{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:36:16Z","timestamp":1725467776551},"publisher-location":"Berlin, Heidelberg","reference-count":54,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642331510"},{"type":"electronic","value":"9783642331527"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33152-7_12","type":"book-chapter","created":{"date-parts":[[2012,9,28]],"date-time":"2012-09-28T11:00:19Z","timestamp":1348830019000},"page":"194-212","source":"Crossref","is-referenced-by-count":7,"title":["Using Argumentation to Reason with and about Trust"],"prefix":"10.1007","author":[{"given":"Simon","family":"Parsons","sequence":"first","affiliation":[]},{"given":"Elizabeth","family":"Sklar","sequence":"additional","affiliation":[]},{"given":"Peter","family":"McBurney","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Abrams, Z., McGrew, R., Plotkin, S.: Keeping peers honest in EigenTrust. In: Proceedings of the 2nd Workshop on the Economics of Peer-to-Peer Systems (2004)"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Adler, B.T., de Alfaro, L.: A content-driven reputation system for the Wikipedia. In: Proceedings of the 16th International World Wide Web Conference, Banff, Alberta (May 2007)","DOI":"10.1145\/1242572.1242608"},{"issue":"3","key":"12_CR3","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1023\/A:1014490210693","volume":"34","author":"L. Amgoud","year":"2002","unstructured":"Amgoud, L., Cayrol, C.: A reasoning model based on the production of acceptable arguments. Annals of Mathematics and Artifical Intelligence\u00a034(3), 197\u2013215 (2002)","journal-title":"Annals of Mathematics and Artifical Intelligence"},{"issue":"2","key":"12_CR4","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.websem.2007.03.002","volume":"5","author":"D. Artz","year":"2007","unstructured":"Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. Journal of Web Semantics\u00a05(2), 58\u201371 (2007)","journal-title":"Journal of Web Semantics"},{"key":"12_CR5","unstructured":"Benferhat, S., Dubois, D., Prade, H.: Representing default rules in possibilistic logic. In: Proceedings of the 3rd International Conference on Knowledge Representation and Reasoning (1992)"},{"key":"12_CR6","unstructured":"Caminada, M.W.A.: Semi-stable semantics. In: Proceedings of the 1st International Conference on Computational Models of Argument, Liverpool, UK (September 2006)"},{"issue":"4","key":"12_CR7","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1145\/371578.371581","volume":"32","author":"C.I. Ches\u00f1evar","year":"2000","unstructured":"Ches\u00f1evar, C.I., Maguitman, A.G., Loui, R.P.: Logical models of argument. ACM Computing Surveys\u00a032(4), 337\u2013383 (2000)","journal-title":"ACM Computing Surveys"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Dandekar, P., Goel, A., Govindan, R., Post, I.: Liquidity in credit networks: A little trust goes a long way. Technical report, Department of Management Science and Engineering, Stanford University (2010)","DOI":"10.1145\/1879082.1879084"},{"key":"12_CR9","unstructured":"De Figueiredo, D.B., Barr, E.T.: TrustDavis: A non-exploitable online reputation system. In: Proceedings of the 7th IEEE International Conference on E-Commerce Technology (2005)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Dong, X.L., Berti-Equille, L., Srivastava, D.: Integrating conflicting data: The role of source dependence. In: Proceedings of the 35th International Conference on Very Large Databases, Lyon, France (August 2009)","DOI":"10.14778\/1687627.1687690"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/0004-3702(94)00041-X","volume":"77","author":"P.M. Dung","year":"1995","unstructured":"Dung, P.M.: On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artificial Intelligence\u00a077, 321\u2013357 (1995)","journal-title":"Artificial Intelligence"},{"key":"12_CR12","unstructured":"Dung, P.M., Mancarella, P., Toni, F.: A dialectical procedure for sceptical, assumption-based argumentation. In: Proceedings of the 1st International Conference on