{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:53:44Z","timestamp":1725900824081},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642052491"},{"type":"electronic","value":"9783642052507"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-05250-7_48","type":"book-chapter","created":{"date-parts":[[2009,11,21]],"date-time":"2009-11-21T08:29:40Z","timestamp":1258792180000},"page":"458-468","source":"Crossref","is-referenced-by-count":3,"title":["The Handicap Principle for Trust in Computer Security, the Semantic Web and Social Networking"],"prefix":"10.1007","author":[{"given":"Zhanshan (Sam)","family":"Ma","sequence":"first","affiliation":[]},{"given":"Axel W.","family":"Krings","sequence":"additional","affiliation":[]},{"given":"Chih-Cheng","family":"Hung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.websem.2007.03.002","volume":"5","author":"D. Artz","year":"2007","unstructured":"Artz, D., Gil, Y.: A survey of trust in computer science and the Semantic Web. J. of Web Semantics\u00a05, 58\u201371 (2007)","journal-title":"J. of Web Semantics"},{"key":"48_CR2","doi-asserted-by":"publisher","first-page":"1390","DOI":"10.1126\/science.7466396","volume":"211","author":"R. Axelrod","year":"1981","unstructured":"Axelrod, R., Hamilton, W.D.: The evolution of cooperation. Science\u00a0211, 1390\u20131396 (1981)","journal-title":"Science"},{"key":"48_CR3","first-page":"282","volume-title":"Behavioral Ecology","author":"R. Dawkins","year":"1978","unstructured":"Dawkins, R., Krebs, J.R.: Animal Signals: information or manipulation? In: Krebs, J.R., Davies, N.B. (eds.) Behavioral Ecology, pp. 282\u2013309. Blackwell, Oxford (1978)"},{"key":"48_CR4","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1098\/rspb.1995.0159","volume":"261","author":"M.S. Dawkins","year":"1995","unstructured":"Dawkins, M.S., Guildford, T.: An exaggerated preference for simple neural models of signal evolution? Proc. R. Soc. Lond. B Biol. Sci.\u00a0261, 357\u2013360 (1995)","journal-title":"Proc. R. Soc. Lond. B Biol. Sci."},{"key":"48_CR5","doi-asserted-by":"publisher","first-page":"2183","DOI":"10.1016\/j.jss.2008.03.060","volume":"81","author":"J. Dietrich","year":"2008","unstructured":"Dietrich, J., Jones, N., Wright, J.: Using social networking and semantic web technology in software engineering. The Journal of Systems and Software\u00a081, 2183\u20132193 (2008)","journal-title":"The Journal of Systems and Software"},{"key":"48_CR6","doi-asserted-by":"crossref","DOI":"10.1515\/9781400841431","volume-title":"The Altruism Equation: Seven Scientists Search for The Origins of Goodness","author":"L.A. Dugatkin","year":"2006","unstructured":"Dugatkin, L.A.: The Altruism Equation: Seven Scientists Search for The Origins of Goodness. Princeton University Press, Princeton (2006)"},{"key":"48_CR7","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/S0022-5193(05)80087-6","volume":"144","author":"A. Grafen","year":"1990","unstructured":"Grafen, A.: Sexual selection unhandicapped by the Fisher process. J. Theor. Biol.\u00a0144, 473\u2013516 (1990a)","journal-title":"J. Theor. Biol."},{"key":"48_CR8","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1016\/S0022-5193(05)80088-8","volume":"144","author":"A. Grafen","year":"1990","unstructured":"Grafen, A.: Biological signals as handicaps. J. Theor. Biol.\u00a0144, 517\u2013546 (1990b)","journal-title":"J. Theor. Biol."},{"key":"48_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0022-5193(64)90038-4","volume":"7","author":"W.D. Hamilton","year":"1964","unstructured":"Hamilton, W.D.: The genetic evolution of social behavior (I) & (II). J. Theor. Biol.\u00a07, 1\u201352 (1964)","journal-title":"J. Theor. Biol."},{"key":"48_CR10","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1098\/rspb.2001.2003","volume":"268","author":"W.D. Hamilton","year":"2001","unstructured":"Hamilton, W.D., Brown, S.P.: Autumn tree colors as a handicap signal. Proc. R. Soc. London B Biol. Sci.