{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:10:20Z","timestamp":1758265820333},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642353857"},{"type":"electronic","value":"9783642353864"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35386-4_24","type":"book-chapter","created":{"date-parts":[[2012,11,26]],"date-time":"2012-11-26T08:54:28Z","timestamp":1353920068000},"page":"323-336","source":"Crossref","is-referenced-by-count":11,"title":["A Multi-dimensional and Event-Based Model for Trust Computation in the Social Web"],"prefix":"10.1007","author":[{"given":"Barbara","family":"Carminati","sequence":"first","affiliation":[]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Viviani","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Proceedings of the Tenth International Conference on Information and Knowledge Management, CIKM 2001, pp. 310\u2013317. ACM, New York (2001)","DOI":"10.1145\/502636.502638"},{"key":"24_CR2","unstructured":"Adali, S., Wallace, W.A., Qian, Y., Vijayakumar, P., Singh, M.: A Unified Framework for Trust in Composite Networks. In: Proceedings of the 13th AAMAS Workshop on Trust in Agent Societies (Trust), pp. 1\u201312 (2011)"},{"key":"24_CR3","unstructured":"Anicic, D., Stojanovic, N.: Expressive logical framework for reasoning about complex events and situations. In: Intelligent Event Processing, Papers from the 2009 AAAI Spring Symposium, pp. 14\u201320 (2009)"},{"key":"24_CR4","unstructured":"Appelquist, D., Brickley, D., Carvahlo, M., Iannella, R., Passant, A., Perey, C., Story, H.: A standards-based, open and privacy-aware social web. Tech. rep., W3C (December 2010)"},{"issue":"4","key":"24_CR5","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1002\/asi.20307","volume":"57","author":"R. Aringhieri","year":"2006","unstructured":"Aringhieri, R., Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems. J. Am. Soc. Inf. Sci. Technol.\u00a057(4), 528\u2013537 (2006)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"issue":"11","key":"24_CR6","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.1109\/LCOMM.2011.090911.111340","volume":"15","author":"L. Atzori","year":"2011","unstructured":"Atzori, L., Iera, A., Morabito, G.: SIoT: Giving a Social Structure to the Internet of Things. IEEE Communications Letters\u00a015(11), 1193\u20131195 (2011)","journal-title":"IEEE Communications Letters"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The Role of Trust Management in Distributed Systems Security. In: Dell\u2019Acqua, P. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 185\u2013210. Springer, Heidelberg (1999)","DOI":"10.1007\/3-540-48749-2_8"},{"key":"24_CR8","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MIC.2007.138","volume":"11","author":"J. Breslin","year":"2007","unstructured":"Breslin, J., Decker, S.: The Future of Social Networks on the Internet: The Need for Semantics. IEEE Internet Computing\u00a011, 86\u201390 (2007)","journal-title":"IEEE Internet Computing"},{"key":"24_CR9","unstructured":"Castaneda, A., da Silva, P.P.: Extracting Trust Network Information from Scientific Web Portals. Tech. Rep. UTEP-CS-08-32, University of Texas at El Paso (August 2008)"},{"key":"24_CR10","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/s11235-009-9259-5","volume":"44","author":"X. Chu","year":"2010","unstructured":"Chu, X., Chen, X., Zhao, K., Liu, J.: Reputation and trust management in heterogeneous peer-to-peer networks. Telecommunication Systems\u00a044, 191\u2013203 (2010)","journal-title":"Telecommunication Systems"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Ding, L., Chen, S., Rundensteiner, E.A., Tatemura, J., Hsiung, W.-P., Candan, K.S.: Runtime semantic query optimization for event stream processing. In: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering, pp. 676\u2013685. IEEE Computer Society Press, Washington, DC, USA (2008)","DOI":"10.1109\/ICDE.2008.4497476"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"DuBois, T., Golbeck, J., Srinivasan, A.: Predicting Trust and Distrust in Social Networks. In: Proceedings of the Third IEEE International Conference on Social Computing (SocialCom 2011). IEEE (October 2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.56"},{"key":"24_CR13","unstructured":"Falcone, R., Castelfranchi, C.: Trust and Transitivity: A Complex Deceptive Relationship. In: Proceedings of the 12th AAMAS Workshop on Trust in Agent Societies (Trust), pp. 43\u201354 (2010)"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Fong, P.W.L.: Relationship-based access control: protection model and policy language. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, pp. 191\u2013202. ACM, New York (2011)","DOI":"10.1145\/1943513.1943539"},{"key":"24_CR15","unstructured":"Ghiselli Ricci, R., Viviani, M.: Asymptotically idempotent aggregation operators for trust management in multi-agent systems. In: IPMU 2008: Proceedings, Malaga, Spain, June 22-27, pp. 129\u2013137 (2008)"},{"key":"24_CR16","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1145\/1183463.1183470","volume":"6","author":"J. Golbeck","year":"2006","unstructured":"Golbeck, J., Hendler, J.: Inferring binary trust relationships in web-based social networks. ACM Trans. Internet Technol.\u00a06, 497\u2013529 (2006)","journal-title":"ACM Trans. Internet Technol."},{"issue":"1","key":"24_CR17","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/963770.963772","volume":"22","author":"J.L. Herlocker","year":"2004","unstructured":"Herlocker, J.L., Konstan, J.A., Terveen, L.G., Riedl, J.T.: Evaluating collaborative filtering recommender systems. ACM Trans. Inf. Syst.\u00a022(1), 5\u201353 (2004)","journal-title":"ACM Trans. Inf. Syst."