{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T10:20:04Z","timestamp":1725618004571},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380037"},{"type":"electronic","value":"9783642380044"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38004-4_9","type":"book-chapter","created":{"date-parts":[[2013,4,22]],"date-time":"2013-04-22T08:24:16Z","timestamp":1366619056000},"page":"129-144","source":"Crossref","is-referenced-by-count":1,"title":["Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures"],"prefix":"10.1007","author":[{"given":"Jean-Guillaume","family":"Dumas","sequence":"first","affiliation":[]},{"given":"Hicham","family":"Hossayni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Adkins, H.: An update on attempted man-in-the-middle attacks. Technical report, Google Online Security Blog (August 2011), \n                    \n                      http:\/\/googleonlinesecurity.blogspot.com\/2011\/08\/update-on-attempted-man-in-middle.html"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1038\/43601","volume":"401","author":"R. Albert","year":"1999","unstructured":"Albert, R., Jeong, H., Barabasi, A.-L.: Diameter of the world-wide web. Nature\u00a0401, 130\u2013131 (1999)","journal-title":"Nature"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Dolev, S., Gilboa, N., Kopeetsky, M.: Computing multi-party trust privately: in O(n) time units sending one (possibly large) message at a time. In: Proceedings of the ACM Symposium on Applied Computing, SAC 2010, pp. 1460\u20131465. ACM, New York (2010)","DOI":"10.1145\/1774088.1774401"},{"issue":"1","key":"9_CR4","first-page":"1","volume":"16","author":"C. Ellison","year":"2000","unstructured":"Ellison, C., Schneier, B.: Ten risks of PKI: What you\u2019re not being told about Public Key Infrastructure. Computer Security Journal\u00a016(1), 1\u20137 (2000), \n                    \n                      http:\/\/www.counterpane.com\/pki-risks.pdf","journal-title":"Computer Security Journal"},{"issue":"2","key":"9_CR5","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1016\/j.amc.2009.04.024","volume":"214","author":"E. Estrada","year":"2009","unstructured":"Estrada, E., Hatano, N.: Communicability graph and community structures in complex networks. Applied Mathematics and Computation\u00a0214(2), 500\u2013511 (2009)","journal-title":"Applied Mathematics and Computation"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-642-22444-7_7","volume-title":"Security and Trust Management","author":"S.N. Foley","year":"2011","unstructured":"Foley, S.N., Adams, W.M., O\u2019Sullivan, B.: Aggregating trust using triangular norms in the keyNote trust management system. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol.\u00a06710, pp. 100\u2013115. Springer, Heidelberg (2011)"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/A:1010093922183","volume":"2","author":"G. Goldberg","year":"2000","unstructured":"Goldberg, G., Okunev, P., Neumann, M., Schneider, H.: Distribution of subdominant eigenvalues of random matrices. Methodology and Computing in Applied Probability\u00a02, 137\u2013151 (2000)","journal-title":"Methodology and Computing in Applied Probability"},{"key":"9_CR8","unstructured":"Gomes, F.: Security alert: Fraudulent digital certificates. Technical report, SANS Institute InfoSec Reading Room (June 2001), \n                    \n                      http:\/\/www.sans.org\/reading_room\/whitepapers\/certificates\/security-alert-fraudulent-digital-certificates_679"},{"issue":"1","key":"9_CR9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1377603.1377607","volume":"35","author":"K. Goto","year":"2008","unstructured":"Goto, K., van de Geijn, R.A.: High-performance implementation of the level-3 BLAS. ACM Transactions on Mathematical Software 35(1), 4:1\u20134:14 (2008)","journal-title":"ACM Transactions on Mathematical Software"},{"issue":"2","key":"9_CR10","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/SURV.2011.042711.00083","volume":"14","author":"K. Govindan","year":"2012","unstructured":"Govindan, K., Mohapatra, P.: Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Communications Surveys and Tutorials\u00a014(2), 279\u2013298 (2012)","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"9_CR11","first-page":"403","volume-title":"Proceedings of the 13th International Conference on World Wide Web, WWW 2004","author":"R. Guha","year":"2004","unstructured":"Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th International Conference on