Computational Models of Argument, Liverpool, UK (September 2006)"},{"issue":"2","key":"12_CR13","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1016\/j.artint.2010.09.005","volume":"175","author":"P.E. Dunne","year":"2011","unstructured":"Dunne, P.E., Hunter, A., McBurney, P., Parsons, S., Wooldridge, M.: Weighted argument systems: Basic definitions, algorithms, and complexity results. Artificial Intelligence\u00a0175(2), 457\u2013486 (2011)","journal-title":"Artificial Intelligence"},{"key":"12_CR14","unstructured":"Francone, R., Castelfranchi, C.: Transitivity in trust: A discussed property. In: Proceedings of the Undicesimo Workshop Nazionale \u201dDagli Oggetti agli Agenti\u201d, Rimini (September 2010)"},{"key":"12_CR15","first-page":"213","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"D. Gambetta","year":"1990","unstructured":"Gambetta, D.: Can we trust them? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relations, pp. 213\u2013238. Blackwell, Oxford (1990)"},{"issue":"1","key":"12_CR16","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1017\/S1471068403001674","volume":"4","author":"A.J. Garc\u00eda","year":"2004","unstructured":"Garc\u00eda, A.J., Simari, G.: Defeasible logic programming: an argumentative approach. Theory and Practice of Logic Programming\u00a04(1), 95\u2013138 (2004)","journal-title":"Theory and Practice of Logic Programming"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Geerts, F., Kementsiedtsidis, A., Milano, D.: Mondrian: Annotating and querying databases through colors and blocks. In: Proceedings of the 22nd International Conference on Data Engineering, Atlanta (April 2006)","DOI":"10.1109\/ICDE.2006.102"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/11890850_12","volume-title":"Provenance and Annotation of Data","author":"J. Golbeck","year":"2006","unstructured":"Golbeck, J.: Combining Provenance with Trust in Social Networks for Semantic Web Content Filtering. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.\u00a04145, pp. 101\u2013108. Springer, Heidelberg (2006)"},{"issue":"4","key":"12_CR19","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"4","author":"T. Grandison","year":"2000","unstructured":"Grandison, T., Sloman, M.: A survey of trust in internet applications. IEEE Communications Surveys and Tutorials\u00a04(4), 2\u201316 (2000)","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th International Conference on the World Wide Web (2004)","DOI":"10.1145\/988672.988727"},{"key":"12_CR21","unstructured":"Hang, C.-W., Wang, Y., Singh, M.P.: An adaptive probabilistic trust model and its evaluation. In: Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems, Estoril, Portugal (2008)"},{"key":"12_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/11429760_7","volume-title":"Trust Management","author":"A. J\u00f8sang","year":"2005","unstructured":"J\u00f8sang, A., Keser, C., Dimitrakos, T.: Can We Manage Trust? In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 93\u2013107. Springer, Heidelberg (2005)"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th World Wide Web Conference (May 2004)","DOI":"10.1145\/775240.775242"},{"key":"12_CR24","unstructured":"Katz, Y., Golbeck, J.: Social network-based trust in prioritzed default logic. In: Proceedings of the 21st National Conference on Artificial Intelligence (2006)"},{"key":"12_CR25","unstructured":"Kuter, Y., Golbeck, J.: sunny: A new algorithm for trust inference in social networks using probabilistic confidence models. In: Proceedings of the 22nd National Conference on Artificial Intelligence (2007)"},{"key":"12_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-16567-2_10","volume-title":"Social Informatics","author":"J. Lang","year":"2010","unstructured":"Lang, J., Spear, M., Wu, S.F.: Social Manipulation of Online Recommender Systems. In: Bolc, L., Makowski, M., Wierzbicki, A. (eds.) SocInfo 2010. LNCS, vol.