{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:16:47Z","timestamp":1725607007348},"publisher-location":"Berlin, Heidelberg","reference-count":50,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642173479"},{"type":"electronic","value":"9783642173486"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-17348-6_8","type":"book-chapter","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T11:53:32Z","timestamp":1315828412000},"page":"163-192","source":"Crossref","is-referenced-by-count":1,"title":["Trust and Reputation for Successful Software Self-organisation"],"prefix":"10.1007","author":[{"given":"Jean-Marc","family":"Seigneur","sequence":"first","affiliation":[]},{"given":"Pierpaolo","family":"Dondio","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","volume-title":"HICSS","author":"A. Abdul-Rahman","year":"2000","unstructured":"Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: HICSS (2000)"},{"key":"8_CR2","volume-title":"Proceedings of Trust in the Network Economy, Evolaris","author":"E. Ball","year":"2003","unstructured":"Ball, E., Chadwick, D.W., Basden, A.: The implementation of a system for evaluating trust in a PKI environment. In: Proceedings of Trust in the Network Economy, Evolaris (2003)"},{"key":"8_CR3","volume-title":"Proceedings of the Semantic Web and Policy Workshop","author":"C. Bizer","year":"2005","unstructured":"Bizer, C., Cyganiak, R., Gauss, T., Maresh, O.: The TriQL.P browser: filtering information using context, content and rating-based trust policies. In: Proceedings of the Semantic Web and Policy Workshop (2005)"},{"key":"8_CR4","volume-title":"Proceedings of the 17th IEEE Symposium on Security and Privacy","author":"M. Blaze","year":"1996","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 17th IEEE Symposium on Security and Privacy (1996)"},{"key":"8_CR5","first-page":"397","volume-title":"iTrust","author":"C. Bryce","year":"2005","unstructured":"Bryce, C., Couderc, P., Seigneur, J.M., Cahill, V.: Implementation of the secure trust engine. In: iTrust, pp. 397\u2013401 (2005)"},{"key":"8_CR6","volume-title":"Proceedings of the 1st Conference on Autonomous Agent and Multi-Agent Systems (AAMAS)","author":"C. Castelfranchi","year":"2003","unstructured":"Castelfranchi, C., Falcone, R., Peluzzo, G.: Trust in information sources as a source for trust: a fuzzy approach. In: Proceedings of the 1st Conference on Autonomous Agent and Multi-Agent Systems (AAMAS). ACM, New York (2003)"},{"key":"8_CR7","first-page":"171","volume-title":"Security Protocols Workshop","author":"B. Christianson","year":"1996","unstructured":"Christianson, B., Harbison, W.S.: Why isn\u2019t trust transitive. In: Security Protocols Workshop, pp. 171\u2013176 (1996)"},{"key":"8_CR8","volume-title":"Proceedings of the Sixth Conference on Autonomous Agent and Multi-Agent Systems (AAMAS)","author":"R. Cissee","year":"2007","unstructured":"Cissee, R., Albayak, S.: An agent-based approach for privacy-preserving recommender systems. In: Proceedings of the Sixth Conference on Autonomous Agent and Multi-Agent Systems (AAMAS). ACM, New York (2007)"},{"key":"8_CR9","unstructured":"Computational trust community. http:\/\/www.trustcomp.org (2004)"},{"key":"8_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-1159-5","volume-title":"Reputation in Artificial Societies: Social Beliefs for Social Order","author":"R. Conte","year":"2002","unstructured":"Conte, R., Paolucci, M.: Reputation in Artificial Societies: Social Beliefs for Social Order. Kluwer Academic, Norwell (2002)"},{"key":"8_CR11","volume-title":"Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems","author":"Z. Despotovic","year":"2004","unstructured":"Despotovic, Z., Aberer, K.: Maximum likelihood estimation of peers performance in P2P networks. In: Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems (2004)"},{"key":"8_CR12","first-page":"362","volume-title":"ATC","author":"P. Dondio","year":"2006","unstructured":"Dondio, P., Barrett, S., Weber, S., Seigneur, J.M.: Extracting trust from domain analysis: a case study on the Wikipedia project. In: ATC, pp. 362\u2013373 (2006)"},{"key":"8_CR13","unstructured":"erep:social knowledge for e-governance. http:\/\/megatron.iiia.csic.es\/eRep (2006)"},{"key":"8_CR14","unstructured":"Fenton, N., Neil, M.: Combining evidence in risk analysis using Bayesian networks. Tech. Rep., Agena (2004)"},{"key":"8_CR15","unstructured":"Fielding, R.T.: Architectural styles and the design of network-based software architectures. Ph.D. Dissertation, University of California, Irvine (2000)"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1080\/13698570310001606969","volume":"5","author":"L. Frewer","year":"2003","unstructured":"Frewer, L., Miles, S.: Temporal stability of the psychological determinants of trust: implications for communication about food risks. Health, Risk Soc. 5, 259\u2013271 (2003)","journal-title":"Health, Risk Soc."