World Wide Web, WWW 2004, pp. 403\u2013412. ACM, New York (2004)"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1527017.1527021","volume-title":"Proceedings of the 8th Symposium on Identity and Trust on the Internet, IDTRUST 2009","author":"J. Huang","year":"2009","unstructured":"Huang, J., Nicol, D.: A calculus of trust and its application to PKI and identity management. In: Proceedings of the 8th Symposium on Identity and Trust on the Internet, IDTRUST 2009, pp. 23\u201337. ACM, New York (2009)"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MIC.2010.83","volume":"14","author":"J. Huang","year":"2010","unstructured":"Huang, J., Nicol, D.: A formal-semantics-based calculus of trust. IEEE Internet Computing\u00a014, 38\u201346 (2010)","journal-title":"IEEE Internet Computing"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-29963-6_2","volume-title":"Security and Trust Management","author":"A. J\u00f8sang","year":"2012","unstructured":"J\u00f8sang, A.: Trust extortion on the internet. In: Meadows, C., Fernandez-Gago, C. (eds.) STM 2011. LNCS, vol.\u00a07170, pp. 6\u201321. Springer, Heidelberg (2012)"},{"key":"9_CR15","unstructured":"J\u00f8sang, A.: Probabilistic logic under uncertainty. In: Proceedings of Computing: The Australian Theory Symposium (CATS 2007) (January 2007)"},{"key":"9_CR16","unstructured":"Orman, L.V.: Transitivity and aggregation in trust networks. In: Proc. of the 21st Workshop on Information Technologies and Systems (WITS 2010) (December 2010)"},{"key":"9_CR17","first-page":"108","volume-title":"Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST 2010","author":"M. Pala","year":"2010","unstructured":"Pala, M.: A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (pks). In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST 2010, pp. 108\u2013116. ACM, New York (2010)"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-69485-4_16","volume-title":"Public Key Infrastructure","author":"M. Pala","year":"2008","unstructured":"Pala, M., Smith, S.W.: Peaches and peers. In: Mj\u00f8lsnes, S.F., Mauw, S., Katsikas, S.K. (eds.) EuroPKI 2008. LNCS, vol.\u00a05057, pp. 223\u2013238. Springer, Heidelberg (2008)"},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1109\/12.737682","volume":"47","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Stubblebine, S.G.: Resilient authentication using path independence. IEEE Trans. Comput.\u00a047, 1351\u20131362 (1998)","journal-title":"IEEE Trans. Comput."},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-540-73408-6_4","volume-title":"Public Key Infrastructure","author":"H. Rif\u00e0-Pous","year":"2007","unstructured":"Rif\u00e0-Pous, H., Herrera-Joancomart\u00ed, J.: An interdomain PKI model based on trust lists. In: L\u00f3pez, J., Samarati, P., Ferrer, J.L. (eds.) EuroPKI 2007. LNCS, vol.\u00a04582, pp. 49\u201364. Springer, Heidelberg (2007)"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-16441-5_14","volume-title":"Public Key Infrastructures, Services and Applications","author":"S. Schiffner","year":"2010","unstructured":"Schiffner, S., Clau\u00df, S., Steinbrecher, S.: Privacy and liveliness for reputation systems. In: Martinelli, F., Preneel, B. (eds.) EuroPKI 2009. LNCS, vol.\u00a06391, pp. 209\u2013224. Springer, Heidelberg (2010)"},{"issue":"3","key":"9_CR22","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.socnet.2008.12.004","volume":"31","author":"S. Schnettler","year":"2009","unstructured":"Schnettler, S.: A structured overview of 50 years of small-world research. Social Networks\u00a031(3), 165\u2013178 (2009)","journal-title":"Social Networks"},{"issue":"1\u20132","key":"9_CR23","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0167-8191(00)00087-9","volume":"27","author":"R.C. Whaley","year":"2001","unstructured":"Whaley, R.C., Petitet, A., Dongarra, J.J.: Automated empirical optimizations of software and the ATLAS project. Parallel Computing\u00a027(1\u20132), 3\u201335 (2001), \n                    \n                      http:\/\/www.netlib.org\/utk\/people\/JackDongarra\/PAPERS\/atlas_pub.pdf","journal-title":"Parallel Computing"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38004-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T13:34:56Z","timestamp":1557668096000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38004-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380037","9783642380044"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38004-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}