},{"key":"24_CR18","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst.\u00a043, 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., Marsh, S., Pope, S.: Exploring different types of trust propagation. In: St\u00f8len, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol.\u00a03986, pp. 179\u2013192. Springer, Heidelberg (2006)","DOI":"10.1007\/11755593_14"},{"issue":"12","key":"24_CR20","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/2.970591","volume":"34","author":"L. Kagal","year":"2001","unstructured":"Kagal, L., Finin, T., Joshi, A.: Trust-based security in pervasive computing environments. Computer\u00a034(12), 154\u2013157 (2001)","journal-title":"Computer"},{"issue":"4","key":"24_CR21","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TSMCA.2011.2132707","volume":"41","author":"P. Kazienko","year":"2011","unstructured":"Kazienko, P., Musial, K., Kajdanowicz, T.: Multidimensional Social Network in the Social Recommender System. IEEE Transactions on Systems, Man, and Cybernetics, Part A\u00a041(4), 746\u2013759 (2011)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part A"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Kumar, R., Novak, J., Tomkins, A.: Structure and Evolution of Online Social Networks. In: Yu, P.S.S., Han, J., Faloutsos, C. (eds.) Link Mining: Models, Algorithms, and Applications, pp. 337\u2013357. Springer (2010)","DOI":"10.1007\/978-1-4419-6515-8_13"},{"key":"24_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1754393.1754397","volume":"10","author":"U. Kuter","year":"2010","unstructured":"Kuter, U., Golbeck, J.: Using probabilistic confidence models for trust inference in web-based social networks. ACM Trans. Internet Technol.\u00a010, 8:1\u20138:23 (2010)","journal-title":"ACM Trans. Internet Technol."},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Kleinberg, J., Faloutsos, C.: Graph evolution: Densification and shrinking diameters. ACM Trans. Knowl. Discov. Data\u00a01(1) (March 2007)","DOI":"10.1145\/1217299.1217301"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Liu, G., Wang, Y., Orgun, M.A.: Trust Transitivity in Complex Social Networks. In: Burgard, W., Roth, D. (eds.) AAAI. AAAI Press (2011)","DOI":"10.1609\/aaai.v25i1.8087"},{"key":"24_CR26","unstructured":"Luckham, D.C.: The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems. Addison-Wesley Longman Publishing Co., Inc, Boston (2001)"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Maheswaran, M., Tang, H.C., Ghunaim, A.: Towards a gravity-based trust model for social networking systems. In: Proceedings of the 27th ICDCS Workshops, p. 24. IEEE Computer Society Press, Washington, DC, USA (2007)","DOI":"10.1109\/ICDCSW.2007.82"},{"key":"24_CR28","doi-asserted-by":"crossref","unstructured":"Mass, Y., Shehory, O.: Distributed Trust in Open Multi-agent Systems. In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) AA-WS 2000. LNCS (LNAI), vol.\u00a02246, pp. 159\u2013174. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-45547-7_10"},{"key":"24_CR29","unstructured":"McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Tech. Rep. MISRC Working Paper Series 96-04, University of Minnesota (1996)"},{"key":"24_CR30","doi-asserted-by":"crossref","unstructured":"Nin, J., Carminati, B., Ferrari, E., Torra, V.: Computing Reputation for Collaborative Private Networks. In: Proceedings of COMPSAC 2009, pp. 246\u2013253. IEEE Computer Society Press, Washington, DC, USA (2009)","DOI":"10.1109\/COMPSAC.2009.40"},{"key":"24_CR31","doi-asserted-by":"crossref","unstructured":"O\u2019Donovan, J., Smyth, B.: Trust in recommender systems. In: Proceedings of the 10th International Conference on Intelligent User Interfaces, IUI 2005, pp. 167\u2013174. ACM, New York (2005)","DOI":"10.1145\/1040830.1040870"},{"key":"24_CR32","doi-asserted-by":"crossref","unstructured":"Rana, O.F., Hinze, A.: Trust and reputation in dynamic scientific communities. IEEE Distributed Systems Online\u00a05(1) (2004)","DOI":"10.1109\/MDSO.2004.1270714"},{"key":"24_CR33","doi-asserted-by":"crossref","unstructured":"Tang, J., Gao, H., Liu, H.: mTrust: Discerning Multi-faceted Trust in a Connected World. In: Adar, E., Teevan, J., Agichtein, E., Maarek, Y. (eds.) WSDM, pp. 93\u2013102. ACM (2012)","DOI":"10.1145\/2124295.2124309"},{"key":"24_CR34","unstructured":"Taylor, H., Yochem, A., Phillips, L., Martinez, F.: Event-Driven Architecture: How SOA Enables the Real-Time Enterprise, 1st edn. Addison-Wesley Professional (2009)"},{"key":"24_CR35","unstructured":"Wang, Y., Singh, M.P.: Trust representation and aggregation in a distributed agent system. In: Proceedings of the 21st National Conference on Artificial Intelligence, AAAI 2006, pp. 1425\u20131430. AAAI Press (2006)"},{"key":"24_CR36","doi-asserted-by":"crossref","unstructured":"Xiang, R., Neville, J., Rogati, M.: Modeling relationship strength in online social networks. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 981\u2013990. ACM, New York (2010)","DOI":"10.1145\/1772690.1772790"},{"issue":"7","key":"24_CR37","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L. Xiong","year":"2004","unstructured":"Xiong, L., Liu, L.: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering\u00a016(7), 843\u2013857 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"}],"container-title":["Lecture Notes in Computer Science","Social Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35386-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T03:21:51Z","timestamp":1687836111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35386-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353857","9783642353864"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35386-4_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}