{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:57:26Z","timestamp":1762505846988,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642173578"},{"type":"electronic","value":"9783642173585"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25535-9_22","type":"book-chapter","created":{"date-parts":[[2011,11,18]],"date-time":"2011-11-18T13:17:59Z","timestamp":1321622279000},"page":"328-343","source":"Crossref","is-referenced-by-count":27,"title":["Credibility-Based Trust Management for Services in Cloud Environments"],"prefix":"10.1007","author":[{"given":"Talal H.","family":"Noor","sequence":"first","affiliation":[]},{"given":"Quan Z.","family":"Sheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Amazon: Amazon.com: Online shopping for electronics, apparel, computers, books, dvds & more (2011), http:\/\/www.amazon.com\/ (accessed March 01, 2011)"},{"issue":"4","key":"22_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M. Armbrust","year":"2010","unstructured":"Armbrust, M., et al.: A View of Cloud Computing. Communiaction of the ACM\u00a053(4), 50\u201358 (2010)","journal-title":"Communiaction of the ACM"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Aziz, B., Hamilton, G.: Detecting Man-in-the-Middle Attacks by Precise Timing. In: Proc. of the 3rd Int. Conf. on Emerging Security Information, Systems and Technologies (SECURWARE 2009). Athens, Glyfada, Greece (June 2009)","DOI":"10.1109\/SECURWARE.2009.20"},{"issue":"3","key":"22_CR4","doi-asserted-by":"publisher","first-page":"243","DOI":"10.2307\/4132332","volume":"26","author":"S. Ba","year":"2002","unstructured":"Ba, S., Pavlou, P.: Evidence of the Effect of Trust Building Technology in Electronic Markets: Price Premiums and Buyer Behavior. MIS Quarterly\u00a026(3), 243\u2013268 (2002)","journal-title":"MIS Quarterly"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Brandic, I., Dustdar, S., Anstett, T., Schumm, D., Leymann, F., Konrad, R.: Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds. In: Proc. of IEEE 3rd Int. Conf. on Cloud Computing (CLOUD 2010), Miami, Florida, USA (July 2010)","DOI":"10.1109\/CLOUD.2010.42"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Buyya, R., Yeo, C., Venugopal, S.: Market-oriented Cloud Computing: Vision, Hype, and Reality for Delivering it Services as Computing Utilities. In: Proc. of IEEE 10th Int. Conf. on High Performance Computing and Communications (HPCC 2008), Dalian, China (September 2008)","DOI":"10.1109\/HPCC.2008.172"},{"issue":"1","key":"22_CR7","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/TPDS.2008.60","volume":"20","author":"K. Chen","year":"2008","unstructured":"Chen, K., Hwang, K., Chen, G.: Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems\u00a020(1), 83\u201396 (2008)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"22_CR8","unstructured":"Child, I.: The Psychological Meaning of Aesthetic Judgments. Visual Arts Research 9(2(18)), 51\u201359 (1983)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Conner, W., Iyengar, A., Mikalsen, T., Rouvellou, I., Nahrstedt, K.: A Trust Management Framework for Service-Oriented Environments. In: Proc. of the 18th Int. Conf. on World Wide Web (WWW 2009), Madrid, Spain (April 2009)","DOI":"10.1145\/1526709.1526829"},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"key":"22_CR11","unstructured":"eBay: ebay - new & used electronics, cars, apparel, collectibles, sporting goods & more at low prices (2011), http:\/\/www.ebay.com\/ (accessed March 01, 2011)"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1017\/CBO9780511800481.029","volume-title":"Algorithmic Game Theory","author":"E. Friedman","year":"2007","unstructured":"Friedman, E., Resnick, P., Sami, R.: Manipulation-Resistant Reputation Systems. In: Algorithmic Game Theory, pp. 677\u2013697. Cambridge University Press, New York (2007)"},{"issue":"1","key":"22_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1592451.1592452","volume":"42","author":"K. Hoffman","year":"2009","unstructured":"Hoffman, K., Zage, D., Nita-Rotaru, C.: A Survey of Attack and Defense Techniques for Reputation Systems. ACM Computing Surveys (CSUR)\u00a042(1), 1\u201331 (2009)","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"5","key":"22_CR14","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MIC.2010.86","volume":"14","author":"K. Hwang","year":"2010","unstructured":"Hwang, K., Li, D.: Trusted Cloud Computing with Secure Resources and Data Coloring. IEEE Internet Computing\u00a014(5), 14\u201322 (2010)","journal-title":"IEEE Internet Computing"},{"issue":"2","key":"22_CR15","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"key":"22_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-642-03748-1_11","volume-title":"Trust, Privacy and Security in Digital Business","author":"A. J\u00f8sang","year":"2009","unstructured":"J\u00f8sang, A., Quattrociocchi, W.: Advanced Features in Bayesian Reputation Systems. In: Fischer-H\u00fcbner, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2009. LNCS, vol.