{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T22:58:34Z","timestamp":1762210714498},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642219399"},{"type":"electronic","value":"9783642219405"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21940-5_10","type":"book-chapter","created":{"date-parts":[[2012,2,17]],"date-time":"2012-02-17T00:59:42Z","timestamp":1329440382000},"page":"159-170","source":"Crossref","is-referenced-by-count":8,"title":["Reasoning about Trust Using Argumentation: A Position Paper"],"prefix":"10.1007","author":[{"given":"Simon","family":"Parsons","sequence":"first","affiliation":[]},{"given":"Peter","family":"McBurney","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Sklar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1-3","key":"10_CR1","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1023\/A:1014490210693","volume":"34","author":"L. Amgoud","year":"2002","unstructured":"Amgoud, L., Cayrol, C.: A reasoning model based on the production of acceptable arguments. Annals of Mathematics and Artificial Intelligence\u00a034(1-3), 197\u2013215 (2002)","journal-title":"Annals of Mathematics and Artificial Intelligence"},{"issue":"1","key":"10_CR2","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s11787-006-0005-4","volume":"1","author":"C. Ches\u00f1evar","year":"2007","unstructured":"Ches\u00f1evar, C., Simari, G.: Modelling inference in argumentation through labelled deduction: Formalization and logical properties. Logica Universalis\u00a01(1), 93\u2013124 (2007)","journal-title":"Logica Universalis"},{"issue":"2","key":"10_CR3","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/0004-3702(94)00041-X","volume":"77","author":"P.M. Dung","year":"1995","unstructured":"Dung, P.M.: On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artificial Intelligence\u00a077(2), 321\u2013358 (1995)","journal-title":"Artificial Intelligence"},{"key":"10_CR4","first-page":"213","volume-title":"Trust: Making and breaking cooperative relations","author":"D. Gambetta","year":"1990","unstructured":"Gambetta, D.: Can we trust them? In: Gambetta, D. (ed.) Trust: Making and breaking cooperative relations, pp. 213\u2013238. Blackwell, Oxford (1990)"},{"issue":"2","key":"10_CR5","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1017\/S1471068403001674","volume":"4","author":"A.J. Garcia","year":"2004","unstructured":"Garcia, A.J., Simari, G.R.: Defeasible logic programming: an argumentative approach. Theory and Practice of Logic Programming\u00a04(2), 95\u2013138 (2004)","journal-title":"Theory and Practice of Logic Programming"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Golbeck, J.: Combining provenance with trust in social networks for semantic web content filtering. In: Proceedings of the International Provenance and Annotation Workshop, Chicago, Illinois (May 2006)","DOI":"10.1007\/11890850_12"},{"key":"10_CR7","unstructured":"Golbeck, J., Halaschek-Wiener, C.: Trust-based revision for expressive web syndication. The Logic Journal of the IGPL (to appear)"},{"issue":"4","key":"10_CR8","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/BF00871972","volume":"2","author":"T.F. Gordon","year":"1994","unstructured":"Gordon, T.F.: The pleadings game: An exercise in computational dialectics. Artificial Intelligence and Law\u00a02(4), 239\u2013292 (1994)","journal-title":"Artificial Intelligence and Law"},{"issue":"4","key":"10_CR9","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"4","author":"T. Grandison","year":"2000","unstructured":"Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials\u00a04(4), 2\u201316 (2000)","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"10_CR10","unstructured":"Hang, C.-W., Wang, Y., Singh, M.P.: An adaptive probabilistic trust model and its evaluation. In: Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems (2008)"},{"key":"10_CR11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511790423","volume-title":"Probability Theory: The Logic of Science","author":"E.T. Jaynes","year":"2003","unstructured":"Jaynes, E.T.: Probability Theory: The Logic of Science. Cambridge University Press, Cambridge (2003)"},{"issue":"2","key":"10_CR12","first-page":"139","volume":"4","author":"A. J\u00f8sang","year":"2006","unstructured":"J\u00f8sang, A., Gray, E., Kinateder, M.: Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems\u00a04(2), 139\u2013161 (2006)","journal-title":"Web Intelligence and Agent Systems"},{"key":"10_CR13","unstructured":"J\u00f8sang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Proceedings of the 29th Australasian Computer Society Conference (January 