{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:21:03Z","timestamp":1725585663419},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642215988"},{"type":"electronic","value":"9783642215995"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21599-5_21","type":"book-chapter","created":{"date-parts":[[2011,6,15]],"date-time":"2011-06-15T00:31:47Z","timestamp":1308097907000},"page":"277-293","source":"Crossref","is-referenced-by-count":12,"title":["Incentivizing Responsible Networking via Introduction-Based Routing"],"prefix":"10.1007","author":[{"given":"Gregory","family":"Frazier","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Quang","family":"Duong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael P.","family":"Wellman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Edward","family":"Petersen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: Workshop on New Security Paradigms, Langdale, UK, pp. 48\u201360 (1997)","key":"21_CR1","DOI":"10.1145\/283699.283739"},{"issue":"2","key":"21_CR2","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/505586.505587","volume":"5","author":"M. Blaze","year":"2002","unstructured":"Blaze, M., Ioannidis, J., Keromytis, A.D.: Trust management for IPsec. ACM Transactions on Information and System Security\u00a05(2), 95\u2013118 (2002)","journal-title":"ACM Transactions on Information and System Security"},{"doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: Third International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, pp. 226\u2013236 (2002)","key":"21_CR3","DOI":"10.1145\/513800.513828"},{"doi-asserted-by":"crossref","unstructured":"Cornelli, F., Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P.: Choosing reputable servents in a P2P network. In: Eleventh International World Wide Web Conference, Honolulu, pp. 376\u2013386 2002)","key":"21_CR4","DOI":"10.1145\/511446.511496"},{"key":"21_CR5","first-page":"151","volume":"34","author":"Q. Duong","year":"2010","unstructured":"Duong, Q., LeFevre, K., Wellman, M.P.: Strategic modeling of information sharing among data privacy attackers. Informatica\u00a034, 151\u2013158 (2010)","journal-title":"Informatica"},{"issue":"2","key":"21_CR6","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1162\/105864001300122476","volume":"10","author":"E.J. Friedman","year":"2001","unstructured":"Friedman, E.J., Resnick, P.: The social cost of cheap pseudonyms. Journal of Economics and Management Strategy\u00a010(2), 173\u2013199 (2001)","journal-title":"Journal of Economics and Management Strategy"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1017\/CBO9780511800481.029","volume-title":"Algorithmic Game Theory","author":"E. Friedman","year":"2007","unstructured":"Friedman, E., Resnick, P., Sami, R.: Manipulation-resistant reputation systems. In: Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V.V. (eds.) Algorithmic Game Theory, pp. 677\u2013697. Cambridge University Press, Cambridge (2007)"},{"unstructured":"Golbeck, J.A.: Computing and applying trust in web-based social networks. Ph.D. thesis. University of Maryland (2005)","key":"21_CR8"},{"doi-asserted-by":"crossref","unstructured":"Grossklags, J., Christin, N., Chuang, J.: Secure or insure?: A game-theoretic analysis of information security games. In: Seventeenth International Conference on World Wide Web, Beijing, pp. 209\u2013218 (2008)","key":"21_CR9","DOI":"10.1145\/1367497.1367526"},{"issue":"2","key":"21_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1399589.1399599","volume":"7","author":"M. Jain","year":"2008","unstructured":"Jain, M., Pita, J., Tambe, M., Ord\u00f3\u00f1ez, F., Parachuri, P., Kraus, S.: Bayesian Stackelberg games and their application for security at Los Angeles International Airport. SigEcom Exchanges\u00a07(2), 1\u20133 (2008)","journal-title":"SigEcom Exchanges"},{"issue":"2","key":"21_CR11","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Twelfth International Conference on World Wide Web, Budapest, pp. 640\u2013651(2003)","key":"21_CR12","DOI":"10.1145\/775152.775242"},{"doi-asserted-by":"crossref","unstructured":"Lagesse, B., Kumar, M., Wright, M.: AREX: An adaptive system for secure resource access in mobile P2P systems. In: Peer-to-Peer Computing 2008, pp. 43\u201352 (2008)","key":"21_CR13","DOI":"10.1109\/P2P.2008.46"},{"issue":"4","key":"21_CR14","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1145\/1151659.1159935","volume":"36","author":"P. Laskowski","year":"2006","unstructured":"Laskowski, P., Chuang, J.: Network monitors and contracting systems: Competition and innovation. ACM SIGCOMM Computer Communication Review\u00a036(4), 194 (2006)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"unstructured":"Levien, R., Aiken, A.: Attack-resistant trust metrics for public key certification. In: Seventh USENIX Security Symposium, San Antonio, TX, pp. 229\u2013242 (1998)","key":"21_CR15"},{"doi-asserted-by":"crossref","unstructured":"Levine, J.: DNS Blacklists and Whitelists. RFC 5782 (Informational) (February 2010), http:\/\/www.ietf.org\/rfc\/rfc5782.txt","key":"21_CR16","DOI":"10.17487\/rfc5782"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/3-540-61770-1_45","volume-title":"Computer Security - ESORICS 1996","author":"U.M. Maurer","year":"1996","unstructured":"Maurer, U.M.: Modelling a public-key infrastructure. In: Bertino, E. (ed.