},{"key":"8_CR17","first-page":"213","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"D. Gambetta","year":"2000","unstructured":"Gambetta, D.: Can we trust. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213\u2013237 (2000). Published Online, Chap. 13. http:\/\/www.sociology.ox.ac.uk\/papers\/gambetta213-237.pdf"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1038\/438900a","volume":"438","author":"J. Giles","year":"2005","unstructured":"Giles, J.: Special report: Internet encyclopedias go head to head. Nature 438, 900\u2013901 (2005). doi: 10.1038\/438900a","journal-title":"Nature"},{"key":"8_CR19","series-title":"LNCS","volume-title":"Proceedings of the 3rd International Semantic Web Conference","author":"J. Golbeck","year":"2004","unstructured":"Golbeck, J., Parsia, B.: Trusting claims from trusted sources: trust network based filtering of aggregated claims. In: Proceedings of the 3rd International Semantic Web Conference. LNCS, vol. 3298. Springer, Berlin (2004). http:\/\/www.mindswap.org\/papers\/Jen-ISWC04.pdf"},{"key":"8_CR20","volume-title":"Proceedings of the International Conference on Open Source Software","author":"J.M. Gonzalez-Barahona","year":"2006","unstructured":"Gonzalez-Barahona, J.M., Conklin, M., Robles, G.: Public data about software development. In: Proceedings of the International Conference on Open Source Software (2006)"},{"key":"8_CR21","volume-title":"Proceedings of the 16th Bled Electronic Commerce Conference","author":"J. Gordijn","year":"2003","unstructured":"Gordijn, J., Tan, Y.H.: A design methodology for trust and value exchanges in business models. In: Proceedings of the 16th Bled Electronic Commerce Conference (2003)"},{"key":"8_CR22","unstructured":"Guha, R.: Open rating systems. Techn. Rep., Stanford University (2004)"},{"key":"8_CR23","volume-title":"Proceedings of the New Security Paradigms Workshop","author":"A. J\u00f8sang","year":"1996","unstructured":"J\u00f8sang, A.: The right type of trust for distributed systems. In: Proceedings of the New Security Paradigms Workshop. ACM, New York (1996). http:\/\/citeseer.nj.nec.com\/47043.html"},{"key":"8_CR24","volume-title":"Expertise in Context","author":"J. Lerch","year":"1997","unstructured":"Lerch, J., Prietula, M., Kulik, C.: The Turing effect: the nature of trust in expert systems advice. In: Expertise in Context. AAAI, MIT Press, Cambridge (1997)"},{"key":"8_CR25","volume-title":"Proceedings of SECOVAL","author":"L. Longo","year":"2007","unstructured":"Longo, L., Dondio, P., Barrett, S.: Temporal factors to evaluate trustworthiness of virtual identities. In: Proceedings of SECOVAL (2007), Third International Workshop on the Value of Security through Collaboration (2007)"},{"key":"8_CR26","first-page":"213","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"N. Luhmann","year":"2000","unstructured":"Luhmann, N.: Familiarity, confidence, trust: problems and alternatives. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213\u2013237 (2000). Chap. 13. Published Online http:\/\/www.sociology.ox.ac.uk\/papers\/gambetta213-237.pdf"},{"key":"8_CR27","unstructured":"Marsh, S.: Formalising trust as a computational concept. Ph.D. dissertation, University of Stirling, Department of Mathematics and Computer Science (1994). http:\/\/citeseer.nj.nec.com\/marsh94formalising.html"},{"key":"8_CR28","first-page":"121","volume-title":"AAAI","author":"P. Massa","year":"2005","unstructured":"Massa, P., Avesani, P.: Controversial users demand local trust metrics: an experimental study on Epinions.com community. In: AAAI, pp. 121\u2013126 (2005)"},{"key":"8_CR29","volume-title":"Proceedings of the WWW2006 Workshop on the Models of Trust for the Web (MTW\u201906)","author":"D. McGuiness","year":"2006","unstructured":"McGuiness, D., Zeng, H., da Silva, P.P., Ding, L., Narayanan, D., Bhaowal, M.: Investigations into trust for collaborative information repositories: a Wikipedia case study. In: Proceedings of the WWW2006 Workshop on the Models of Trust for the Web (MTW\u201906). ACM, New York (2006)"},{"key":"8_CR30","volume-title":"Proceedings of the Americas Conference on Information Systems","author":"D.H. McKnight","year":"2000","unstructured":"McKnight, D.H., Chervany, N.L.: What is trust? A conceptual analysis and an interdisciplinary model. In: Proceedings of the Americas Conference on Information Systems (2000)"},{"key":"8_CR31","first-page":"70","volume-title":"Ninth Workshop on Trust in Agent Societies","author":"A.E. Messery","year":"2007","unstructured":"Messery, A.E.: Expectations enhanced trust