2006)"},{"issue":"2","key":"10_CR14","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th World Wide Web Conference (May 2004)","DOI":"10.1145\/775240.775242"},{"key":"10_CR16","unstructured":"Katz, Y., Golbeck, J.: Social network-based trust in prioritzed default logic. In: Proceedings of the 21st National Conference on Artificial Intelligence (2006)"},{"issue":"1","key":"10_CR17","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1111\/j.1467-8640.1995.tb00025.x","volume":"11","author":"P. Krause","year":"1995","unstructured":"Krause, P., Ambler, S., Elvang-G\u00f8rannson, M., Fox, J.: A logic of argumentation for reasoning under uncertainty. Computational Intelligence\u00a011(1), 113\u2013131 (1995)","journal-title":"Computational Intelligence"},{"key":"10_CR18","unstructured":"Kuter, Y., Golbeck, J.: Sunny: A new algorithm for trust inference in social networks using probabilistic confidence models. In: Proceedings of the 22nd National Conference on Artificial Intelligence (2007)"},{"key":"10_CR19","unstructured":"Matt, P.-A., Morge, M., Toni, F.: Combining statistics and arguments to compute trust. In: van der Hoek, W., Kaminka, G., Lesp\u00e9rance, Y., Luck, M., Sen, S. (eds.) Proceedings of the 9th International Conference on Autonomous Agents and Multiagents Systems, Toronto, Canada, pp. 209\u2013216 (May 2010)"},{"key":"10_CR20","unstructured":"McBurney, P., Parsons, S.: Tenacious tortoises: A formalism for argument over rules of inference. In: Proceedings of the ECAI Workshop on Computational Dialectics (2000)"},{"key":"10_CR21","unstructured":"McKnight, D.H., Chervany, N.L.: The meanings of trust. Working Paper 96-04, Carlson School of Management, University of Minnesota (1996)"},{"issue":"10-15","key":"10_CR22","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1016\/j.artint.2007.04.006","volume":"171","author":"N. Oren","year":"2007","unstructured":"Oren, N., Norman, T., Preece, A.: Subjective logic and arguing with evidence. Artificial Intelligence\u00a0171(10-15), 838\u2013854 (2007)","journal-title":"Artificial Intelligence"},{"issue":"3","key":"10_CR23","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1093\/logcom\/8.3.261","volume":"8","author":"S. Parsons","year":"1998","unstructured":"Parsons, S., Sierra, C., Jennings, N.R.: Agents that reason and negotiate by arguing. Journal of Logic and Computation\u00a08(3), 261\u2013292 (1998)","journal-title":"Journal of Logic and Computation"},{"key":"10_CR24","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/11794578_19","volume-title":"Argumentation in Multi-Agent Systems","author":"S. Parsons","year":"2006","unstructured":"Parsons, S., Sklar, E.: How agents alter their beliefs after an argumentation-based dialogue. In: Parsons, S., Maudet, N., Moraitis, P., Rahwan, I. (eds.) ArgMAS 2005. LNCS (LNAI), vol.\u00a04049, pp. 297\u2013312. Springer, Heidelberg (2006)"},{"issue":"6","key":"10_CR25","doi-asserted-by":"publisher","first-page":"1009","DOI":"10.1093\/logcom\/exi046","volume":"15","author":"H. Prakken","year":"2005","unstructured":"Prakken, H.: Coherence and flexibility in dialogue games for argumentation. Journal of Logic and Computation\u00a015(6), 1009\u20131040 (2005)","journal-title":"Journal of Logic and Computation"},{"key":"10_CR26","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G. Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)"},{"key":"10_CR27","volume-title":"Trust: A Sociological Theory","author":"P. Sztompka","year":"1999","unstructured":"Sztompka, P.: Trust: A Sociological Theory. Cambridge University Press, Cambridge (1999)"},{"key":"10_CR28","unstructured":"Wang, Y., Singh, M.P.: Trust representation and aggregation in a distributed agent system. In: Proceedings of the 21st National Conference on Artificial Intelligence (2006)"},{"issue":"12","key":"10_CR29","doi-asserted-by":"publisher","first-page":"1708","DOI":"10.1109\/TKDE.2007.190659","volume":"19","author":"Y. Xiang","year":"2007","unstructured":"Xiang, Y., Jia, N.: Modeling causal reinforcement and undermining for CPT elicitation. IEEE Transactions on Knowledge and Data Engineering\u00a019(12), 1708\u20131718 (2007)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"}],"container-title":["Lecture Notes in Computer Science","Argumentation in Multi-Agent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21940-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,29]],"date-time":"2021-12-29T11:56:54Z","timestamp":1640779014000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21940-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642219399","9783642219405"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21940-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}