{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:06:50Z","timestamp":1742962010277,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642111440"},{"type":"electronic","value":"9783642111457"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-11145-7_30","type":"book-chapter","created":{"date-parts":[[2010,1,13]],"date-time":"2010-01-13T08:23:04Z","timestamp":1263370984000},"page":"385-395","source":"Crossref","is-referenced-by-count":0,"title":["TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics"],"prefix":"10.1007","author":[{"given":"Guangquan","family":"Xu","sequence":"first","affiliation":[]},{"given":"Zhiyong","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Xiaohong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hutong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yongxin","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Shizhan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guozheng","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","first-page":"33","volume-title":"Artificial Intelligence Review","author":"J. Sabater","year":"2005","unstructured":"Sabater, J., Sierra, C.: Review on Computational Trust and Reputation Models. In: Artificial Intelligence Review, vol.\u00a024, pp. 33\u201360. Springer, Barcelona (2005)"},{"key":"30_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1007\/978-3-540-30502-6_10","volume-title":"Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making","author":"C. Liu","year":"2004","unstructured":"Liu, C., Ozols, M.A., Orgun, M.: A temporalised belief logic for specifying the dynamics of trust for multi-agent systems. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, vol.\u00a03321, pp. 142\u2013156. Springer, Heidelberg (2004)"},{"key":"30_CR3","unstructured":"Falcone, R., Castelfranchi, C.: Trust Dynamics: How Trust is influenced by direct experiences and by Trust itself. In: AAMAS 2004, New York, USA, July 19-23 (2004)"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"Chang, J.S., Wang, H.M., Yin, G.: DyTrust: A Time-Frame Based Dynamic Trust Model for P2P Systems. Chinese Journal of Computers\u00a029(8) (August 2006)","DOI":"10.1007\/11927587_14"},{"key":"30_CR5","doi-asserted-by":"publisher","first-page":"1583","DOI":"10.1016\/j.eswa.2007.08.071","volume":"35","author":"W. Zhang","year":"2008","unstructured":"Zhang, W., Liu, L., Zhu, Y.C.: Using fuzzy cognitive time maps for modeling and evaluating trust dynamics in the virtual enterprises. Expert Systems with Applications\u00a035, 1583\u20131592 (2008)","journal-title":"Expert Systems with Applications"},{"issue":"7","key":"30_CR6","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1139922.1139924","volume":"49","author":"L.J. Hoffman","year":"2006","unstructured":"Hoffman, L.J., Lawson, J.K., Blum, J.: Trust beyond security: an expanded trust model. Communications of the ACM\u00a049(7), 94\u2013101 (2006)","journal-title":"Communications of the ACM"},{"key":"30_CR7","unstructured":"Jonker, C., Treur, J.: Formal analysis of models for the dynamics of trust based on experiences. In: AA 1999 Workshop on Deception, Fraud and Trust in Agent Societies, Seattle, USA, May 1, pp. 81\u201394 (1999)"},{"key":"30_CR8","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/3-540-45547-7_4","volume-title":"Trust in Cyber-societies","author":"R. Falcone","year":"2001","unstructured":"Falcone, R., Castelfranchi, C.: The socio-cognitive dynamics of trust: does trust create trust? In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) AA-WS 2000. LNCS (LNAI), vol.\u00a02246, pp. 55\u201372. Springer, Heidelberg (2001)"},{"key":"30_CR9","volume-title":"Research on the representation of time memory: succession & innovation","author":"B.Y. Li","year":"2006","unstructured":"Li, B.Y., Huang, X.T.: Research on the representation of time memory: succession & innovation. Xinhua Press, Beijing (2006) (in Chinese)"},{"key":"30_CR10","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1016\/S0022-5371(69)80069-1","volume":"8","author":"A.M. Collins","year":"1969","unstructured":"Collins, A.M., Quillian, M.R.: Retrieved time from semantic memory. Journal of Verbal Learning and Verbal Behavior\u00a08, 240\u2013247 (1969)","journal-title":"Journal of Verbal Learning and Verbal Behavior"},{"key":"30_CR11","volume-title":"Studies in long-term memory","author":"D.E. Broadbent","year":"1975","unstructured":"Broadbent, D.E.: The magical number seven after fifteen years. In: Kennney, R.A., Wikes, A. (eds.) Studies in long-term memory. Wiley, NY (1975)"},{"key":"30_CR12","unstructured":"Matthew, H.E.: Forgetting and remembering in psychology: Commentary on Paul Connerton\u2019s Seven Types of Forgetting (2008), http:\/\/mss.sagepub.com\/cgi\/content\/abstract\/1\/3\/273"},{"issue":"1","key":"30_CR13","doi-asserted-by":"publisher","first-page":"93","DOI":"10.2753\/JEC1086-4415120104","volume":"12","author":"G. Xu","year":"2007","unstructured":"Xu, G., Feng, Z., Wu, H., Zhao, D.: Swift Trust in Virtual Temporary System: A Model Based on Dempster-Shafer Theory of Belief Functions. International Journal of Electronic Commerce (IJEC)\u00a012(1), 93\u2013127 (Fall 2007)","journal-title":"International Journal of Electronic Commerce (IJEC)"},{"key":"30_CR14","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G. Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)"},{"key":"30_CR15","unstructured":"Academic Learning Center, Central Piedmont Community College, 103 Garinger Building, Charlotte, NC 28235 704-330-6474 (2008), http:\/\/www.cpcc.cc.nc.us\/academic_learning\/images\/sskills\/Ebbinghaus.doc"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11145-7_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T06:01:15Z","timestamp":1634709675000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11145-7_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642111440","9783642111457"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11145-7_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}