{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T07:26:31Z","timestamp":1770881191498,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642322860","type":"print"},{"value":"9783642322877","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32287-7_8","type":"book-chapter","created":{"date-parts":[[2012,8,20]],"date-time":"2012-08-20T06:35:41Z","timestamp":1345444541000},"page":"93-104","source":"Crossref","is-referenced-by-count":36,"title":["A Conceptual Framework for Trust Models"],"prefix":"10.1007","author":[{"given":"Francisco","family":"Moyano","sequence":"first","affiliation":[]},{"given":"Carmen","family":"Fernandez-Gago","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-540-85735-8_4","volume-title":"Trust, Privacy and Security in Digital Business","author":"I. Agudo","year":"2008","unstructured":"Agudo, I., Fernandez-Gago, C., Lopez, J.: A Model for Trust Metrics Analysis. In: Furnell, S.M., Katsikas, S.K., Lioy, A. (eds.) TrustBus 2008. LNCS, vol.\u00a05185, pp. 28\u201337. Springer, Heidelberg (2008)"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.websem.2007.03.002","volume":"5","author":"D. Artz","year":"2007","unstructured":"Artz, D., Gil, Y.: A survey of trust in computer science and the Semantic Web. Web Semantics: Science, Services and Agents on the World Wide Web\u00a05, 58\u201371 (2007)","journal-title":"Web Semantics: Science, Services and Agents on the World Wide Web"},{"key":"8_CR3","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE Symposium on Security and Privacy, pp. 164\u2013173 (1996)"},{"key":"8_CR4","unstructured":"Boon, S., Holmes, J.: The dynamics of interpersonal trust: Resolving uncertainty in the face of risk, pp. 190\u2013211 (1991)"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-62494-5_16","volume-title":"Security Protocols","author":"B. Christianson","year":"1997","unstructured":"Christianson, B., Harbison, W.S.: Why Isn\u2019t Trust Transitive? In: Lomas, M. (ed.) Security Protocols 1996. LNCS, vol.\u00a01189, pp. 171\u2013176. Springer, Heidelberg (1997)"},{"key":"8_CR6","unstructured":"Gambetta, D.: Can we trust trust? In: Trust: Making and Breaking Cooperative Relations, pp. 213\u2013237. Basil Blackwell (1988)"},{"issue":"4","key":"8_CR7","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T. Grandison","year":"2000","unstructured":"Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys & Tutorials\u00a03(4), 2\u201316 (2000)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"8_CR8","unstructured":"Yew, C.H.: Architecture Supporting Computational Trust Formation. PhD thesis, University of Western Ontario, London, Ontario (2011)"},{"issue":"3","key":"8_CR9","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A. J\u00f8sang","year":"2001","unstructured":"J\u00f8sang, A.: A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a09(3), 279\u2013311 (2001)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"2","key":"8_CR10","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"key":"8_CR11","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-02056-8_12","volume-title":"Trust Management III","author":"A.J. Lee","year":"2009","unstructured":"Lee, A.J., Winslett, M., Perano, K.J.: TrustBuilder2: A Reconfigurable Framework for Trust Negotiation. In: Ferrari, E., Li, N., Bertino, E., Karabulut, Y. (eds.) IFIPTM 2009. IFIP AICT, vol.\u00a0300, pp. 176\u2013195. Springer, Heidelberg (2009)"},{"key":"8_CR12","unstructured":"Levien, R.: Attack Resistant Trust Metrics. PhD thesis, University of California at Berkeley (2004)"},{"key":"8_CR13","unstructured":"Marsh, S.: Formalising Trust as a Computational Concept. PhD thesis, University of Stirling (April 1994)"},{"issue":"3","key":"8_CR14","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"20","author":"R.C. Mayer","year":"1995","unstructured":"Mayer, R.C., Davis, J.H., David Schoorman, F.: An integrative model of organizational trust. Academy of Management Review\u00a020(3), 709\u2013734 (1995)","journal-title":"Academy of Management Review"},{"key":"8_CR15","unstructured":"Harrison McKnight, D., Chervany, N.L.: The meanings of trust. Technical report, University of Minnesota, Management Information Systems Research Center (1996)"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MC.2010.289","volume":"43","author":"K.W. Miller","year":"2010","unstructured":"Miller, K.W., Voas, J., Laplante, P.: In Trust We Trust. Computer\u00a043, 85\u201387 (2010)","journal-title":"Computer"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation, pp. 280\u2013287 (2002)","DOI":"10.1145\/544741.544807"},{"key":"8_CR18","unstructured":"Olmedilla, D., Rana, O.F., Matthews, B., Nejdl, W.: Security and trust issues in semantic grids. In: Proceedings of the Dagsthul Seminar, Semantic Grid: The Convergence of Technologies, vol.