{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:41:14Z","timestamp":1725608474693},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223587"},{"type":"electronic","value":"9783642223594"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22359-4_1","type":"book-chapter","created":{"date-parts":[[2011,9,14]],"date-time":"2011-09-14T04:07:28Z","timestamp":1315973248000},"page":"1-12","source":"Crossref","is-referenced-by-count":0,"title":["Some Thoughts on Using Argumentation to Handle Trust"],"prefix":"10.1007","author":[{"given":"Simon","family":"Parsons","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuqing","family":"Tang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kai","family":"Cai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elizabeth","family":"Sklar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"McBurney","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Abrams, Z., McGrew, R., Plotkin, S.: Keeping peers honest in EigenTrust. In: Proceedings of the 2nd Workshop on the Economics of Peer-to-Peer Systems (2004)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Adler, B.T., de Alfaro, L.: A content-driven reputation system for the Wikipedia. In: Proceedings of the 16th International World Wide Web Conference, Banff, Alberta (May 2007)","DOI":"10.1145\/1242572.1242608"},{"issue":"2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.websem.2007.03.002","volume":"5","author":"D. Artz","year":"2007","unstructured":"Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. Journal of Web Semantics\u00a05(2), 58\u201371 (2007)","journal-title":"Journal of Web Semantics"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Dong, X.L., Berti-Equille, L., Srivastava, D.: Integrating conflicting data: The role of source dependence. In: Proceedings of the 35th International Conference on Very Large Databases, Lyon, France (August 2009)","DOI":"10.14778\/1687627.1687690"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/0004-3702(94)00041-X","volume":"77","author":"P.M. Dung","year":"1995","unstructured":"Dung, P.M.: On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artificial Intelligence\u00a077, 321\u2013357 (1995)","journal-title":"Artificial Intelligence"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-94-017-3614-5_3","volume-title":"Trust and Deception in Virtual Societies","author":"R. Falcone","year":"2001","unstructured":"Falcone, R., Castelfranchi, C.: Social trust: A cognitive approach. In: Castelfranchi, C., Tan, Y. (eds.) Trust and Deception in Virtual Societies, pp. 55\u201399. Kluwer Academic Publishers, Dordrecht (2001)"},{"key":"1_CR7","unstructured":"http:\/\/trust.mindswap.org\/FilmTrust\/"},{"key":"1_CR8","unstructured":"Francone, R., Castelfranchi, C.: Transitivity in trust: A discussed property. In: Proceedings of the Undicesimo Workshop Nazionale \u201dDagli Oggetti agli Agenti\u201d, Rimini (September 2010)"},{"issue":"1","key":"1_CR9","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1017\/S1471068403001674","volume":"4","author":"A.J. Garc\u00eda","year":"2004","unstructured":"Garc\u00eda, A.J., Simari, G.: Defeasible logic programming: an argumentative approach. Theory and Practice of Logic Programming\u00a04(1), 95\u2013138 (2004)","journal-title":"Theory and Practice of Logic Programming"},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/11890850_12","volume-title":"Provenance and Annotation of Data","author":"J. Golbeck","year":"2006","unstructured":"Golbeck, J.: Combining provenance with trust in social networks for semantic web content filtering. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.\u00a04145, pp. 101\u2013108. Springer, Heidelberg (2006)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Golbeck, J., Hendler, J.: Filmtrust: Movie recommendations using trust in web-based social networks. In: Proceedings of the IEEE Consumer Communications and Networking Conference (2006)","DOI":"10.1109\/CCNC.2006.1593032"},{"issue":"4","key":"1_CR12","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"4","author":"T. Grandison","year":"2000","unstructured":"Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials\u00a04(4), 2\u201316 (2000)","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th International Conference on the World Wide Web (2004)","DOI":"10.1145\/988672.988727"},{"key":"1_CR14","unstructured":"Harwood, W.T., Clark, J.A., Jacob, J.L.: Networks of trust and distrust: Towards logical reputation systems. In: Gabbay, D.M., van der Torre,L. (eds.) Logics