{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T19:06:53Z","timestamp":1648840013725},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,2,23]],"date-time":"2012-02-23T00:00:00Z","timestamp":1329955200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Informatik Spektrum"],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1007\/s00287-012-0600-0","type":"journal-article","created":{"date-parts":[[2012,2,22]],"date-time":"2012-02-22T12:36:21Z","timestamp":1329914181000},"page":"119-131","source":"Crossref","is-referenced-by-count":2,"title":["Die Guten, die B\u00f6sen und die Vertrauensw\u00fcrdigen \u2013 Vertrauen im Organic Computing"],"prefix":"10.1007","volume":"35","author":[{"given":"Jan-Philipp","family":"Stegh\u00f6fer","sequence":"first","affiliation":[]},{"given":"Wolfgang","family":"Reif","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,2,23]]},"reference":[{"key":"600_CR1","unstructured":"Anders G, Siefert F, Stegh\u00f6fer J-P, Seebach H, Nafz F, Reif W (2010) Structuring and Controlling Distributed Power Sources by Autonomous Virtual Power Plants. In: Proceedings of the IEEE Power and Energy Student Summit (PESS), 2010. 14\u201315 Oktober 2010, Magdeburg, IEEE"},{"key":"600_CR2","doi-asserted-by":"crossref","unstructured":"Anders G, Stegh\u00f6fer J-P, Siefert F, and Reif W (2011) Patterns to Measure and Utilize Trust in Multi-Agent Systems. In: Proceedings of the 2011 Fifth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop (SASOW), 3. Oktober 2011, Ann Arbor, MI, USA","DOI":"10.1109\/SASOW.2011.21"},{"key":"600_CR3","unstructured":"Anderson DP (2004) BOINC: A System for Public-Resource Computing and Storage. In: Buyya R (ed) Proceedings of 5th International Workshop on Grid Computing (GRID 2004), 8 November 2004, Pittsburgh, PA, USA, IEEE Computer Society"},{"key":"600_CR4","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/581571.581573","volume":"45","author":"DP Anderson","year":"2002","unstructured":"Anderson DP, Cobb J, Korpela E, Lebofsky M, Werthimer D (2002) SETI@home: an experiment in public-resource computing. Commun ACM 45:56\u201361","journal-title":"Commun ACM"},{"key":"600_CR5","unstructured":"Apple Inc. Cocoa Autolayout Release Notes. Available online: http:\/\/developer.apple.com\/library\/mac\/#releasenotes\/UserExperience\/RNAutomaticLayout\/_index.html#\/apple_ref\/doc\/uid\/TP40010631, letzter Zugriff 9.2.2012"},{"key":"600_CR6","doi-asserted-by":"crossref","unstructured":"Bernard Y, Klejnowski L, Cakar E, H\u00e4hner J, M\u00fcller-Schloer C (2011) Efficiency and robustness using Trusted Communities in a Trusted Desktop Grid. In: Proceedings of the 2011 Fifth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop (SASOW), 3. Oktober 2011, Ann Arbor, MI, USA","DOI":"10.1109\/SASOW.2011.28"},{"key":"600_CR7","doi-asserted-by":"crossref","unstructured":"Bernard Y, Klejnowski L, H\u00e4hner J, M\u00fcller-Schloer C (2010) Towards Trust in Desktop Grid Systems. IEEE International Symposium on Cluster Computing and the Grid, pp 637\u2013642, 17.\u201319. Mai 2010, Melbourne","DOI":"10.1109\/CCGRID.2010.73"},{"key":"600_CR8","first-page":"99","volume-title":"Trusting Agents for Trusting Electronic Societies, volume 3577 of Lecture Notes in Computer Science","author":"G Boella","year":"2005","unstructured":"Boella G, van der Torre L (2005) Normative Multiagent Systems and Trust Dynamics. In: Falcone R, Barber S, Sabater-Mir J, Singh M (eds) Trusting Agents for Trusting Electronic Societies, volume 3577 of Lecture Notes in Computer Science. Springer, Berlin, Heidelberg, pp 99\u201399"},{"key":"600_CR9","doi-asserted-by":"crossref","unstructured":"Borning A, Marriott K, Stuckey PJ, Xiao Y (1997) Solving Linear Arithmetic Constraints for User Interface Applications. In: ACM Symposium on User Interface Software and Technology, pp 87\u201396, 14.\u201317. Oktober 1997, Banff","DOI":"10.1145\/263407.263518"},{"key":"600_CR10","unstructured":"Bundesministerium f\u00fcr Umwelt, Naturschutz und Reaktorsicherheit (BMU) (2011) Erneuerbare Energien in Zahlen \u2013 Nationale und internationale Entwicklung"},{"issue":"5682","key":"600_CR11","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1126\/science.1096340","volume":"305","author":"JC Jones","year":"2004","unstructured":"Jones JC, Myerscough MR, Graham S, Oldroyd BP (2004) Honey bee nest thermoregulation: diversity promotes stability. Science 305(5682):402\u2013404","journal-title":"Science"},{"key":"600_CR12","doi-asserted-by":"crossref","unstructured":"Kiefhaber R, Hammer S, Savs B, Schmitt J, Roth M, Kluge F, Andr\u00e9 E, Ungerer T (2011) The Neighbor-Trust Metric to Measure Reputation in Organic Computing Systems. In: Proceedings of the 2011 Fifth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop (SASOW), 3. Oktober 2011, Ann Arbor, MI, USA","DOI":"10.1109\/SASOW.2011.20"},{"key":"600_CR13","doi-asserted-by":"crossref","unstructured":"Kiefhaber R, Satzger B, Schmitt J, Roth M, Ungerer T (2010) Trust Measurement Methods in Organic Computing Systems by Direct Observation. In: Proceedings of the 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010). IEEE, pp 105\u2013111, 11.