value. In: Ninth Workshop on Trust in Agent Societies, pp. 70\u201377 (2007)"},{"key":"8_CR32","unstructured":"Olsson, O.: Privacy protection and trust models. Ercim News (2002)"},{"key":"8_CR33","unstructured":"Pawlak, M.: Project management interface (pmi). Techn. Rep., University of Geneva (2005)"},{"key":"8_CR34","first-page":"90","volume-title":"Ninth Workshop on Trust in Agent Societies","author":"I. Pinyol","year":"2007","unstructured":"Pinyol, I., Jordi, S.M., Guifre, C.: How to talk about reputation using a common ontology: from definition to implementation. In: Ninth Workshop on Trust in Agent Societies, pp. 90\u2013102 (2007)"},{"key":"8_CR35","unstructured":"Rahman, A.F.: A framework for decentralised trust reasoning. Ph.D. dissertation, University of London (2005)"},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Raymond, E.S.: The Cathedral and the Bazar (1997)","DOI":"10.5210\/fm.v3i2.578"},{"key":"8_CR37","unstructured":"Romano, D.M.: The nature of trust: conceptual and operational clarification. Ph.D. dissertation, Louisiana State University (2004)"},{"key":"8_CR38","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1145\/544741.544854","volume-title":"First International Conference on Autonomous Agents and Multiagent systems (AAMAS-02)","author":"J. Sabater","year":"2002","unstructured":"Sabater, J., Sierra, C.: Reputation and social network analysis in multi-agent systems. In: First International Conference on Autonomous Agents and Multiagent systems (AAMAS-02), pp.\u00a0475\u2013482 (2002)"},{"key":"8_CR39","unstructured":"Schach, S.R.: Colloquium presentation (2004)"},{"key":"8_CR40","unstructured":"Seigneur, J.M.: Trust, security and privacy in global computing. Ph.D. dissertation, Trinity College Dublin (2005)"},{"key":"8_CR41","volume-title":"Proceedings of the Workshop on Evaluation Frameworks for Open Source Software, OSS International Conference","author":"J.M. Seigneur","year":"2006","unstructured":"Seigneur, J.M.: Security evaluation of free\/open source software powered by a peer-to-peer ecosystem. In: Proceedings of the Workshop on Evaluation Frameworks for Open Source Software, OSS International Conference (2006)"},{"key":"8_CR42","first-page":"93","volume-title":"iTrust","author":"J.M. Seigneur","year":"2004","unstructured":"Seigneur, J.M., Jensen, C.D.: Trading privacy for trust. In: iTrust, pp. 93\u2013107 (2004)"},{"key":"8_CR43","unstructured":"Stanford guidelines. http:\/\/credibility.stanford.edu\/guidelines"},{"key":"8_CR44","volume-title":"Proceedings of the International Conference on Information Systems","author":"K.J. Stewart","year":"2001","unstructured":"Stewart, K.J., Gosain, S.: An exploratory study of ideology and trust in open source development groups. In: Proceedings of the International Conference on Information Systems (2001)"},{"key":"8_CR45","doi-asserted-by":"crossref","unstructured":"Suryanarayana, G., Erenkrantz, J.R., Taylor, R.: An architectural approach for decentralised trust management. IEEE Internet Comput. (2005)","DOI":"10.1109\/MIC.2005.119"},{"key":"8_CR46","unstructured":"Terzis, S., Wagealla, W., English, C., McGettrick, A., Nixon, P.: The secure collaboration model. Techn. Rep., Trinity College Dublin (2004). http:\/\/secure.dsg.cs.tcd.ie"},{"issue":"4157","key":"8_CR47","first-page":"1124","volume":"185","author":"A. Tversky","year":"1974","unstructured":"Tversky, A., Kahneman, D.: Judgment under uncertainty: heuristics and biases. Science, New Ser. 185(4157), 1124\u20131131 (1974)","journal-title":"Science, New Ser."},{"key":"8_CR48","first-page":"23","volume-title":"AP2PC","author":"Y. Wang","year":"2003","unstructured":"Wang, Y., Vassileva, J.: Bayesian network trust model in peer-to-peer networks. In: AP2PC, pp. 23\u201334 (2003)"},{"key":"8_CR49","unstructured":"Wikipedia encyclopedia. www.wikipedia.org"},{"issue":"2","key":"8_CR50","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.dss.2006.11.003","volume":"43","author":"C.N. Ziegler","year":"2007","unstructured":"Ziegler, C.N., Golbeck, J.: Investigating interactions of trust and interest similarity. Decis. Support Syst. 43(2), 460\u2013475 (2007)","journal-title":"Decis. Support Syst."}],"container-title":["Natural Computing Series","Self-organising Software"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17348-6_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:47:04Z","timestamp":1619786824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17348-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642173479","9783642173486"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17348-6_8","relation":{},"ISSN":["1619-7127"],"issn-type":[{"type":"print","value":"1619-7127"}],"subject":[],"published":{"date-parts":[[2011]]}}}