\u00a06430, pp. 125\u2013139. Springer, Heidelberg (2010)"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Li, G., Wang, Y., Orgun, M.A.: Optimal social trust path selection in complex social networks. In: Proceedings of the 24th AAAI Conference on Artificial Intelligence, Atlanta, GA (2010)","DOI":"10.1609\/aaai.v24i1.7509"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Li, L., Wang, Y.: Subjective trust inference in composite services. In: Proceedings of the 24th AAAI Conference on Artificial Intelligence, Atlanta, GA (2010)","DOI":"10.1609\/aaai.v24i1.7504"},{"key":"12_CR29","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/S0004-3702(03)00063-8","volume":"149","author":"C.-J. Liau","year":"2003","unstructured":"Liau, C.-J.: Belief, information acquisition, and trust in multi-agent systems\u2014a modal logic formulation. Artificial Intelligence\u00a0149, 31\u201360 (2003)","journal-title":"Artificial Intelligence"},{"issue":"3","key":"12_CR30","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1467-8640.1987.tb00178.x","volume":"3","author":"R.P. Loui","year":"1987","unstructured":"Loui, R.P.: Defeat among arguments: a system of defeasible inference. Computational Intelligence\u00a03(3), 100\u2013106 (1987)","journal-title":"Computational Intelligence"},{"key":"12_CR31","unstructured":"Matt, P.-A., Morge, M., Toni, F.: Combining statistics and arguments to compute trust. In: Proceedings of the 9th International Conference on Autonomous Agents and Multiagents Systems, Toronto, Canada (May 2010)"},{"key":"12_CR32","unstructured":"McBurney, P., Parsons, S.: Tenacious tortoises: A formalism for argument over rules of inference. In: Proceedings of the ECAI Workshop on Computational Dialectics, Berlin (2000)"},{"key":"12_CR33","unstructured":"Mui, L., Moteashemi, M., Halberstadt, A.: A computational model of trust and reputation. In: Proceedings of the 35th Hawai\u2019i International Conference on System Sciences (2002)"},{"key":"12_CR34","unstructured":"Olmedilla, D., Rana, O., Matthews, B., Nejdl, W.: Security and trust issues in semantic grids. In: Proceedings of the Dagstuhl Seminar, Semantic Grid: The Converegance of Technologies, vol.\u00a005271 (2005)"},{"issue":"10-15","key":"12_CR35","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1016\/j.artint.2007.04.006","volume":"171","author":"N. Oren","year":"2007","unstructured":"Oren, N., Norman, T., Preece, A.: Subjective logic and arguing with evidence. Artificial Intelligence\u00a0171(10-15), 838\u2013854 (2007)","journal-title":"Artificial Intelligence"},{"key":"12_CR36","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: Bringing order to the Web. Technical Report 1999-66, Stanford InfoLab (1999)"},{"key":"12_CR37","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1016\/S0888-613X(03)00073-2","volume":"35","author":"S. Parsons","year":"2004","unstructured":"Parsons, S.: On precise and correct qualitative probabilistic reasoning. International Journal of Approximate Reasoning\u00a035, 111\u2013135 (2004)","journal-title":"International Journal of Approximate Reasoning"},{"key":"12_CR38","unstructured":"Parsons, S., Haigh, K., Levitt, K., Rowe, J., Singh, M., Sklar, E.: Arguments about trust. Technical report, Collaborative Technology Alliance (2011)"},{"key":"12_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-21940-5_10","volume-title":"Argumentation in Multi-Agent Systems","author":"S. Parsons","year":"2011","unstructured":"Parsons, S., McBurney, P., Sklar, E.: Reasoning about Trust Using Argumentation: A Position Paper. In: McBurney, P., Rahwan, I., Parsons, S. (eds.) ArgMAS 2010. LNCS, vol.