\u201313. Dezember 2010, Hong Kong","DOI":"10.1109\/EUC.2010.25"},{"key":"600_CR14","unstructured":"Kiefhaber R, Siefert F, Anders G, Ungerer T, Reif W (2011) The Trust-Enabling Middleware: Introduction and Application. Technical Report 2011-10, Universit\u00e4tsbibliothek der Universit\u00e4t Augsburg, Augsburg"},{"key":"600_CR15","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/978-3-642-22362-4_47","volume-title":"User Modeling, Adaption and Personalization, volume 6787 of Lecture Notes in Computer Science","author":"E Kurdyukova","year":"2011","unstructured":"Kurdyukova E (2011) Designing trustworthy adaptation on public displays. In: Konstan J, Conejo R, Marzo J, Oliver N (eds) User Modeling, Adaption and Personalization, volume 6787 of Lecture Notes in Computer Science. Springer, Berlin, pp 442\u2013445"},{"key":"600_CR16","doi-asserted-by":"crossref","unstructured":"Leichtenstern K, Bee N, Andr\u00e9 E, Berkm\u00fcller U, Wagner J (2011) Physiological measurement of trust-related behavior in trust-neutral and trust-critical situations. In: Wakeman I, Gudes E, Jensen CD, Crampton J (eds) Trust Management V, 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, 29 June\u20131 July 2011, Proceedings, volume 358 of IFIP Publications. Springer, pp 165\u2013172","DOI":"10.1007\/978-3-642-22200-9_14"},{"key":"600_CR17","unstructured":"Marsh S (1994) Formalising trust as a computational concept. PhD thesis, University of Stirling, Department of Computing Science and Mathematics, Stirling"},{"key":"600_CR18","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/978-3-0348-0130-0_5","volume-title":"Organic Computing \u2013 A Paradigm Shift for Complex Systems, volume 1 of Autonomic Systems","author":"F Nafz","year":"2011","unstructured":"Nafz F, Seebach H, Stegh\u00f6fer J-P, Anders G, Reif W (2011) Constraining Self-organisation Through Corridors of Correct Behaviour: The Restore Invariant Approach. In: M\u00fcller-Schloer C, Schmeck H, Ungerer T (eds) Organic Computing \u2013 A Paradigm Shift for Complex Systems, volume 1 of Autonomic Systems. Springer, Basel, pp 79\u201393"},{"issue":"2","key":"600_CR19","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1109\/TPWRS.2009.2016607","volume":"24","author":"N Ruiz","year":"2009","unstructured":"Ruiz N, Cobelo I, Oyarzabal J (2009) A Direct Load Control Model for Virtual Power Plant Management. IEEE T Power Syst 24(2):959\u2013966","journal-title":"IEEE T Power Syst"},{"issue":"4","key":"600_CR20","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s00550-009-0157-9","volume":"17","author":"M Sch\u00f6nfelder","year":"2009","unstructured":"Sch\u00f6nfelder M, Pathmaperuma D, Reiner U, Fichtner W, Schmeck H, Leibfried T (2009) Elektromobilit\u00e4t. uwf \u2013 UmweltWirtschaftsForum 17(4):373\u2013380","journal-title":"uwf \u2013 UmweltWirtschaftsForum"},{"key":"600_CR21","doi-asserted-by":"crossref","unstructured":"Stegh\u00f6fer J-P, Kiefhaber R, Leichtenstern K, Bernard Y, Klejnowski L, Reif W, Ungerer T, Andr\u00e9 E, H\u00e4hner J, M\u00fcller-Schloer C (2010) Trustworthy Organic Computing Systems: Challenges and Perspectives. In: Proceedings of the 7th International Conference on Autonomic and Trusted Computing (ATC 2010). Springer, 26.\u201329. Oktober 2010, Xi\u2019an","DOI":"10.1007\/978-3-642-16576-4_5"},{"key":"600_CR22","unstructured":"Wander M, Wacker W, Weis T (2010) Towards Peer-to-Peer-based Cryptanalysis. In: 6th IEEE LCN Workshop on Security in Communication Networks, SICK 2010, organized at the 35th IEEE Conference on Local Computer Networks, LCN 2010, 10.\u201314. Oktober 2010, Denver, Colorado. IEEE Computer Society"}],"container-title":["Informatik-Spektrum"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-012-0600-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00287-012-0600-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00287-012-0600-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T10:22:04Z","timestamp":1640859724000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00287-012-0600-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2,23]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,4]]}},"alternative-id":["600"],"URL":"https:\/\/doi.org\/10.1007\/s00287-012-0600-0","relation":{},"ISSN":["0170-6012","1432-122X"],"issn-type":[{"value":"0170-6012","type":"print"},{"value":"1432-122X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,2,23]]}}}