{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:12:29Z","timestamp":1726002749053},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811330438"},{"type":"electronic","value":"9789811330445"}],"license":[{"start":{"date-parts":[[2018,12,11]],"date-time":"2018-12-11T00:00:00Z","timestamp":1544486400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-3044-5_4","type":"book-chapter","created":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T20:59:44Z","timestamp":1544475584000},"page":"50-65","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mobile Agent-Based Mobile Intelligent Business Security Transaction Model"],"prefix":"10.1007","author":[{"given":"Wei-Jin","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Jia-Hui","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yu-Hui","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,11]]},"reference":[{"key":"4_CR1","unstructured":"China Internet Network Information Center: The 41st Statistical Report on the Development of China\u2019s Internet. \nhttp:\/\/www.cac.gov.cn\/2018-01\/31\/c_1122347026.htm\n\n. \nhttp:\/\/www.cac.gov.cn\/2018-01\/31\/c_1122346138.htm\n\n (2018)"},{"issue":"3","key":"4_CR2","first-page":"128","volume":"191","author":"KY Ae","year":"2012","unstructured":"Ae, K.Y., Rasik, P.: A trust prediction framework in rating-based on experience sharing social networks without a Web of Trust. Inf. Sci. 191(3), 128\u2013145 (2012)","journal-title":"Inf. Sci."},{"issue":"3","key":"4_CR3","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1016\/j.dss.2010.08.012","volume":"50","author":"H Nan","year":"2011","unstructured":"Nan, H., Ling, L., Sambamurthy, V.: Fraud detection in online consumer reviews. Decis. Support Syst. 50(3), 614\u2013626 (2011)","journal-title":"Decis. Support Syst."},{"key":"4_CR4","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/978-1-4419-7355-9_28","volume":"5","author":"ZQ Zhang","year":"2011","unstructured":"Zhang, Z.Q., Xie, X.Q., et al.: CRank: a credit assessment model in C2C e-Commerce. Inf. Syst. Dev. 5, 333\u2013343 (2011)","journal-title":"Inf. Syst. Dev."},{"issue":"4","key":"4_CR5","first-page":"563","volume":"28","author":"Y Yun","year":"2010","unstructured":"Yun, Y.: C2C transactions in the dynamic credit evaluation model. Inf. Sci. 28(4), 563\u2013566 (2010)","journal-title":"Inf. Sci."},{"issue":"9","key":"4_CR6","first-page":"398","volume":"2","author":"N Yaghoubi","year":"2011","unstructured":"Yaghoubi, N.: Trust models in e-Business: analytical-compare approach. Interdiscip. J. Contemp. Res. Bus. 2(9), 398\u2013416 (2011)","journal-title":"Interdiscip. J. Contemp. Res. Bus."},{"issue":"5","key":"4_CR7","first-page":"194","volume":"27","author":"X Zhang","year":"2010","unstructured":"Zhang, X.: A strengthening of security solutions C2C transaction integrity. Microelectron. Comput. 27(5), 194\u2013198 (2010)","journal-title":"Microelectron. Comput."},{"key":"4_CR8","unstructured":"Marsh, S.: Formalising trust as a computational concept. Ph.D. thesis, University of Stirling (1994)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the Symposium on Security and Privacy, Oakland, pp. 164\u2013173 (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Keromytis, A.D.: Keynote: trust management for public-key infrastructures. In: Proceedings of the 1998 Security Protocols International Workshop, Cambridge, England, pp. 59\u201363 (1998)","DOI":"10.1007\/3-540-49135-X_9"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Griffiths, N.: Task delegation using experience based multi-dimensional trust. In: Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems, Netherlands, pp. 489\u2013496. ACM Press, London (2005)","DOI":"10.1145\/1082473.1082548"},{"issue":"1","key":"4_CR12","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1360\/jos170096","volume":"17","author":"Q Zhang","year":"2006","unstructured":"Zhang, Q., Zhang, X., Wen, X.Z., Liu, J.R., Ting, S.: Construction of peer-to-peer multiple-grain trust model. J. Softw. 17(1), 96\u2013107 (2006)","journal-title":"J. Softw."},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-540-74769-7_38","volume-title":"Bio-Inspired Computational Intelligence and Applications","author":"X Wang","year":"2007","unstructured":"Wang, X., Liang, P., Ma, H., Xing, D., Wang, B.: A P2P trust model based on multi-dimensional trust evaluation. In: Li, K., Fei, M., Irwin, G.W., Ma, S. (eds.) LSMS 2007. LNCS, vol. 4688, pp. 347\u2013356. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-74769-7_38"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1007\/11590354_103","volume-title":"Grid and Cooperative Computing - GCC 2005","author":"L Guo","year":"2005","unstructured":"Guo, L., Yang, S., Wang, J., Zhou, J.: Trust model based on similarity measure of vectors in P2P networks. In: Zhuge, H., Fox, Geoffrey C. (eds.) GCC 2005. LNCS, vol. 3795, pp. 836\u2013847. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/11590354_103"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Reece, S., Rogers, A., Roberts, S., Jennings, N.R.: Rumours and reputation: evaluating multi-dimensional trust within a decentralized reputation system. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 1\u20138. ACM Press, Honolulu (2007)","DOI":"10.1145\/1329125.1329326"},{"key":"4_CR16","unstructured":"Reece, S., Roberts, S., Rogers, A., Jennings, N.R.: A multi-dimensional trust model for heterogeneous contract observations. In: Proceedings of the 22th AAAI Conference on Artificial Intelligence, pp. 128\u2013135. AAAI Press, London (2007)"},{"issue":"6","key":"4_CR17","doi-asserted-by":"crossref","first-page":"1341","DOI":"10.3724\/SP.J.1001.2010.03501","volume":"21","author":"S Wang","year":"2010","unstructured":"Wang, S., Zhang, L., Li, H.-S.: Evaluation approach of subjective trust based on cloud model. J. Softw. 21(6), 1341\u20131352 (2010)","journal-title":"J. Softw."},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Shao, K., Luo, F., Mei, N.X., Liu, Z.T.: Normal distribution based dynamical recommendation trust model. J. Softw. 23(12), 3130\u20133148 (2012). \nhttp:\/\/www.jos.org.cn\/1000-9825\/4204.htm\n\n. (in Chinese)","DOI":"10.3724\/SP.J.1001.2012.04204"},{"issue":"1","key":"4_CR19","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/s00500-014-1516-1","volume":"20","author":"M Ashtiani","year":"2016","unstructured":"Ashtiani, M., Azgomi, M.A.: Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR. Soft Comput. 20(1), 399\u2013421 (2016)","journal-title":"Soft Comput."},{"issue":"2","key":"4_CR20","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.compeleceng.2014.03.016","volume":"42","author":"T Wu","year":"2015","unstructured":"Wu, T., Xiao, J., Qin, K., et al.: Cloud model-based method for range constrained thresholding. Comput. Electr. Eng. 42(2), 33\u201348 (2015)","journal-title":"Comput. Electr. Eng."},{"issue":"9\/10","key":"4_CR21","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1016\/j.jbusres.2009.02.025","volume":"63","author":"P McCole","year":"2010","unstructured":"McCole, P., Ramsey, E., Williams, J.: Trust considerations on attitudes towards online purchasing: the moderating effect of privacy and security concerns. J. Bus. Res. 63(9\/10), 1018\u20131024 (2010)","journal-title":"J. Bus. Res."},{"issue":"1","key":"4_CR22","first-page":"99","volume":"38","author":"X Jun","year":"2017","unstructured":"Jun, X.: Survey of trust model based on uncertainty theory. J. Chin. Comput. Syst. 38(1), 99\u2013106 (2017)","journal-title":"J. Chin. Comput. Syst."},{"issue":"9","key":"4_CR23","first-page":"1084","volume":"44","author":"W Jiang","year":"2014","unstructured":"Jiang, W., Xu, Y., Guo, H., Zhang, L.: Multi agent system-based dynamic trust calculation model and credit management mechanism of online trading. Sci. China Inf. Sci. 44(9), 1084\u20131101 (2014)","journal-title":"Sci. China Inf. Sci."}],"container-title":["Communications in Computer and Information Science","Computer Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-3044-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T21:01:38Z","timestamp":1544475698000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-3044-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,11]]},"ISBN":["9789811330438","9789811330445"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-3044-5_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018,12,11]]},"assertion":[{"value":"ChineseCSCW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"CCF Conference on Computer Supported Cooperative Work  and Social Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guilin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"chinesecscw2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.scholat.com\/confweb\/ChineseCSCW\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}