\u00a06614, pp. 159\u2013170. Springer, Heidelberg (2011)"},{"key":"12_CR40","unstructured":"Parsons, S., Tang, Y., Sklar, E., McBurney, P., Cai, K.: Argumentation-based reasoning in agents with varying degrees of trust. In: Proceedings of the 10th International Conference on Autonomous Agents and Multi-Agent Systems, Taipei, Taiwan (2011)"},{"key":"12_CR41","unstructured":"Pasternak, J., Roth, D.: Knowing what to believe (when you already know something). In: Proceedings of the 23rd International Conference on Computational Linguistics, Beijing, China (2010)"},{"key":"12_CR42","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1887.001.0001","volume-title":"Cognitive Carpentry","author":"J. Pollock","year":"1995","unstructured":"Pollock, J.: Cognitive Carpentry. MIT Press, Cambridge (1995)"},{"key":"12_CR43","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/19462160903564592","volume":"1","author":"H. Prakken","year":"2010","unstructured":"Prakken, H.: An abstract framework for argumentation with structured arguments. Argument and Computation\u00a01, 93\u2013124 (2010)","journal-title":"Argument and Computation"},{"key":"12_CR44","doi-asserted-by":"crossref","unstructured":"Prakken, H., Sartor, G.: Argument-based logic programming with defeasible priorities. Journal of Applied Non-classical Logics (1997)","DOI":"10.1080\/11663081.1997.10510900"},{"key":"12_CR45","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/S0278-0984(02)11030-3","volume-title":"The Economics of the Internet and E-Commerce","author":"P. Resnick","year":"2002","unstructured":"Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: Empirical analysis of eBay\u2019s reputation system. In: Baye, M.R. (ed.) The Economics of the Internet and E-Commerce, pp. 127\u2013157. Elsevier Science, Amsterdam (2002)"},{"key":"12_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-39718-2_23","volume-title":"The Semantic Web - ISWC 2003","author":"M. Richardson","year":"2003","unstructured":"Richardson, M., Agrawal, R., Domingos, P.: Trust Management for the Semantic Web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 351\u2013368. Springer, Heidelberg (2003)"},{"issue":"1","key":"12_CR47","first-page":"33","volume":"23","author":"J. Sabater","year":"2005","unstructured":"Sabater, J., Sierra, C.: Review on computational trust and reputation models. AI Review\u00a023(1), 33\u201360 (2005)","journal-title":"AI Review"},{"key":"12_CR48","doi-asserted-by":"crossref","unstructured":"Salehi-Abari, A., White, T.: Trust models and con-man agents: From mathematical to empirical analysis. In: Proceedings of the 24th AAAI Conference on Artificial Intelligence, Atlanta, Georgia (2010)","DOI":"10.1609\/aaai.v24i1.7604"},{"key":"12_CR49","unstructured":"Tang, Y., Cai, K., Sklar, E., McBurney, P., Parsons, S.: A system of argumentation for reasoning about trust. In: Proceedings of the 8th European Workshop on Multi-Agent Systems, Paris, France (December 2010)"},{"key":"12_CR50","unstructured":"Teacy, W.T.L., Chalkiadakis, G., Rogers, A., Jennings, N.R.: Sequential decision making with untrustworthy service providers. In: Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems, Estoril, Portugal (2008)"},{"key":"12_CR51","unstructured":"Wang, Y., Singh, M.P.: Trust representation and aggregation in a distributed agent system. In: Proceedings of the 21st National Conference on Artificial Intelligence, Boston, MA (2006)"},{"key":"12_CR52","doi-asserted-by":"crossref","unstructured":"Yin, X., Han, J., Yu, P.S.: Truth discovery with multiple conflicting information providers on the web. In: Proceedings of the Conference on Knowledge and Data Discovery (2007)","DOI":"10.1145\/1281192.1281309"},{"issue":"4","key":"12_CR53","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1111\/1467-8640.00202","volume":"18","author":"B. Yu","year":"2002","unstructured":"Yu, B., Singh, M.: Distributed reputation management for electronic commerce. Computational Intelligence\u00a018(4), 535\u2013549 (2002)","journal-title":"Computational Intelligence"},{"key":"12_CR54","unstructured":"Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (2003)"}],"container-title":["Lecture Notes in Computer Science","Argumentation in Multi-Agent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33152-7_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T00:04:54Z","timestamp":1687737894000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33152-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642331510","9783642331527"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33152-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}