\u00a05695, pp. 105\u2013114. Springer, Heidelberg (2009)"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-13869-0_14","volume-title":"Trust and Trustworthy Computing","author":"F.J. Krautheim","year":"2010","unstructured":"Krautheim, F.J., Phatak, D.S., Sherman, A.T.: Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol.\u00a06101, pp. 211\u2013227. Springer, Heidelberg (2010)"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Lai, K., Feldman, M., Stoica, I., Chuang, J.: Incentives for Cooperation in Peer-to-Peer Networks. In: Proc. of the 1st Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, USA (June 2003)","DOI":"10.1007\/978-3-540-45172-3_1"},{"issue":"1","key":"22_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s11280-008-0056-y","volume":"12","author":"Z. Malik","year":"2009","unstructured":"Malik, Z., Bouguettaya, A.: Rater Credibility Assessment in Web Services Interactions. World Wide Web\u00a012(1), 3\u201325 (2009)","journal-title":"World Wide Web"},{"issue":"4","key":"22_CR20","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/s00778-009-0138-1","volume":"18","author":"Z. Malik","year":"2009","unstructured":"Malik, Z., Bouguettaya, A.: RATEWeb: Reputation Assessment for Trust Establishment Among Web services. The VLDB Journal\u00a018(4), 885\u2013911 (2009)","journal-title":"The VLDB Journal"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Manuel, P., Thamarai\u00a0Selvi, S., Barr, M.E.: Trust Management System for Grid and Cloud Resources. In: Proc. of the 1st Int. Conf. on Advanced Computing (ICAC 2009), Chennai, India (December 2009)","DOI":"10.1109\/ICADVC.2009.5378187"},{"key":"22_CR22","series-title":"Human-Computer Interaction Series","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-1-84800-356-9_10","volume-title":"Computing with Social Trust","author":"P. Massa","year":"2009","unstructured":"Massa, P., Avesani, P.: Trust Metrics in Recommender Systems. In: Computing with Social Trust. Human-Computer Interaction Series, pp. 259\u2013285. Springer, London (2009)"},{"key":"22_CR23","unstructured":"NetLogo: Netlogo home page (2011), http:\/\/ccl.northwestern.edu\/netlogo\/ (accessed March 1, 2011)"},{"issue":"6","key":"22_CR24","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MIC.2007.133","volume":"11","author":"A.P. Sheth","year":"2007","unstructured":"Sheth, A.P., Gomadam, K., Lathem, J.: SA-REST: Semantically Interoperable and Easier-to-Use Services and Mashups. IEEE Internet Computing\u00a011(6), 84\u201387 (2007)","journal-title":"IEEE Internet Computing"},{"key":"22_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/978-3-642-04409-0_30","volume-title":"Web Information Systems Engineering - WISE 2009","author":"F. Skopik","year":"2009","unstructured":"Skopik, F., Schall, D., Dustdar, S.: Start Trusting Strangers? Bootstrapping and Prediction of Trust. In: Vossen, G., Long, D.D.E., Yu, J.X. (eds.) WISE 2009. LNCS, vol.\u00a05802, pp. 275\u2013289. Springer, Heidelberg (2009)"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Skopik, F., Schall, D., Dustdar, S.: Trustworthy Interaction Balancing in Mixed Service-Oriented Systems. In: Proc. of ACM 25th Symp. on Applied Computing (SAC 2010), Sierre, Switzerland (March 2010)","DOI":"10.1145\/1774088.1774255"},{"issue":"9","key":"22_CR27","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1016\/j.jpdc.2006.04.003","volume":"66","author":"M. Srivatsa","year":"2006","unstructured":"Srivatsa, M., Liu, L.: Securing Decentralized Reputation Management Using TrustGuard. Journal of Parallel and Distributed Computing\u00a066(9), 1217\u20131232 (2006)","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"2","key":"22_CR28","first-page":"118","volume":"3","author":"Y. Wang","year":"2007","unstructured":"Wang, Y., Vassileva, J.: Toward Trust and Reputation Based Web Service Selection: A Survey. International Transactions on Systems Science and Applications\u00a03(2), 118\u2013132 (2007)","journal-title":"International Transactions on Systems Science and Applications"},{"key":"22_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/11537878_6","volume-title":"Trust, Privacy, and Security in Digital Business","author":"J. Weng","year":"2005","unstructured":"Weng, J., Miao, C.Y., Goh, A.: Protecting Online Rating Systems from Unfair Ratings. In: Katsikas, S.K., L\u00f3pez, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol.\u00a03592, pp. 50\u201359. Springer, Heidelberg (2005)"},{"issue":"7","key":"22_CR30","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L. Xiong","year":"2004","unstructured":"Xiong, L., Liu, L.: Peertrust: Supporting Reputation-based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions on Knowledge and Data Engineering\u00a016(7), 843\u2013857 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25535-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T03:22:39Z","timestamp":1639711359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25535-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642173578","9783642173585"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25535-9_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}