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 325\u2013350. Springer, Heidelberg (1996)"},{"doi-asserted-by":"crossref","unstructured":"Mendes, S., Huitema, C.: A new approach to the X.509 framework: Allowing a global authentication infrastructure without a global trust model. In: IEEE Symposium on Network and Distributed System Security, pp. 172\u2013189 (1995)","key":"21_CR18","DOI":"10.1109\/NDSS.1995.390635"},{"key":"21_CR19","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M. Pease","year":"1980","unstructured":"Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. Journal of the ACM\u00a027, 228\u2013234 (1980)","journal-title":"Journal of the ACM"},{"key":"21_CR20","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1145\/317087.317088","volume":"2","author":"M.K. Reiter","year":"1999","unstructured":"Reiter, M.K., Stubblebine, S.G.: Authentication metric analysis and design. ACM Transactions on Information System Security\u00a02, 138\u2013158 (1999)","journal-title":"ACM Transactions on Information System Security"},{"issue":"12","key":"21_CR21","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P. Resnick","year":"2000","unstructured":"Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Communications of the ACM\u00a043(12), 45\u201348 (2000)","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Ruohomaa, S., Kutvonen, L.: Trust management survey. In: Third International Conference on Trust Management, Rocquencourt, France, pp. 77\u201392 (2005)","key":"21_CR22","DOI":"10.1007\/11429760_6"},{"issue":"4","key":"21_CR23","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/COMST.2005.1593279","volume":"7","author":"V. Srivastava","year":"2005","unstructured":"Srivastava, V., Neel, J., Mackenzie, A.B., Menon, R., DaSilva, L.A., Hicks, J.E., Reed, J.H., Gilles, R.P.: Using game theory to analyze wireless ad hoc networks. IEEE Communications Surveys and Tutorials\u00a07(4), 46\u201356 (2005)","journal-title":"IEEE Communications Surveys and Tutorials"},{"doi-asserted-by":"crossref","unstructured":"Srivatsa, M., Xiong, L., Liu, L.: Trustguard: Countering vulnerabilities in reputation management for decentralized overlay networks. In: Fourteenth International Conference on World Wide Web, pp. 422\u2013431 (2005)","key":"21_CR24","DOI":"10.1145\/1060745.1060808"},{"issue":"2","key":"21_CR25","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MCOM.2008.4473092","volume":"46","author":"Y. Sun","year":"2008","unstructured":"Sun, Y., Han, Z., Liu, K.: Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine\u00a046(2), 112\u2013119 (2008)","journal-title":"IEEE Communications Magazine"},{"doi-asserted-by":"crossref","unstructured":"Tarah, A., Huitema, C.: Associating metrics to certification paths. In: Second European Symposium on Research in Computer Security, pp. 175\u2013189 (1992)","key":"21_CR26","DOI":"10.1007\/BFb0013898"},{"unstructured":"Wellman, M.P.: Methods for empirical game-theoretic analysis (extended abstract). In: Twenty-First National Conference on Artificial Intelligence, Boston, pp. 1552\u20131555 (2006)","key":"21_CR27"},{"doi-asserted-by":"crossref","unstructured":"Wellman, M.P., Osepayshvili, A., MacKie-Mason, J.K., Reeves, D.M.: Bidding strategies for simultaneous ascending auctions. Berkeley Electronic Journal of Theoretical Economics (Topics)\u00a08(1) (2008)","key":"21_CR28","DOI":"10.2202\/1935-1704.1461"},{"doi-asserted-by":"crossref","unstructured":"Wong, E.L., Balasubramanian, P., Alvisi, L., Gouda, M.G., Shmatiko, V.: Truth in advertising: Lightweight verification of route integrity. In: Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, Portland, OR, pp. 156\u2013165 (2007)","key":"21_CR29","DOI":"10.1145\/1281100.1281123"},{"unstructured":"Xiong, L., Liu, L.: Building trust in decentralized peer-to-peer electronic communities. In: International Conference on Electronic Commerce Research (2002)","key":"21_CR30"},{"key":"21_CR31","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1109\/TC.2003.1176986","volume":"52","author":"J. Xu","year":"2003","unstructured":"Xu, J., Lee, W.: Sustaining availability of web services under distributed denial of service attacks. IEEE Transactions on Computers\u00a052, 195\u2013208 (2003)","journal-title":"IEEE Transactions on Computers"},{"key":"21_CR32","volume-title":"The Official PGP User\u2019s Guide","author":"P.R. Zimmermann","year":"1995","unstructured":"Zimmermann, P.R.: The Official PGP User\u2019s Guide. MIT Press, Cambridge (1995)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21599-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T18:50:33Z","timestamp":1560279033000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21599-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642215988","9783642215995"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21599-5_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}