{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T05:06:53Z","timestamp":1745989613406},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380037"},{"type":"electronic","value":"9783642380044"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38004-4_8","type":"book-chapter","created":{"date-parts":[[2013,4,22]],"date-time":"2013-04-22T04:24:16Z","timestamp":1366604656000},"page":"113-128","source":"Crossref","is-referenced-by-count":5,"title":["Building Trust and Reputation In: A Development Framework for Trust Models Implementation"],"prefix":"10.1007","author":[{"given":"Francisco","family":"Moyano","sequence":"first","affiliation":[]},{"given":"Carmen","family":"Fernandez-Gago","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-540-85735-8_4","volume-title":"Trust, Privacy and Security in Digital Business","author":"I. Agudo","year":"2008","unstructured":"Agudo, I., Fernandez-Gago, C., Lopez, J.: A model for trust metrics analysis. In: Furnell, S.M., Katsikas, S.K., Lioy, A. (eds.) TrustBus 2008. LNCS, vol.\u00a05185, pp. 28\u201337. Springer, Heidelberg (2008)"},{"key":"8_CR2","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE Symposium on Security and Privacy, pp. 164\u2013173 (1996)"},{"issue":"3","key":"8_CR3","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MPRV.2003.1228527","volume":"2","author":"V. Cahill","year":"2003","unstructured":"Cahill, V., Gray, E., Seigneur, J.-M., Jensen, C.D., Chen, Y., Shand, B., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon, P., di Marzo Serugendo, G., Bryce, C., Carbone, M., Krukow, K., Nielsen, M.: Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing\u00a02(3), 52\u201361 (2003)","journal-title":"IEEE Pervasive Computing"},{"key":"8_CR4","unstructured":"Gambetta, D.: Can we trust trust? In: Trust: Making and Breaking Cooperative Relations, pp. 213\u2013237. Basil Blackwell (1988)"},{"key":"8_CR5","unstructured":"Har Yew, C.: Architecture Supporting Computational Trust Formation. PhD thesis, University of Western Ontario, London, Ontario (2011)"},{"key":"8_CR6","unstructured":"Huynh, T.D.: A Personalized Framework for Trust Assessment. In: ACM Symposioum on Applied Computing - Trust, Reputation, Evidence and other Collaboration Know-how Track, vol.\u00a02, pp. 1302\u20131307 (December 2008)"},{"issue":"3","key":"8_CR7","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A. J\u00f8sang","year":"2001","unstructured":"J\u00f8sang, A.: A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a09(3), 279\u2013311 (2001)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"issue":"2","key":"8_CR8","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"key":"8_CR9","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-02056-8_12","volume-title":"Trust Management III","author":"A.J. Lee","year":"2009","unstructured":"Lee, A.J., Winslett, M., Perano, K.J.: TrustBuilder2: A reconfigurable framework for trust negotiation. In: Ferrari, E., Li, N., Bertino, E., Karabulut, Y. (eds.) IFIPTM 2009. IFIP AICT, vol.\u00a0300, pp. 176\u2013195. Springer, Heidelberg (2009)"},{"key":"8_CR10","unstructured":"Marsh, S.: Formalising Trust as a Computational Concept. PhD thesis, University of Stirling (April 1994)"},{"key":"8_CR11","unstructured":"Harrison McKnight, D., Chervany, N.L.: The meanings of trust. Technical report, University of Minnesota, Management Information Systems Research Center (1996)"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MC.2010.289","volume":"43","author":"K.W. Miller","year":"2010","unstructured":"Miller, K.W., Voas, J., Laplante, P.: In Trust We Trust. Computer\u00a043, 85\u201387 (2010)","journal-title":"Computer"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-32287-7_8","volume-title":"Trust, Privacy and Security in Digital Business","author":"F. Moyano","year":"2012","unstructured":"Moyano, F., Fernandez-Gago, C., Lopez, J.: A conceptual framework for trust models. In: Fischer-H\u00fcbner, S., Katsikas, S., Quirchmayr, G. (eds.) TrustBus 2012. LNCS, vol.\u00a07449, pp. 93\u2013104. Springer, Heidelberg (2012)"},{"key":"8_CR14","unstructured":"Olmedilla, D., Rana, O.F., Matthews, B., Nejdl, W.: Security and trust issues in semantic grids. In: Proceedings of the Dagsthul Seminar, Semantic Grid: The Convergence of Technologies, vol.\u00a05271 (2005)"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Resnick, P., Zeckhauser, R.: Trust among strangers in Internet transactions: Empirical analysis of eBay\u2019s reputation system. In: Baye, M.R. (ed.) The Economics of the Internet and E-Commerce. Advances in Applied Microeconomics, vol.\u00a011, pp. 127\u2013157. Elsevier Science (2002)","DOI":"10.1016\/S0278-0984(02)11030-3"},{"key":"8_CR16","unstructured":"Siefert, F., Anders, G., Ungerer, T., Reif, W., Kiefhaber, R.: The Trust-Enabling Middleware: Introduction and Application. Technical report, Institut fur Informatik Universitat Augsburg (March 2011)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/11429760_6","volume-title":"Trust Management","author":"S. Ruohomaa","year":"2005","unstructured":"Ruohomaa, S., Kutvonen, L.: Trust management survey. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 77\u201392. Springer, Heidelberg (2005)"},{"key":"8_CR18","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1145\/1134285.1134295","volume-title":"Proceeding of the 28th International Conference on Software Engineering","author":"G. Suryanarayana","year":"2006","unstructured":"Suryanarayana, G., Diallo, M.H., Erenkrantz, J.R., Taylor, R.N.: Architectural Support for Trust Models in Decentralized Applications. In: Proceeding of the 28th International Conference on Software Engineering, pp. 52\u201361. ACM Press, New York (2006)"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38004-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,14]],"date-time":"2022-02-14T09:47:50Z","timestamp":1644832070000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38004-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380037","9783642380044"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38004-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}