in Security, Copenhagen, Denmark (2010)"},{"key":"1_CR15","unstructured":"Harwood, W.T., Clark, J.A., Jacob, J.L.: A perspective on trust, security and autonomous systems. In: Proceedings of the New Security Paradigms Workshop, Concord, MA (2010)"},{"key":"1_CR16","unstructured":"Hunter, A.: Reasoning about the appropriateness of propoents for arguments. In: Proceedings of the 23rd AAAI Conference on Artificial Intelligence, Chicago, Illinois (July 2008)"},{"issue":"2","key":"1_CR17","first-page":"139","volume":"4","author":"A. J\u00f8sang","year":"2006","unstructured":"J\u00f8sang, A., Gray, E., Kinateder, M.: Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems\u00a04(2), 139\u2013161 (2006)","journal-title":"Web Intelligence and Agent Systems"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1021\/ci9500905","volume":"36","author":"P.N. Judson","year":"1996","unstructured":"Judson, P.N., Fox, J., Krause, P.J.: Using new reasoning technology in chemical information systems. Journal of Chemical Information and Computer Sciences\u00a036, 621\u2013624 (1996)","journal-title":"Journal of Chemical Information and Computer Sciences"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th World Wide Web Conference (May 2004)","DOI":"10.1145\/775152.775242"},{"key":"1_CR20","unstructured":"Katz, Y., Golbeck, J.: Social network-based trust in prioritzed default logic. In: Proceedings of the 21st National Conference on Artificial Intelligence (2006)"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-16567-2_10","volume-title":"Social Informatics","author":"J. Lang","year":"2010","unstructured":"Lang, J., Spear, M., Wu, S.F.: Social manipulation of online recommender systems. In: Bolc, L., Makowski, M., Wierzbicki, A. (eds.) SocInfo 2010. LNCS, vol.\u00a06430, pp. 125\u2013139. Springer, Heidelberg (2010)"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Lerman, K., Galstyan, A.: Analysis of social voting patterns on Digg. In: Proceedings of the 1st Workshop on Online Social Networks, Seattle (August 2008)","DOI":"10.1145\/1397735.1397738"},{"key":"1_CR23","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/S0004-3702(03)00063-8","volume":"149","author":"C.-J. Liau","year":"2003","unstructured":"Liau, C.-J.: Belief, information acquisition, and trust in multi-agent systems \u2014 a modal logic formulation. Artificial Intelligence\u00a0149, 31\u201360 (2003)","journal-title":"Artificial Intelligence"},{"key":"1_CR24","unstructured":"Matt, P.-A., Morge, M., Toni, F.: Combining statistics and arguments to compute trust. In: Proceedings of the 9th International Conference on Autonomous Agents and Multiagents Systems, Toronto, Canada (May 2010)"},{"issue":"2","key":"1_CR25","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1093\/jigpal\/9.2.175","volume":"9","author":"P. McBurney","year":"2001","unstructured":"McBurney, P., Parsons, S.: Dialectical argumentation for reasoning about chemical carcinogenicity. Logic Journal of the IGPL\u00a09(2), 191\u2013203 (2001)","journal-title":"Logic Journal of the IGPL"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Miles, S., Groth, P., Munroe, S., Moreau, L.: PrIMe: A methodology for developing provenance-aware applications. ACM Transactions on Software Engineering and Methodology (2010) (to appear)","DOI":"10.1145\/2000791.2000792"},{"key":"1_CR27","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: Bringing order to the Web. Technical Report 1999-66, Stanford InfoLab (1999)"},{"key":"1_CR28","unstructured":"Parsons, S., Haigh, K., Levitt, K., Rowe, J., Singh, M., Sklar, E.: Arguments about trust. Technical report, Collaborative Technology Alliance (2011)"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Parsons, S., McBurney, P., Sklar, E.: Reasoning about trust using argumentation: A position paper. In: Proceedings of the Workshop on Argumentation in Multiagent Systems, Toronto, Canada (May 2010)","DOI":"10.1007\/978-3-642-21940-5_10"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Parsons, S., Sklar, E., McBurney, P.: Using argumentation to reason with and about trust. In: Proceedings of the 8th International Workshop on Argumentation in Multiagent Systems, Taipei, Taiwan (2011)","DOI":"10.1007\/978-3-642-33152-7_12"},{"key":"1_CR31","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/19462160903564592","volume":"1","author":"H. Prakken","year":"2010","unstructured":"Prakken, H.: An abstract framework for argumentation with structured arguments. Argument and Computation\u00a01, 93\u2013124 (2010)","journal-title":"Argument and Computation"},{"key":"1_CR32","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1109\/CCGRID.2006.43","volume-title":"Proceedinsg of the Sixth IEEE International Symposium on Cluster Computing and the Grid","author":"S. Rajbhandari","year":"2006","unstructured":"Rajbhandari, S., Wootten, I., Ali, A., Rana, O.F.: Evaluating provenance-based trust for scientific workflows. In: Proceedinsg of the Sixth IEEE International Symposium on Cluster Computing and the Grid, pp. 365\u2013372. IEEE Computer Society Press, Singapore (2006)"},{"key":"1_CR33","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/S0278-0984(02)11030-3","volume-title":"The Economics of the Internet and E-Commerce","author":"P. Resnick","year":"2002","unstructured":"Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: Empirical analysis of eBay\u2019s reputation system. In: Baye, M.R. (ed.) The Economics of the Internet and E-Commerce, pp. 127\u2013157. Elsevier Science, Amsterdam (2002)"},{"key":"1_CR34","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P. Resnick","year":"2000","unstructured":"Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation systems: Facilitating trust in internet interactions. Communications of the ACM\u00a043, 45\u201348 (2000)","journal-title":"Communications of the ACM"},{"issue":"1","key":"1_CR35","first-page":"33","volume":"23","author":"J. Sabater","year":"2005","unstructured":"Sabater, J., Sierra, C.: Review on computational trust and reputation models. AI Review\u00a023(1), 33\u201360 (2005)","journal-title":"AI Review"},{"key":"1_CR36","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-540-88833-8_12","volume-title":"Computational Logic in Multi-Agent Systems","author":"R. Stranders","year":"2008","unstructured":"Stranders, R., de Weerdt, M., Witteveen, C.: Fuzzy argumentation for trust. In: Sadri, F., Satoh, K. (eds.) CLIMA VIII 2007. LNCS (LNAI), vol.\u00a05056, pp. 214\u2013230. Springer, Heidelberg (2008)"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Tang, Y., Cai, K., McBurney, P., Sklar, E., Parsons, S.: Using argumentation to reason about trust and belief. Journal of Logic and Computation (to appear, 2011)","DOI":"10.1093\/logcom\/exr038"},{"key":"1_CR38","unstructured":"Tang, Y., Cai, K., Sklar, E., McBurney, P., Parsons, S.: A system of argumentation for reasoning about trust. In: Proceedings of the 8th European Workshop on Multi-Agent Systems, Paris, France (December 2010)"},{"key":"1_CR39","unstructured":"Teng, C.-Y., Lauterbach, D., Adamic, L.: I rate you. You rate me. Should we do so publicly? In: Proceedings of the 3rd Workshop on Online Social Networks, Boston (June 2010)"},{"key":"1_CR40","unstructured":"Victor, P., Cornelis, C., De Cock, M., Pinheiro da Silva, P.: Towards a provenance-preserving trust model in agent networks. In: Proceedings of the Workshop on Models of Trust for the Web (2006)"},{"key":"1_CR41","doi-asserted-by":"crossref","unstructured":"Wang, X., Govindan, K., Mohapatra, P.: Provenance-based information trustworthiness evaluation in multihop networks. In: Proceedings of the 53rd Annual IEEE Global Communications Conference, Miami, FL (December 2010)","DOI":"10.1109\/GLOCOM.2010.5684158"},{"key":"1_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-642-16567-2_16","volume-title":"Social Informatics","author":"S. Ye","year":"2010","unstructured":"Ye, S., Wu, S.F.: Measuring message propagation and social influence on twitter.com. In: Bolc, L., Makowski, M., Wierzbicki, A. (eds.) SocInfo 2010. LNCS, vol.\u00a06430, pp. 216\u2013231. Springer, Heidelberg (2010)"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Yin, X., Han, J., Yu, P.S.: Truth discovery with multiple conflicting information providers on the web. In: Proceedings of the Conference on Knowledge and Data Discovery (2007)","DOI":"10.1145\/1281192.1281309"},{"key":"1_CR44","doi-asserted-by":"crossref","unstructured":"Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (2003)","DOI":"10.1109\/INFCOM.2003.1209220"}],"container-title":["Lecture Notes in Computer Science","Computational Logic in Multi-Agent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22359-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T09:45:37Z","timestamp":1560591937000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22359-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223587","9783642223594"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22359-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}