u2019s Dilemma. Wired Magazine, http:\/\/www.wired.com\/culture\/lifestyle\/news\/2004\/10\/65317"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03354-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T12:51:33Z","timestamp":1558443093000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03354-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033537","9783642033544"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03354-4_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}