{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:27:24Z","timestamp":1756895244723},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642192272"},{"type":"electronic","value":"9783642192289"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19228-9_15","type":"book-chapter","created":{"date-parts":[[2011,2,10]],"date-time":"2011-02-10T05:59:53Z","timestamp":1297317593000},"page":"159-169","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The Need for Interoperable Reputation Systems"],"prefix":"10.1007","author":[{"given":"Sandra","family":"Steinbrecher","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Buskens, V., Raub, W.: Embedded trust: Control and learning. In: Lawler, E., Thye, S. (eds.) Group Cohesion, Trust, and Solidarity. Advances in Group Processes, vol.\u00a019, pp. 167\u2013202 (2001)","DOI":"10.1016\/S0882-6145(02)19007-2"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/1911840","volume":"56","author":"C. Camerer","year":"1988","unstructured":"Camerer, C., Weigelt, K.: Experimental tests of a sequential equilibrium reputation model. Econometrica\u00a056, 1\u201336 (1988)","journal-title":"Econometrica"},{"key":"15_CR3","first-page":"8","volume":"67","author":"S. Clau\u00df","year":"2002","unstructured":"Clau\u00df, S., Pfitzmann, A., Hansen, M.: E\u00a0Van Herreweghen. Privacy-enhancing identity management. The IPTS Report\u00a067, 8\u201316 (2002)","journal-title":"The IPTS Report"},{"issue":"2","key":"15_CR4","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/S1389-1286(01)00217-1","volume":"37","author":"S. Clau\u00df","year":"2001","unstructured":"Clau\u00df, S., K\u00f6hntopp, M.: Identity management and its support of multilateral security. Computer Networks\u00a037(2), 205\u2013219 (2001)","journal-title":"Computer Networks"},{"key":"15_CR5","series-title":"Department of Sociology","first-page":"49","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"P. Dasgupta","year":"2000","unstructured":"Dasgupta, P.: Trust as a commodity. In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations. Department of Sociology, pp. 49\u201372. University Oxford, Oxford (2000)"},{"key":"15_CR6","first-page":"150","volume-title":"EC 2000: Proceedings of the 2nd ACM Conference on Electronic Commerce","author":"C. Dellarocas","year":"2000","unstructured":"Dellarocas, C.: Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: EC 2000: Proceedings of the 2nd ACM Conference on Electronic Commerce, pp. 150\u2013157. ACM Press, New York (2000)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Dellarocas, C.: The digitization of word-of-mouth: Promise and challenges of online feedback mechanisms. Management Science, 1407\u20131424 (October 2003)","DOI":"10.1287\/mnsc.49.10.1407.17308"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"key":"15_CR9","unstructured":"ENISA. Position paper. reputation-based systems: a security analysis (2007), http:\/\/www.enisa.europa.eu\/doc\/pdf\/deliverables\/enisa_pp_reputation_based_system.pdf (letzter Abruf September 02, 2008)"},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1162\/105864001300122476","volume":"10","author":"E. Friedman","year":"1999","unstructured":"Friedman, E., Resnick, P.: The social cost of cheap pseudonyms. Journal of Economics and Management Strategy\u00a010, 173\u2013199 (1999)","journal-title":"Journal of Economics and Management Strategy"},{"key":"15_CR11","unstructured":"Kumar, S.S., Koster, P.: Portable reputation: Proving ownership across portals. In: Proc. of the European Context Awareness and Trust 2009 (EuroCAT 2009), 3rd Workshop on Combining Context with Trust, Security, and Privacy. CEUR Workshop Proceedings, vol.\u00a0504, pp. 21\u201330 (September 2009)"},{"key":"15_CR12","first-page":"180","volume-title":"eAdoption and the Knowledge Economy: Issues, Applications, Case Studies","author":"T. Mahler","year":"2004","unstructured":"Mahler, T., Olsen, T.: Reputation systems and data protection law. In: eAdoption and the Knowledge Economy: Issues, Applications, Case Studies, pp. 180\u2013187. IOS Press, Amsterdam (2004)"},{"key":"15_CR13","unstructured":"Manola, F., Miller, E.: RDF Primer. W3C Recommendation, W3C (February 2004), http:\/\/www.w3.org\/TR\/rdf-primer\/ (last visited July 01, 2009)"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/3-540-61770-1_45","volume-title":"Computer Security - ESORICS 96","author":"U. Maurer","year":"1996","unstructured":"Maurer, U.: Modelling a public-key infrastructure. In: Bertino, E. (ed.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 325\u2013350. Springer, Heidelberg (1996)"},{"key":"15_CR15","unstructured":"Mui, L.: Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks. PhD Thesis, Massachusetts Institute of Technology (2003)"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-540-85735-8_8","volume-title":"Trust, Privacy and Security in Digital Business","author":"F. Pingel","year":"2008","unstructured":"Pingel, F., Steinbrecher, S.: Multilateral secure cross-community reputation systems. In: Furnell, S.M., Katsikas, S.K., Lioy, A. (eds.) TrustBus 2008. LNCS, vol.\u00a05185, pp. 69\u201378. Springer, Heidelberg (2008)"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-16441-5_14","volume-title":"Public Key Infrastructures, Services and Applications","author":"S. Schiffner","year":"2010","unstructured":"Schiffner, S., Clau\u00df, S., Steinbrecher, S.: Privacy and liveliness for reputation systems. In: Martinelli, F., Preneel, B. (eds.) EuroPKI 2009. LNCS, vol.\u00a06391, pp. 209\u2013224. Springer, Heidelberg (to appear, 2010)"},{"key":"15_CR18","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-642-03315-5_10","volume-title":"The Future of Identity in the Information Society","author":"S. Steinbrecher","year":"2009","unstructured":"Steinbrecher, S.: Enhancing multilateral security in and by reputation systems. In: Maty\u00e1\u0161, V., Fischer-H\u00fcbner, S., Cvr\u010dek, D., \u0160venda, P. (eds.) IFIP WG 9.2, 9.6\/11.6, 11.7\/FIDIS. IFIP Advances in Information and Communication Technology, vol.\u00a0298, pp. 135\u2013150. Springer, Heidelberg (2009)"},{"key":"15_CR19","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-642-01244-0_37","volume-title":"Emerging Challenges for Security, Privacy and Trust","author":"S. Steinbrecher","year":"2009","unstructured":"Steinbrecher, S., Gro\u00df, S., Meichau, M.: Jason: A scalable reputation system for the semantic web. In: Gritzalis, D., Lopez, J. (eds.) SEC 2009. IFIP AICT, vol.\u00a0297, pp. 421\u2013431. Springer, Heidelberg (2009)"},{"key":"15_CR20","first-page":"245","volume-title":"International Information Security Workshops","author":"M. Voss","year":"2004","unstructured":"Voss, M.: Privacy preserving online reputation systems. In: International Information Security Workshops, pp. 245\u2013260. Kluwer, Dordrecht (2004)"}],"container-title":["Lecture Notes in Computer Science","Open Research Problems in Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19228-9_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T00:06:10Z","timestamp":1584403570000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19228-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642192272","9783642192289"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19228-9_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}