{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:00:29Z","timestamp":1761807629085,"version":"3.38.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2011,6,23]],"date-time":"2011-06-23T00:00:00Z","timestamp":1308787200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1007\/s00779-011-0420-2","type":"journal-article","created":{"date-parts":[[2011,6,22]],"date-time":"2011-06-22T02:47:38Z","timestamp":1308710858000},"page":"485-506","source":"Crossref","is-referenced-by-count":45,"title":["TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications"],"prefix":"10.1007","volume":"16","author":[{"given":"Zheng","family":"Yan","sequence":"first","affiliation":[]},{"given":"Peng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Robert H.","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,23]]},"reference":[{"key":"420_CR1","unstructured":"Yan Z (2007) Trust management for mobile computing platforms. Dissertation, Helsinki University of Technology"},{"issue":"1","key":"420_CR2","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A, Laprie JC, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secur Comput 1(1):11\u201333","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"420_CR3","unstructured":"Yan Z, Dong Y, Niemi V, Yu G (2009) Exploring trust of mobile applications based on user behaviors. InTrust 2009, LNCS, pp 212\u2013226"},{"issue":"3","key":"420_CR4","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1287\/isre.13.3.334.81","volume":"13","author":"DH McKnight","year":"2002","unstructured":"McKnight DH, Choudhury V, Kacmar C (2002) Developing and validating trust measures for e-commerce: an integrative typology. Inf Syst Res 13(3):334\u2013359","journal-title":"Inf Syst Res"},{"key":"420_CR5","unstructured":"Marsh S (1994) Formalising trust as a computational concept. Dissertation, University of Stirling"},{"key":"420_CR6","doi-asserted-by":"crossref","first-page":"290","DOI":"10.4018\/978-1-59904-804-8.ch013","volume-title":"Computer security, privacy and politics: current issues, challenges and solutions","author":"Z Yan","year":"2008","unstructured":"Yan Z, Holtmanns S (2008) Trust modeling and management: from social trust to digital trust. In: Subramanian R (ed) Computer security, privacy and politics: current issues, challenges and solutions. Idea Group Inc, USA, pp 290\u2013323"},{"key":"420_CR7","doi-asserted-by":"crossref","unstructured":"Yan Z, Prehofer C (2010) Autonomic trust management for a component based software system. IEEE Trans Dependable Secur Comput.doi: 10.1109\/TDSC.2010.47","DOI":"10.1109\/TDSC.2010.47"},{"issue":"7","key":"420_CR8","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L Xiong","year":"2004","unstructured":"Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Tran Knowl Data Eng 16(7):843\u2013857","journal-title":"IEEE Tran Knowl Data Eng"},{"issue":"6","key":"420_CR9","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MIC.2005.136","volume":"9","author":"S Song","year":"2005","unstructured":"Song S, Hwang K, Zhou R, Kwok YK (2005) Trusted P2P transactions with fuzzy reputation aggregation. IEEE Intern Comput 9(6):24\u201334","journal-title":"IEEE Intern Comput"},{"issue":"2","key":"420_CR10","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1109\/JSAC.2005.861390","volume":"24","author":"G Theodorakopoulos","year":"2006","unstructured":"Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE J Sel Areas Commun 24(2):318\u2013328","journal-title":"IEEE J Sel Areas Commun"},{"issue":"2","key":"420_CR11","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","volume":"24","author":"Y Sun","year":"2006","unstructured":"Sun Y, Yu W, Han Z, Liu KJR (2006) Information theoretic tramework of trust modeling and evaluation for ad hoc networks. IEEE J Sel Area Commun 24(2):305\u2013317","journal-title":"IEEE J Sel Area Commun"},{"key":"420_CR12","doi-asserted-by":"crossref","unstructured":"Li X, Valacich JS, Hess TJ (2004) Predicting user trust in information systems: a comparison of competing trust models. In: Proceedings of 37th annual Hawaii international conference on system sciences, 10 pp","DOI":"10.1109\/HICSS.2004.1265619"},{"issue":"3","key":"420_CR13","doi-asserted-by":"crossref","first-page":"405","DOI":"10.5465\/amr.1998.926618","volume":"23","author":"GA Bigley","year":"1998","unstructured":"Bigley GA, Pearce JL (1998) Straining for shared meaning in organization science: problems of trust and distrust. Acad Manag Rev 23(3):405\u2013421","journal-title":"Acad