{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:25:09Z","timestamp":1742912709105,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642287619"},{"type":"electronic","value":"9783642287626"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28762-6_22","type":"book-chapter","created":{"date-parts":[[2012,3,8]],"date-time":"2012-03-08T11:50:52Z","timestamp":1331207452000},"page":"179-187","source":"Crossref","is-referenced-by-count":8,"title":["Trust and Transitivity: How Trust-Transfer Works"],"prefix":"10.1007","author":[{"given":"Rino","family":"Falcone","sequence":"first","affiliation":[]},{"given":"Cristiano","family":"Castelfranchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Marsh, S.P.: Formalising Trust as a computational concept. PhD thesis. University of Stirling (1994), \n                    http:\/\/www.nr.no\/abie\/papers\/TR133.pdf"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Yu, B., Singh, M.P.: Searching social networks. In: Proceedings of the Second International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), pp. 65\u201372. ACM Press (2003)","DOI":"10.1145\/860575.860587"},{"key":"22_CR3","unstructured":"Sabater, J.: Trust and Reputation for Agent Societies, PhD thesis. Universitat Autonoma de Barcelona (2003)"},{"key":"22_CR4","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/3-540-45547-7_4","volume-title":"Trust in Cyber-societies","author":"R. Falcone","year":"2001","unstructured":"Falcone, R., Castelfranchi, C.: The Socio-Cognitive Dynamics Of Trust: Does Trust Create Trust? In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) AA-WS 2000. LNCS (LNAI), vol.\u00a02246, pp. 55\u201372. Springer, Heidelberg (2001)"},{"key":"22_CR5","doi-asserted-by":"crossref","DOI":"10.1002\/9780470519851","volume-title":"Trust Theory: A Socio-Cognitive and Computational Model","author":"C. Castelfranchi","year":"2010","unstructured":"Castelfranchi, C., Falcone, R.: Trust Theory: A Socio-Cognitive and Computational Model. John Wiley and Sons, Chichester (2010) ISBN 978-0-470-02875-9"},{"key":"22_CR6","volume-title":"Proceeding of the Sixth International Conference on Ubiquitous Intelligence and Computing","author":"T. Bhuiyan","year":"2009","unstructured":"Bhuiyan, T., Josang, A., Xu, Y.: An analysis of trust transitivit\u00e0 taking base rate into account. In: Proceeding of the Sixth International Conference on Ubiquitous Intelligence and Computing, July 7-9, University of Queensland, Brisbane (2009)"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Li, X., Han, Z., Shen, C.: Transitive trust to executables generated during runtime. In: Second International Conference on Innovative Computing, Information and Control (2007)","DOI":"10.1109\/ICICIC.2007.602"},{"issue":"4","key":"22_CR8","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1145\/1183463.1183470","volume":"6","author":"J. Golbeck","year":"2006","unstructured":"Golbeck, J., Hendler, J.: Inferring binary trust relationships in web-based social networks. ACM Transactions on Internet Technology\u00a06(4), 497\u2013529 (2006)","journal-title":"ACM Transactions on Internet Technology"},{"key":"22_CR9","first-page":"37","volume-title":"Non-Monotonic Reasoning and Partial Semantics","author":"J.J.C. Meyer","year":"1992","unstructured":"Meyer, J.J.C., van der Hoek, W.: A modal logic for nonmonotonic reasoning. In: van der Hoek, W., Meyer, J.J.C., Tan, Y.H., Witteveen, C. (eds.) Non-Monotonic Reasoning and Partial Semantics, pp. 37\u201377. Ellis Horwood, Chichester (1992)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Falcone, R., Piunti, M., Venanzi, M., Castelfranchi, C.: From Manifesta to Krypta: The Relevance of Categories for Trusting Others. ACM Transaction on IST (in press, 2012)","DOI":"10.1145\/2438653.2438662"},{"key":"22_CR11","unstructured":"Burnett, C., Norman, T., Sycara, K.: Bootstrapping trust evaluations through stereotypes. In: van der Hoek, Kaminka, Lesperance, Luck, Sen (eds.) 9th International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2010), Toronto, Canada, pp. 241\u2013248 (2010)"},{"key":"22_CR12","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-642-02056-8_10","volume-title":"Trust Management III","author":"M. Tavakolifard","year":"2009","unstructured":"Tavakolifard, M., Herrmann, P., \u00d6zt\u00fcrk, P.: Analogical Trust Reasoning. In: Ferrari, E., Li, N., Bertino, E., Karabulut, Y. (eds.) IFIPTM 2009. IFIP AICT, vol.\u00a0300, pp. 149\u2013163. Springer, Heidelberg (2009)"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-62494-5_16","volume-title":"Security Protocols","author":"B. Christianson","year":"1997","unstructured":"Christianson, B., Harbison, W.: Why Isn\u2019t Trust Transitive? In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol.\u00a01189, pp. 171\u2013176. Springer, Heidelberg (1997)"}],"container-title":["Advances in Intelligent and Soft Computing","Highlights on Practical Applications of Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28762-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T00:28:42Z","timestamp":1676766522000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-28762-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642287619","9783642287626"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28762-6_22","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2012]]}}}