\u00a0268, 1489\u20131493 (2001)","journal-title":"Proc. R. Soc. London B Biol. Sci."},{"key":"48_CR11","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/2867.001.0001","volume-title":"The Evolution of Communications","author":"M.D. Hauser","year":"1997","unstructured":"Hauser, M.D.: The Evolution of Communications. MIT Press, Cambridge (1997)"},{"key":"48_CR12","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139173179","volume-title":"Evolutionary Games and Population Dynamics","author":"J. Hofbauer","year":"1998","unstructured":"Hofbauer, J., Sigmund, K.: Evolutionary Games and Population Dynamics. Cambridge Univ. Press, Cambridge (1998)"},{"key":"48_CR13","first-page":"157","volume-title":"Behavioral Ecology","author":"R.A. Johnstone","year":"1997","unstructured":"Johnstone, R.A.: The evolution of animal signals. In: Krebs, J.R., Davies, N.B. (eds.) Behavioral Ecology, pp. 157\u2013178. Blackwell, Malden (1997)"},{"key":"48_CR14","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.sysarc.2009.01.002","volume":"55","author":"D. Kovac","year":"2009","unstructured":"Kovac, D., Trc\u011bk, D.: Qualitative trust modeling in SOA. J. of Syst. Arch.\u00a055, 255\u2013263 (2009)","journal-title":"J. of Syst. Arch."},{"key":"48_CR15","unstructured":"Ma, Z.S.: New Approaches to Reliability and Survivability with Survival Analysis, Dynamic Hybrid Fault Models, and Evolutionary Game Theory. PhD Dissertation, University of Idaho (2008)"},{"key":"48_CR16","doi-asserted-by":"crossref","unstructured":"Ma, Z.S., Krings, A.W.: Dynamic Hybrid Fault Models and their Applications to Wireless Sensor Networks. In: The 11-th ACM\/IEEE International Symposium MSWiM, Vancouver, Canada, p. 9 (2008)","DOI":"10.1145\/1454503.1454524"},{"key":"48_CR17","doi-asserted-by":"crossref","unstructured":"Ma, Z.S., Krings, A.W., Sheldon, F.T.: An outline of the three-layer survivability analysis architecture for modeling strategic information warfare. In: Proc. 5th ACM CSIIRW, Oak Ridge National Lab. (2009)","DOI":"10.1145\/1558607.1558639"},{"issue":"4","key":"48_CR18","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1016\/j.adhoc.2008.03.003","volume":"7","author":"Z.S. Ma","year":"2009","unstructured":"Ma, Z.S., Krings, A.W.: Insect Sensory Systems Inspired Computing and Communications. Ad Hoc Networks\u00a07(4), 742\u2013755 (2009)","journal-title":"Ad Hoc Networks"},{"key":"48_CR19","doi-asserted-by":"crossref","unstructured":"Ma, Z.S.: Towards an Extended Evolutionary Game Theory with Survival Analysis and Agreement Algorithms for Modeling Uncertainty, Vulnerability and Deception. LNCS (2009a) (accepted)","DOI":"10.1007\/978-3-642-05253-8_67"},{"key":"48_CR20","unstructured":"Ma, Z.S.: Extended Evolutionary Game Theory Approach to Strategic Information Warfare Research. Journal of Information Warfare (2009b) (accepted)"},{"key":"48_CR21","unstructured":"Ma, Z.S.: Animal Communication Inspired Computing and Communication: A Review for Computer Scientists with a Focus on Reliability of Animal Communication Networks and the Extended Evolutionary Game Theory (2009c) (submitted)"},{"key":"48_CR22","doi-asserted-by":"crossref","unstructured":"Ma\u0155mol, F.G., Pe\u0155ez, G.M.: Security threats scenarios in trust and reputation models for distributed systems. Computers and Security (2009), doi:10.1016\/j.cose.2009.05.005","DOI":"10.1016\/j.cose.2009.05.005"},{"key":"48_CR23","doi-asserted-by":"publisher","first-page":"1034","DOI":"10.1016\/S0003-3472(05)80161-7","volume":"42","author":"J. Maynard Smith","year":"1991","unstructured":"Maynard Smith, J.: Honest signaling: Sir Philip Sydney game. Animal Behavior\u00a042, 1034\u20131035 (1991)","journal-title":"Animal Behavior"},{"key":"48_CR24","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1093\/oso\/9780198526841.001.0001","volume-title":"Animal Signals","author":"J. Maynard Smith","year":"2003","unstructured":"Maynard Smith, J., Harper, D.: Animal Signals, 164 pp. Oxford University Press, Oxford (2003)"},{"volume-title":"Animal Communication