Manag Rev"},{"key":"420_CR14","volume-title":"Beliefs, attitude, intention and behavior: an introduction to theory and research","author":"M Fishbein","year":"1975","unstructured":"Fishbein M, Ajzen I (1975) Beliefs, attitude, intention and behavior: an introduction to theory and research. Addison-Wesley, Reading"},{"issue":"1","key":"420_CR15","doi-asserted-by":"crossref","first-page":"42","DOI":"10.2307\/1252172","volume":"54","author":"JC Anderson","year":"1990","unstructured":"Anderson JC, Narus JA (1990) A model of distributor firm and manufacturer firm working partnerships. Marketing 54(1):42\u201358","journal-title":"Marketing"},{"key":"420_CR16","volume-title":"Beyond contract: work, power, and trust relations","author":"A Fox","year":"1974","unstructured":"Fox A (1974) Beyond contract: work, power, and trust relations. Faber, London"},{"key":"420_CR17","volume-title":"The resolution of conflict: constructive and destructive processes","author":"M Deutsch","year":"1973","unstructured":"Deutsch M (1973) The resolution of conflict: constructive and destructive processes. Yale University Press, New Haven"},{"issue":"3","key":"420_CR18","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1086\/209170","volume":"15","author":"BH Sheppard","year":"1988","unstructured":"Sheppard BH, Hartwick J, Warshaw PR (1988) The theory of reasoned action: a meta analysis of past research with recommendations for modifications in future research. Consumer Res 15(3):325\u2013343","journal-title":"Consumer Res"},{"issue":"2","key":"420_CR19","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh V, Davis FD (2000) A theoretical extension of the technology acceptance model: four longitudinal field studies. Manag Sci 46(2):186\u2013204","journal-title":"Manag Sci"},{"issue":"6","key":"420_CR20","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1016\/S1071-5819(03)00043-0","volume":"58","author":"S Grabner-Kr\u00e4uter","year":"2003","unstructured":"Grabner-Kr\u00e4uter S, Kaluscha EA (2003) Empirical research in on-line trust: a review and critical assessment. Int J Hum Comput Stud 58(6):783\u2013812","journal-title":"Int J Hum Comput Stud"},{"issue":"11","key":"420_CR21","doi-asserted-by":"crossref","first-page":"1905","DOI":"10.1080\/00140139408964957","volume":"37","author":"BM Muir","year":"1994","unstructured":"Muir BM (1994) Trust in automation part I: theoretical issues in the study of trust and human intervention in automated systems. Ergonomics 37(11):1905\u20131922","journal-title":"Ergonomics"},{"issue":"3","key":"420_CR22","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1080\/00140139608964474","volume":"39","author":"BM Muir","year":"1996","unstructured":"Muir BM (1996) Trust in automation part II: experimental studies of trust and human intervention in a process control simulation. Ergonomics 39(3):429\u2013469","journal-title":"Ergonomics"},{"issue":"10","key":"420_CR23","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1080\/00140139208967392","volume":"35","author":"J Lee","year":"1992","unstructured":"Lee J, Moray N (1992) Trust, control strategies and allocation of function in human-machine systems. Ergonomics 35(10):1243\u20131270","journal-title":"Ergonomics"},{"issue":"4","key":"420_CR24","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","volume":"3","author":"T Grandison","year":"2000","unstructured":"Grandison T, Sloman M (2000) A survey of trust in internet applications. IEEE Commun Surv 3(4):2\u201316","journal-title":"IEEE Commun Surv"},{"key":"420_CR25","doi-asserted-by":"crossref","unstructured":"Yan Z (2010) Trust modeling and management in digital environments: from social concept to system development. In: IGI Global, pp 20\u201357","DOI":"10.4018\/978-1-61520-682-7"},{"key":"420_CR26","doi-asserted-by":"crossref","unstructured":"Yan Z, Niemi V (2009) A methodology towards usable trust management. In: ATC09, LNCS, vol 5586, pp 179\u2013193","DOI":"10.1007\/978-3-642-02704-8_14"},{"key":"420_CR27","doi-asserted-by":"crossref","unstructured":"Yan Z, Chen Y (2010) AdContRep: a privacy enhanced reputation system for MANET content services. UIC 2010, LNCS, vol 6406, pp 414\u2013429","DOI":"10.1007\/978-3-642-16355-5_33"},{"key":"420_CR28","doi-asserted-by":"crossref","unstructured":"Aberer K, Despotovic Z (2001) Managing trust in a peer-to-peer information system. In: Proceedings of the ACM conference on information and knowledge management (CIKM), pp 