{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:28:23Z","timestamp":1725593303112},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642221996"},{"type":"electronic","value":"9783642222009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22200-9_20","type":"book-chapter","created":{"date-parts":[[2011,6,25]],"date-time":"2011-06-25T23:52:53Z","timestamp":1309045973000},"page":"253-264","source":"Crossref","is-referenced-by-count":5,"title":["Proximity-Based Trust Inference for Mobile Social Networking"],"prefix":"10.1007","author":[{"given":"Amir","family":"Seyedi","sequence":"first","affiliation":[]},{"given":"Rachid","family":"Saadi","sequence":"additional","affiliation":[]},{"given":"Val\u00e9rie","family":"Issarny","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Ahamed, S., Hoque, E., Rahman, F., Zulkernine, M.: Towards Secure Trust Bootstrapping in Pervasive Computing Environment. In: 11th IEEE High Assurance Systems Engineering Symposium HASE 2008, pp. 89\u201396 (2008)","DOI":"10.1109\/HASE.2008.21"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Ahamed, S., Monjur, M., Islam, M.: CCTB: Context correlation for trust bootstrapping in pervasive environment. In: IET 4th International Conference on Intelligent Environments, pp. 1\u20138 (2008)","DOI":"10.1109\/PST.2008.19"},{"key":"20_CR3","volume-title":"Statistics for the behavioral and social sciences","author":"A. Aron","year":"1997","unstructured":"Aron, A.: Statistics for the behavioral and social sciences. Prentice Hall, Englewood Cliffs (1997)"},{"key":"20_CR4","unstructured":"Bruneel, J., Spithoven, A., Maesen, A.: Building Trust: A Matter of Proximity? Babson College Entrepreneurship Research Conference, BCERC (2007)"},{"issue":"6","key":"20_CR5","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1041685.1029912","volume":"29","author":"L. Capra","year":"2004","unstructured":"Capra, L.: Engineering human trust in mobile system collaborations. SIGSOFT Softw. Eng. Notes\u00a029(6), 107\u2013116 (2004)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"issue":"36","key":"20_CR6","doi-asserted-by":"publisher","first-page":"15274","DOI":"10.1073\/pnas.0900282106","volume":"106","author":"N. Eagle","year":"2009","unstructured":"Eagle, N., Pentland, A.S., Lazer, D.: Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences\u00a0106(36), 15274\u201315278 (2009)","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"20_CR7","volume-title":"Trust : the social virtues and the creation of prosperity","author":"F. Fukuyama","year":"1995","unstructured":"Fukuyama, F.: Trust: the social virtues and the creation of prosperity. Free Press, New York (1995)"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Golbeck, J., Hendler, J.: Filmtrust: movie recommendations using trust in web-based social networks. In: 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006, vol.\u00a01, pp. 282\u2013286 (2006)","DOI":"10.1109\/CCNC.2006.1593032"},{"key":"20_CR9","first-page":"49","volume-title":"Proceedings of the 31st Annual International Computer Software and Applications Conference","author":"M. Haque","year":"2007","unstructured":"Haque, M., Ahamed, S.: An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment. In: Proceedings of the 31st Annual International Computer Software and Applications Conference, vol.\u00a001, pp. 49\u201356. IEEE Computer Society, Los Alamitos (2007)"},{"key":"20_CR10","first-page":"59","volume-title":"APCCM 2005: Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling","author":"A. J\u00f8sang","year":"2005","unstructured":"J\u00f8sang, A., Pope, S.: Semantic constraints for trust transitivity. In: APCCM 2005: Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling, pp. 59\u201368. Australian Computer Society, Inc., Australia (2005)"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1145\/1150402.1150476","volume-title":"Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD 2006","author":"R. Kumar","year":"2006","unstructured":"Kumar, R., Novak, J., Tomkins, A.: Structure and evolution of online social networks. In: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD 2006, pp. 611\u2013617. ACM, New York (2006)"},{"key":"20_CR12","unstructured":"Marsh, S.P.: Formalising trust as a computational concept (1994)"},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"2566","DOI":"10.1073\/pnas.012582999","volume":"99","author":"M.E.J. Newman","year":"2002","unstructured":"Newman, M.E.J., Watts, D.J., Strogatz, S.H.: Random graph models of social networks. Proceedings of the National Academy of Science\u00a099, 2566\u20132572 (2002)","journal-title":"Proceedings of the National Academy of Science"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Perich, F., Undercoffer, J., Kagal, L., Joshi, A., Finin, T., Yesha, Y.: In reputation we believe: Query processing in mobile ad-hoc networks. In: Annual International Conference on Mobile and Ubiquitous Systems, pp. 326\u2013334 (2004)","DOI":"10.21236\/ADA439635"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Quercia, D., Hailes, S., Capra, L.: TRULLO-local trust bootstrapping for ubiquitous devices. Proc. of IEEE Mobiquitous (2007)","DOI":"10.1109\/MOBIQ.2007.4451015"},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"1472","DOI":"10.1145\/1774088.1774403","volume-title":"Proceedings of the 2010 ACM Symposium on Applied Computing","author":"R. Saadi","year":"2010","unstructured":"Saadi, R., Pierson, J., Brunie, L.: T2D: A Peer to Peer trust management system based on Disposition to Trust. In: Proceedings of the 2010 ACM Symposium on Applied Computing, pp. 1472\u20131478. ACM, New York (2010)"},{"issue":"1","key":"20_CR17","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10462-004-0041-5","volume":"24","author":"J. Sabater","year":"2005","unstructured":"Sabater, J., Sierra, C.: Review on Computational Trust and Reputation Models. Artificial Intelligence Review\u00a024(1), 33\u201360 (2005)","journal-title":"Artificial Intelligence Review"},{"key":"20_CR18","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10458-007-9021-x","volume":"16","author":"F.E. Walter","year":"2008","unstructured":"Walter, F.E., Battiston, S., Schweitzer, F.: A model of a trust-based recommendation system on a social network. Autonomous Agents and Multi-Agent Systems\u00a016, 57\u201374 (2008)","journal-title":"Autonomous Agents and Multi-Agent Systems"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22200-9_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:06:46Z","timestamp":1606187206000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22200-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642221996","9783642222009"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22200-9_20","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}