{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:12:11Z","timestamp":1742922731230,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642242724"},{"type":"electronic","value":"9783642242731"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24273-1_34","type":"book-chapter","created":{"date-parts":[[2011,9,27]],"date-time":"2011-09-27T18:27:24Z","timestamp":1317148044000},"page":"248-254","source":"Crossref","is-referenced-by-count":0,"title":["Research on Social Trust of Internet Services"],"prefix":"10.1007","author":[{"given":"Anliang","family":"Ning","sequence":"first","affiliation":[]},{"given":"Xiaojing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chunxian","family":"Wang","sequence":"additional","affiliation":[]},{"family":"PingWang","sequence":"additional","affiliation":[]},{"given":"Pengfei","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Maamar, Z., et al.: Using Social Networks for Web Services Discovery. IEEE Internet Computing (2011)","DOI":"10.1109\/MIC.2011.27"},{"issue":"2","key":"34_CR2","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/MIS.2007.41","volume":"22","author":"F.Y. Wang","year":"2007","unstructured":"Wang, F.Y., et al.: Social Computing: From Social Informatics to Social Intelligence. IEEE Intelligent Systems\u00a022(2), 79\u201383 (2007)","journal-title":"IEEE Intelligent Systems"},{"issue":"10","key":"34_CR3","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.simpat.2010.06.018","volume":"19","author":"Z. Maamar","year":"2011","unstructured":"Maamar, Z., et al.: LinkedWS: A Novel Web Services Discovery Model Based on the Metaphor of Social Networks. Simulation Modeling Practice and Theory\u00a019(10), 121\u2013132 (2011)","journal-title":"Simulation Modeling Practice and Theory"},{"key":"34_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICC.2010.5502385","volume-title":"Proc. 2010 IEEE Int\u2019l. Conf. Communications (ICC 2010)","author":"A. Maaradji","year":"2010","unstructured":"Maaradji, A., et al.: Towards a Social Network-based Approach for Services Composition. In: Proc. 2010 IEEE Int\u2019l. Conf. Communications (ICC 2010), pp. 1\u20135. IEEE Press, Los Alamitos (2010)"},{"issue":"8","key":"34_CR5","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MC.2010.239","volume":"43","author":"M. Nam Ko","year":"2010","unstructured":"Nam Ko, M., et al.: Social-Networks Connect Services. Computer\u00a043(8), 37\u201343 (2010)","journal-title":"Computer"},{"key":"34_CR6","first-page":"573","volume-title":"Semantic Web, Social Networks and Multi-agent Systems","author":"N. Nguyen","year":"2009","unstructured":"Nguyen, N., et al.: Model for Trust Dynamics in Service Oriented Information Systems, in Computational Collective Intelligence. In: Semantic Web, Social Networks and Multi-agent Systems, pp. 573\u2013583. Springer, Berlin (2009)"},{"key":"34_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-642-04930-9_22","volume-title":"The Semantic Web - ISWC 2009","author":"U. Kuter","year":"2009","unstructured":"Kuter, U., Golbeck, J.: Semantic Web Service Composition in Social Environments. In: Bernstein, A., Karger, D.R., Heath, T., Feigenbaum, L., Maynard, D., Motta, E., Thirunarayan, K. (eds.) ISWC 2009. LNCS, vol.\u00a05823, pp. 344\u2013358. Springer, Heidelberg (2009)"},{"issue":"2","key":"34_CR8","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s10207-008-0068-8","volume":"8","author":"J. Li","year":"2009","unstructured":"Li, J., et al.: Denial of service attacks and defenses in decentralized trust management. International Journal of Information Security\u00a08(2), 89\u2013101 (2009)","journal-title":"International Journal of Information Security"},{"key":"34_CR9","first-page":"185","volume":"61","author":"D. Trcek","year":"2010","unstructured":"Trcek, D.: Trust management for pervasive computing environments. Proceedings of World Academy of Science, Engineering and Technology\u00a061, 185\u2013190 (2010)","journal-title":"Proceedings of World Academy of Science, Engineering and Technology"},{"issue":"2","key":"34_CR10","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s10994-010-5211-x","volume":"82","author":"A. Rettinger","year":"2010","unstructured":"Rettinger, A., Nickles, M., Tresp, V.: Statistical relational learning of trust. Machine Learning\u00a082(2), 191\u2013209 (2010)","journal-title":"Machine Learning"},{"issue":"1","key":"34_CR11","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.ijpe.2009.10.006","volume":"126","author":"P. Tatham","year":"2010","unstructured":"Tatham, P., Kovacs, G.: The application of \u201cswift trust\u201d to humanitarian logistics. International Journal of Production Economics\u00a0126(1), 35\u201345 (2010)","journal-title":"International Journal of Production Economics"},{"issue":"3","key":"34_CR12","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.knosys.2009.12.004","volume":"23","author":"W. Yuan","year":"2011","unstructured":"Yuan, W., et al.: Improved trust-aware recommender system using small-worldness of trust networks. Knowledge-Based Systems\u00a023(3), 232\u2013238 (2011)","journal-title":"Knowledge-Based Systems"},{"issue":"4","key":"34_CR13","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.sysarc.2009.01.002","volume":"55","author":"D. Kovac","year":"2009","unstructured":"Kovac, D., Trcek, D.: Qualitative trust modeling in SOA. Journal of Systems Architecture\u00a055(4), 255\u2013263 (2009)","journal-title":"Journal of Systems Architecture"},{"issue":"5","key":"34_CR14","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MIC.2010.83","volume":"14","author":"J. Huang","year":"2011","unstructured":"Huang, J., Nicol, D.: A formal-semantics-based calculus of trust. IEEE Internet Computing\u00a014(5), 38\u201346 (2011)","journal-title":"IEEE Internet Computing"},{"issue":"5","key":"34_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MIC.2010.124","volume":"14","author":"L. Liu","year":"2011","unstructured":"Liu, L., Shi, W.: Trust and reputation management. IEEE Internet Computing\u00a014(5), 10\u201313 (2011)","journal-title":"IEEE Internet Computing"},{"issue":"2","key":"34_CR16","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MITP.2009.41","volume":"11","author":"K.W. Miller","year":"2009","unstructured":"Miller, K.W., Voas, J.: The metaphysics of software trust. IT Professional\u00a011(2), 52\u201355 (2009)","journal-title":"IT Professional"},{"issue":"2","key":"34_CR17","first-page":"240","volume":"6","author":"B. Liu","year":"2011","unstructured":"Liu, B.: Efficient trust negotiation based on trust evaluations and adaptive policies. Journal of Computers\u00a06(2), 240\u2013245 (2011)","journal-title":"Journal of Computers"}],"container-title":["Communications in Computer and Information Science","Emerging Research in Web Information Systems and Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24273-1_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,7]],"date-time":"2019-04-07T23:02:34Z","timestamp":1554678154000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24273-1_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642242724","9783642242731"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24273-1_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}