{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:31:20Z","timestamp":1742920280776,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642210426"},{"type":"electronic","value":"9783642210433"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21043-3_37","type":"book-chapter","created":{"date-parts":[[2011,5,24]],"date-time":"2011-05-24T12:36:15Z","timestamp":1306240575000},"page":"301-312","source":"Crossref","is-referenced-by-count":5,"title":["A Context-Aware Reputation-Based Model of Trust for Open Multi-agent Environments"],"prefix":"10.1007","author":[{"given":"Ehsan","family":"Mokhtari","sequence":"first","affiliation":[]},{"given":"Zeinab","family":"Noorian","sequence":"additional","affiliation":[]},{"given":"Behrouz Tork","family":"Ladani","sequence":"additional","affiliation":[]},{"given":"Mohammad Ali","family":"Nematbakhsh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/283699.283739","volume-title":"Proceedings of the 1997 Workshop on New Security Paradigms","author":"A. Abdul-Rahman","year":"1997","unstructured":"Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: Proceedings of the 1997 Workshop on New Security Paradigms, pp. 48\u201360. ACM, New York (1997)"},{"key":"37_CR2","volume-title":"Proceedings of the 1996 IEEE Symposium on Security and Privacy, SP 1996","author":"M. Blaze","year":"1996","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, SP 1996. IEEE Computer Society, Los Alamitos (1996)"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Chen, H., Perich, F., Finin, T., Joshi, A.: Soupa: Standard ontology for ubiquitous and pervasive applications. In: International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 258\u2013267 (2004)","DOI":"10.21236\/ADA439638"},{"key":"37_CR4","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"A.K. Dey","year":"2001","unstructured":"Dey, A.K.: Understanding and using context. Personal Ubiquitous Comput.\u00a05, 4\u20137 (2001)","journal-title":"Personal Ubiquitous Comput."},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Shadbolt, N.R., Huynh, T.D., Jennings, N.R.: An integrated trust and reputation model for open multi-agent systems. In: AAMAS, pp. 119\u2013154 (2006)","DOI":"10.1007\/s10458-005-6825-4"},{"issue":"2","key":"37_CR6","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. Jsang","year":"2007","unstructured":"Jsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007); Emerging Issues in Collaborative Commerce","journal-title":"Decision Support Systems"},{"key":"37_CR7","unstructured":"Lei, Z., Nyang, D., Lee, K., Lim, H.: Computational intelligence and security"},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Liu, J., Issarny, V.: Enhanced reputation mechanism for mobile ad hoc networks. pp. 48\u201362 (2004)","DOI":"10.1007\/978-3-540-24747-0_5"},{"key":"37_CR9","unstructured":"Mui, L.: computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks. PhD thesis, Massachusetts Institute of Technology (2003)"},{"key":"37_CR10","doi-asserted-by":"publisher","first-page":"97","DOI":"10.4067\/S0718-18762010000200007","volume":"5","author":"Z. Noorian","year":"2010","unstructured":"Noorian, Z., Ulieru, M.: The state of the art in trust and reputation systems: a framework for comparison. J. Theor. Appl. Electron. Commer. Res.\u00a05, 97\u2013117 (2010)","journal-title":"J. Theor. Appl. Electron. Commer. Res."},{"key":"37_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/3-540-36540-0_2","volume-title":"Agent-Oriented Software Engineering III","author":"J.J. Odell","year":"2003","unstructured":"Odell, J.J., Van Dyke Parunak, H., Fleischer, M., Brueckner, S.A.: Modeling Agents and Their Environment. In: Giunchiglia, F., Odell, J.J., Weiss, G. (eds.) AOSE 2002. LNCS, vol.\u00a02585, pp. 16\u201331. Springer, Heidelberg (2003)"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Pedersen, T., Patwardhan, S., Michelizzi, J.: Wordnet:similarity: measuring the relatedness of concepts. In: Demonstration Papers at HLT-NAACL 2004, HLT-NAACL\u2013Demonstrations 2004, pp. 38\u201341. Association for Computational Linguistics (2004)","DOI":"10.3115\/1614025.1614037"},{"key":"37_CR13","unstructured":"Ray, I., Ray, I., Chakraborty, S.: An interoperable context sensitive model of trust. Journal of Intelligent Information Systems"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Resnick, P., Zeckhauser, R., Swanson, J., Lockwood, K.: The value of reputation on ebay: A controlled experiment. Experimental Economics, 79\u2013101 (2006)","DOI":"10.1007\/s10683-006-4309-2"},{"key":"37_CR15","unstructured":"Strang, T., Linnhoff-Popien, C.: A context modeling survey. In: Workshop on Advanced Context Modelling, Reasoning and Management, UbiComp 2004 - The Sixth International Conference on Ubiquitous Computing, Nottingham, England (2004)"},{"key":"37_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/11537878_18","volume-title":"Trust, Privacy, and Security in Digital Business","author":"L. Viljanen","year":"2005","unstructured":"Viljanen, L.: Towards an Ontology of Trust. In: Katsikas, S.K., L\u00f3pez, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol.\u00a03592, pp. 175\u2013184. Springer, Heidelberg (2005)"},{"key":"37_CR17","unstructured":"Jennings, N.R., Luck, M., Teacy, W.T.L., Patel, J.: Travos: Trust and reputation in the context of inaccurate information sources. Journal of Autonomous Agents and Multi-Agent Systems (2006)"},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Wang, Y., Li, M., Dillon, E., Cui, L.g., Hu, J.j., Liao, L.j.: A context-aware computational trust model for multi-agent systems. In: IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, pp. 1119\u20131124 (2008)","DOI":"10.1109\/ICNSC.2008.4525384"},{"key":"37_CR19","unstructured":"Whitby, A., Josang, A., Indulska, J.: Filtering out unfair ratings in bayesian reputation systems. In: Proceedings of 7th International Workshop on Trust in Agent Societies (2004)"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, J., Cohen, R.: Evaluating the trustworthiness of advice about seller agents in e-marketplaces: A personalized approach. Electronic Commerce Research and Applications (2008)","DOI":"10.1016\/j.elerap.2008.03.001"},{"key":"37_CR21","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1007\/978-3-540-74255-5_42","volume-title":"Modeling and Using Context","author":"A. Zimmermann","year":"2007","unstructured":"Zimmermann, A., Lorenz, A., Oppermann, R.: An Operational Definition of Context. In: Kokinov, B., Richardson, D.C., Roth-Berghofer, T.R., Vieu, L. (eds.) CONTEXT 2007. LNCS (LNAI), vol.\u00a04635, pp. 558\u2013571. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Advances in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21043-3_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T05:57:09Z","timestamp":1558591029000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21043-3_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642210426","9783642210433"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21043-3_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}