{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:01:35Z","timestamp":1740096095564,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642148583"},{"type":"electronic","value":"9783642148590"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14859-0_14","type":"book-chapter","created":{"date-parts":[[2011,2,10]],"date-time":"2011-02-10T01:40:25Z","timestamp":1297302025000},"page":"178-191","source":"Crossref","is-referenced-by-count":0,"title":["Implementing a Trust Overlay Framework for Digital Ecosystems"],"prefix":"10.1007","author":[{"given":"Paul","family":"Malone","sequence":"first","affiliation":[]},{"given":"Jimmy","family":"McGibney","sequence":"additional","affiliation":[]},{"given":"Dmitri","family":"Botvich","sequence":"additional","affiliation":[]},{"given":"Mark","family":"McLaughlin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Aitken, D., Bligh, J., Callanan, O., Corcoran, D., Tobin, J.: Peer-to-peer technologies and protocols (2001), \n                  \n                    http:\/\/ntrg.cs.tcd.ie\/undergrad\/4ba2.02\/p2p\/"},{"key":"14_CR2","volume-title":"Peer-to-Peer: Harnessing the Power of Disruptive Technologies","author":"R. Dingledine","year":"2000","unstructured":"Dingledine, R., Freedman, M., Molnar, D.: Accountability measures for peer-to-peer systems. In: Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O\u2019Reilly, Sebastopol (2000)"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"key":"14_CR4","unstructured":"Gambetta, D.: Can we trust trust (July 09, 1988), \n                  \n                    http:\/\/citeseer.ist.psu.edu\/489470.html\n                  \n                  \n                , \n                  \n                    http:\/\/www.sociology.ox.ac.uk\/papers\/gambetta213-237.pdf"},{"key":"14_CR5","unstructured":"Grandison, T.: Conceptions of trust: Definition, constructs and models. In: Song, R. (ed.) Trust in E-Services: Technologies, Practices and Challenges. IGI Global (2007)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.A.: A survey of trust and reputation systems for online service provision. Decision Support Systems pp. 618\u2013644 (March 01, 2007), \n                  \n                    http:\/\/eprints.qut.edu.au\/archive\/00007280\/\n                  \n                  \n                , \n                  \n                    http:\/\/eprints.qut.edu.au\/secure\/00007280\/01\/JIB2007-DSS.pdf","DOI":"10.1016\/j.dss.2005.05.019"},{"issue":"2","key":"14_CR7","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MC.2007.76","volume":"40","author":"H. Li","year":"2007","unstructured":"Li, H., Singhal, M.: Trust management in distributed systems. IEEE Computer\u00a040(2), 45\u201353 (2007), \n                  \n                    http:\/\/doi.ieeecomputersociety.org\/10.1109\/MC.2007.76","journal-title":"IEEE Computer"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-540-75853-2_9","volume-title":"IP Operations and Management","author":"J. McGibney","year":"2007","unstructured":"McGibney, J., Botvich, D.: Distributed dynamic protection of services on ad hoc and p2p networks. In: Medhi, D., Nogueira, J.M.S., Pfeifer, T., Wu, S.F. (eds.) IPOM 2007. LNCS, vol.\u00a04786, pp. 95\u2013106. Springer, Heidelberg (2007)"},{"key":"14_CR9","unstructured":"McKnight, D.H., Chervany, N.L.: The meanings of trust. MISRC Working Paper Series 96-04, Carlson School of Management, University of Minnesota (2006), \n                  \n                    http:\/\/misrc.umn.edu\/wpaper\/WorkingPapers\/9604.pdf"},{"key":"14_CR10","unstructured":"Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation for E-businesses. In: HICSS. p. 188 (2002), \n                  \n                    http:\/\/dlib2.computer.org\/conferen\/hicss\/1435\/pdf\/14350188.pdf?"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/11429760_6","volume-title":"Trust Management","author":"S. Ruohomaa","year":"2005","unstructured":"Ruohomaa, S., Kutvonen, L.: Trust management survey. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 77\u201392. Springer, Heidelberg (2005), \n                  \n                    http:\/\/dx.doi.org\/10.1007\/11429760_6"},{"key":"14_CR12","first-page":"11","volume-title":"ARES \u201907: Proceedings of the Second International Conference on Availability, Reliability and Security","author":"B. Solhaug","year":"2007","unstructured":"Solhaug, B., Elgesem, D., Stlen, K.: Why trust is not proportional to risk. In: ARES \u201907: Proceedings of the Second International Conference on Availability, Reliability and Security, pp. 11\u201318. IEEE Computer Society, Washington (2007)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Ecosystems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14859-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T03:29:16Z","timestamp":1558409356000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14859-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642148583","9783642148590"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14859-0_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}