Networks","year":"2005","key":"48_CR25","unstructured":"McGregor, P.K. (ed.): Animal Communication Networks. Cambridge University Press, Cambridge (2005)"},{"key":"48_CR26","unstructured":"Mitchell, R.W.: A framework for discussing deception. In: Mitchell, R.W., Thompson, N.S. (eds.) Deception: perspectives on human and nonhuman deceit. State University of New York Press (1986)"},{"key":"48_CR27","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1017\/CBO9780511542633","volume-title":"Evolutionary Game Theory, Natural Selection and Darwinian Dynamics","author":"T.L. Vincent","year":"2005","unstructured":"Vincent, T.L., Brown, J.L.: Evolutionary Game Theory, Natural Selection and Darwinian Dynamics, 382 pp. Cambridge University Press, Cambridge (2005)"},{"key":"48_CR28","unstructured":"Olmedilla, D., Rana, O., Matthews, B., Nejdl, W.: Security and trust issues in semantic grids. In: Proceedings of the Dagsthul Seminar, Semantic Grid, vol.\u00a005271 (2005)"},{"key":"48_CR29","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.cose.2008.11.009","volume":"28","author":"M. Omar","year":"2009","unstructured":"Omar, M., Challal, Y., Bouabdallah, A.: Reliable and fully distributed trust model for mobile ad hoc networks. Computers & Security\u00a028, 199\u2013214 (2009)","journal-title":"Computers & Security"},{"key":"48_CR30","volume-title":"The Evolution of Animal Communications","author":"W.A. Searcy","year":"2005","unstructured":"Searcy, W.A., Nowicki, S.: The Evolution of Animal Communications. Princeton Univ., Princeton (2005)"},{"key":"48_CR31","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1146\/annurev.psych.54.101601.145121","volume":"54","author":"R.M. Seyfarth","year":"2003","unstructured":"Seyfarth, R.M., Cheney, D.L.: Signalers and receivers in animal communications. Annu. Rev. Psychol.\u00a054, 145\u2013173 (2003)","journal-title":"Annu. Rev. Psychol."},{"key":"48_CR32","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1006\/anbe.1999.1312","volume":"59","author":"J.B. Silk","year":"2000","unstructured":"Silk, J.B., Kaldor, E., Boyd, R.: Cheap talk when interests conflict. Anim. Behav.\u00a059, 423\u2013432 (2000)","journal-title":"Anim. Behav."},{"issue":"7","key":"48_CR33","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.tree.2007.03.006","volume":"22","author":"C. Cate ten","year":"2007","unstructured":"ten Cate, C., Rowe, C.: Biases in signal evolution: learning makes a difference. Trends in Ecology and Evolution\u00a022(7), 380\u2013387 (2007)","journal-title":"Trends in Ecology and Evolution"},{"key":"48_CR34","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1086\/406755","volume":"46","author":"R.L. Trivers","year":"1971","unstructured":"Trivers, R.L.: The evolution of reciprocal altruism. Quarterly Review of Biology\u00a046, 189\u2013226 (1971)","journal-title":"Quarterly Review of Biology"},{"key":"48_CR35","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/0022-5193(75)90111-3","volume":"53","author":"A. Zahavi","year":"1975","unstructured":"Zahavi, A.: Mate selection\u2013a selection for a handicap. J. Theor. Biol.\u00a053, 205\u2013214 (1975)","journal-title":"J. Theor. Biol."},{"key":"48_CR36","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195100358.001.0001","volume-title":"The Handicap Principle: A Missing Piece of Darwin\u2019s Puzzle","author":"A. Zahavi","year":"1997","unstructured":"Zahavi, A.: The Handicap Principle: A Missing Piece of Darwin\u2019s Puzzle. Oxford Univ. Press, Oxford (1997)"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems and Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-05250-7_48.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,17]],"date-time":"2024-03-17T19:32:04Z","timestamp":1710703924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-05250-7_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642052491","9783642052507"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-05250-7_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}