\u00a05271 (2005)"},{"issue":"01","key":"8_CR19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1017\/S0269888904000116","volume":"19","author":"S.D. Ramchurn","year":"2005","unstructured":"Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multi-agent systems. The Knowledge Engineering Review\u00a019(01), 1\u201325 (2005)","journal-title":"The Knowledge Engineering Review"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Resnick, P., Zeckhauser, R.: Trust among strangers in Internet transactions: Empirical analysis of eBay\u2019s reputation system. In: Baye, M.R. (ed.) The Economics of the Internet and E-Commerce. Advances in Applied Microeconomics, vol.\u00a011, pp. 127\u2013157. Elsevier Science (2002)","DOI":"10.1016\/S0278-0984(02)11030-3"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/11429760_6","volume-title":"Trust Management","author":"S. Ruohomaa","year":"2005","unstructured":"Ruohomaa, S., Kutvonen, L.: Trust Management Survey. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 77\u201392. Springer, Heidelberg (2005)"},{"key":"8_CR22","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-22200-9_7","volume-title":"Trust Management V","author":"R. Saadi","year":"2011","unstructured":"Saadi, R., Rahaman, M.A., Issarny, V., Toninelli, A.: Composing Trust Models towards Interoperable Trust Management. In: Wakeman, I., Gudes, E., Jensen, C.D., Crampton, J. (eds.) IFIPTM 2011. IFIP AICT, vol.\u00a0358, pp. 51\u201366. Springer, Heidelberg (2011)"},{"key":"8_CR23","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1145\/375735.376110","volume-title":"Proceedings of the Fifth International Conference on Autonomous Agents, AGENTS 2001","author":"J. Sabater","year":"2001","unstructured":"Sabater, J., Sierra, C.: Regret: reputation in gregarious societies. In: Proceedings of the Fifth International Conference on Autonomous Agents, AGENTS 2001, pp. 194\u2013195. ACM, New York (2001)"},{"key":"8_CR24","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10462-004-0041-5","volume":"24","author":"J. Sabater","year":"2005","unstructured":"Sabater, J., Sierra, C.: Review on Computational Trust and Reputation Models. Artificial Intelligence Review\u00a024, 33\u201360 (2005)","journal-title":"Artificial Intelligence Review"},{"key":"8_CR25","first-page":"52","volume-title":"Proceeding of the 28th International Conference","author":"G. Suryanarayana","year":"2006","unstructured":"Suryanarayana, G., Diallo, M.H., Erenkrantz, J.R., Taylor, R.N.: Architectural Support for Trust Models in Decentralized Applications. In: Proceeding of the 28th International Conference, pp. 52\u201361. ACM Press, New York (2006)"},{"issue":"6","key":"8_CR26","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MIC.2002.1067734","volume":"6","author":"M. Winslett","year":"2002","unstructured":"Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: Negotiating trust in the Web. IEEE Internet Computing\u00a06(6), 30\u201337 (2002)","journal-title":"IEEE Internet Computing"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Yan, Z., Holtmanns, S.: Trust Modeling and Management: from Social Trust to Digital Trust. Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions (January 2008)","DOI":"10.4018\/978-1-59904-804-8.ch013"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, P., Durresi, A., Barolli, L.: Survey of Trust Management on Various Networks. In: 2011 International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), pp. 219\u2013226 (2011)","DOI":"10.1109\/CISIS.2011.122"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32287-7_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T23:59:27Z","timestamp":1743983967000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32287-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642322860","9783642322877"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32287-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}