{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:25:52Z","timestamp":1745987152442,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371189"},{"type":"electronic","value":"9783642371196"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_9","type":"book-chapter","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T00:34:59Z","timestamp":1364344499000},"page":"132-148","source":"Crossref","is-referenced-by-count":3,"title":["A Formal Derivation of Composite Trust"],"prefix":"10.1007","author":[{"given":"Tim","family":"Muller","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Schweitzer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Castelfranchi, C., Falcone, R.: Principles of trust for MAS: Cognitive anatomy, social importance, and quantification. In: Proceedings of the 3rd International Conference on Multi Agent Systems, ICMAS 1998, pp. 72\u201379. IEEE Computer Society (1998)","DOI":"10.1109\/ICMAS.1998.699034"},{"issue":"3","key":"9_CR2","doi-asserted-by":"publisher","first-page":"393","DOI":"10.5465\/AMR.1998.926617","volume":"23","author":"D. Rousseau","year":"1998","unstructured":"Rousseau, D.: Not so different after all: A cross-discipline view of trust. Academy of Management Review\u00a023(3), 393\u2013404 (1998)","journal-title":"Academy of Management Review"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Nooteboom, B.: Trust: Forms, Foundations, Functions, Failures and Figures. Edward Elgar (2002)","DOI":"10.4337\/9781781950883.00013"},{"key":"9_CR4","first-page":"4","volume-title":"Proceedings of the 5th IEEE\/ACM International Workshop on Grid Computing, GRID 2004","author":"D.P. Anderson","year":"2004","unstructured":"Anderson, D.P.: BOINC: A System for Public-Resource Computing and Storage. In: Proceedings of the 5th IEEE\/ACM International Workshop on Grid Computing, GRID 2004, pp. 4\u201310. IEEE Computer Society, Washington, DC (2004)"},{"key":"9_CR5","unstructured":"J\u00f8sang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference, vol.\u00a0160, pp. 324\u2013337. Citeseer (2002)"},{"key":"9_CR6","unstructured":"Mui, L., Mohtashemi, M.: A computational model of trust and reputation. In: Proceedings of the 35th Hawaii International Conference on System Science, HICSS (2002)"},{"key":"9_CR7","unstructured":"Johnson, N.L., Kotz, S., Balakrishnan, N.: Beta Distributions. In: Continuous Univariate Distributions, 2nd edn., vol.\u00a02. Wiley (1995)"},{"key":"9_CR8","unstructured":"J\u00f8sang, A.: Artificial reasoning with subjective logic. In: 2nd Australian Workshop on Commonsense Reasoning (1997)"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10458-006-5952-x","volume":"12","author":"W. Teacy","year":"2006","unstructured":"Teacy, W., Patel, J., Jennings, N., Luck, M.: TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources. Autonomous Agents and Multi-Agent Systems\u00a012, 183\u2013198 (2006)","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Ries, S.: Certain trust: a trust model for users and agents. In: Proceedings of the 2007 ACM Symposium on Applied Computing, SAC 2007, pp. 1599\u20131604. ACM (2007)","DOI":"10.1145\/1244002.1244342"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-642-21599-5_19","volume-title":"Trust and Trustworthy Computing","author":"S. Ries","year":"2011","unstructured":"Ries, S., Habib, S.M., M\u00fchlh\u00e4user, M., Varadharajan, V.: CertainLogic: A Logic for Modeling Trust and Uncertainty. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) TRUST 2011. LNCS, vol.\u00a06740, pp. 254\u2013261. Springer, Heidelberg (2011)"},{"key":"9_CR12","volume-title":"Fuzzy sets and fuzzy logic: Theory and applications","author":"G.J. Klir","year":"1995","unstructured":"Klir, G.J., Yuan, B.: Fuzzy sets and fuzzy logic: Theory and applications. Prentice Hall, Upper Saddle River (1995)"},{"issue":"2","key":"9_CR13","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1214\/aoms\/1177698950","volume":"38","author":"A.P. Dempster","year":"1967","unstructured":"Dempster, A.P.: Upper and lower probabilities induced by a multivalued mapping. Ann. Math. Statist.\u00a038(2), 325\u2013339 (1967)","journal-title":"Ann. Math. Statist."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press (1976)","DOI":"10.1515\/9780691214696"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/ARES.2007.71","volume-title":"International Conference on Availability, Reliability and Security","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Haller, J.: Dirichlet Reputation Systems. In: International Conference on Availability, Reliability and Security, pp. 112\u2013119. IEEE Computer Society, Los Alamitos (2007)"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-642-12459-4_3","volume-title":"Formal Aspects in Security and Trust","author":"E. ElSalamouny","year":"2010","unstructured":"ElSalamouny, E., Sassone, V., Nielsen, M.: HMM-Based Trust Model. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol.\u00a05983, pp. 21\u201335. Springer, Heidelberg (2010)"},{"key":"9_CR17","unstructured":"Billingsley, P.: Probability and measure, 3rd edn. Wiley (1995)"},{"key":"9_CR18","unstructured":"Gut, A.: Probability: A Graduate Course (Springer Texts in Statistics). Springer (April 2007)"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"McEliece, R.J.: Theory of Information and Coding, 2nd edn. Cambridge University Press (2001)","DOI":"10.1017\/CBO9780511606267"},{"issue":"2","key":"9_CR20","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/S0167-2681(03)00003-9","volume":"52","author":"K.A. McCabe","year":"2003","unstructured":"McCabe, K.A., Rigdon, M.L., Smith, V.L.: Positive reciprocity and intentions in trust games. Journal of Economic Behavior & Organization\u00a052(2), 267\u2013275 (2003)","journal-title":"Journal of Economic Behavior & Organization"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/11755593_14","volume-title":"Trust Management","author":"A. J\u00f8sang","year":"2006","unstructured":"J\u00f8sang, A., Marsh, S., Pope, S.: Exploring Different Types of Trust Propagation. In: St\u00f8len, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol.\u00a03986, pp. 179\u2013192. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T02:13:10Z","timestamp":1745979190000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}