310\u2013317","DOI":"10.1145\/502585.502638"},{"issue":"3","key":"420_CR29","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/245108.245121","volume":"40","author":"P Resnick","year":"1997","unstructured":"Resnick P, Varian HR (1997) Recommender systems. Commun ACM 40(3):56\u201358","journal-title":"Commun ACM"},{"key":"420_CR30","doi-asserted-by":"crossref","unstructured":"Hancock JT, Toma C, Ellison N (2007) The truth about lying in online dating profiles. In: Proceedings of the ACM conference on human factors in computing systems (CHI 2007), ACM, pp 449\u2013452","DOI":"10.1145\/1240624.1240697"},{"key":"420_CR31","doi-asserted-by":"crossref","unstructured":"Su X, Khoshgoftaar TM (2009) A survey of collaborative filtering techniques. Adv Artif Intell. doi: 10.1155\/2009\/421425","DOI":"10.1155\/2009\/421425"},{"key":"420_CR32","doi-asserted-by":"crossref","unstructured":"O\u2019Donovan J, Smyth B (2005) Trust in recommender systems, IUI\u201905, pp 167\u2013174","DOI":"10.1145\/1040830.1040870"},{"issue":"2","key":"420_CR33","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618\u2013644","journal-title":"Decis Support Syst"},{"key":"420_CR34","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/S0278-0984(02)11030-3","volume-title":"Advances in applied microeconomics: the economics of the internet and e-commerce","author":"P Resnick","year":"2002","unstructured":"Resnick P, Zeckhauser R (2002) Trust among strangers in Internet transactions: empirical analysis of eBay\u2019s reputation system. In: Baye M (ed) Advances in applied microeconomics: the economics of the internet and e-commerce, vol 11. Elsevier, Amsterdam, pp 127\u2013157"},{"issue":"12","key":"420_CR35","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P Resnick","year":"2000","unstructured":"Resnick P, Kuwabara K, Zeckhauser R, Friedman E (2000) Reputation systems. Commun ACM 43(12):45\u201348","journal-title":"Commun ACM"},{"issue":"6","key":"420_CR36","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1016\/S1071-5819(03)00041-7","volume":"58","author":"CL Corritore","year":"2003","unstructured":"Corritore CL, Kracher B, Wiedenbeck S (2003) On-line trust: concepts, evolving themes, a model. Int J Hum Comput Stud Trust Technol 58(6):737\u2013758","journal-title":"Int J Hum Comput Stud Trust Technol"},{"key":"420_CR37","doi-asserted-by":"crossref","unstructured":"Yang Y, Sun Y, Kay S, Yang Q (2009) Defending online reputation systems against collaborative unfair raters through signal modeling and trust. In: SAC\u201909, pp 1308\u20131315","DOI":"10.1145\/1529282.1529575"},{"key":"420_CR38","doi-asserted-by":"crossref","unstructured":"Douceur JR (2002) The sybil attack. In: IPTPS\u201902, LNCS, vol 2429, pp 251\u2013260","DOI":"10.1007\/3-540-45748-8_24"},{"issue":"2","key":"420_CR39","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/MCOM.2008.4473092","volume":"46","author":"Y Sun","year":"2008","unstructured":"Sun Y, Han Z, Liu KJR (2008) Defense of trust management vulnerabilities in distributed networks. IEEE Commun Mag 46(2):112\u2013119","journal-title":"IEEE Commun Mag"},{"key":"420_CR40","doi-asserted-by":"crossref","unstructured":"Sun Y, Han Z, Yu W, Liu KJR (2006) A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. In: IEEE INFOCOM, pp 1\u201313","DOI":"10.1109\/INFOCOM.2006.154"},{"key":"420_CR41","doi-asserted-by":"crossref","unstructured":"Fogg BJ, Tseng H (1999) The elements of computer credibility. In: Proceedings of the CHI\u201999, ACM Press, New York, pp 80\u201387","DOI":"10.1145\/302979.303001"},{"key":"420_CR42","volume-title":"Introduction to classical and modern test theory","author":"L Crocker","year":"1986","unstructured":"Crocker L, Algina J (1986) Introduction to classical and modern test theory. Thomson Leaning, Belmont"},{"key":"420_CR43","unstructured":"TCG TPM Specification v1.2, http:\/\/www.trustedcomputinggroup.org\/resources\/tpm_main_specification . Accessed 8 Sep 2010"},{"key":"420_CR44","doi-asserted-by":"crossref","unstructured":"Yan Z, Liu C, Niemi V, Yu G (2010) Effects of displaying trust information on mobile application usage. In: ATC\u201910, LNCS, vol 6407, pp 107\u2013121","DOI":"10.1007\/978-3-642-16576-4_8"},{"key":"420_CR45","unstructured":"Yan Z, Liu C, Niemi V, Yu G (2010) Trust information indication: effects of displaying trust information on mobile application usage. Technical Report NRC-TR-2009-004, Nokia Research Center. http:\/\/www.research.nokia.com\/files\/NRCTR2009004.pdf . Accessed 8 Sep 2010"},{"key":"420_CR46","first-page":"194","volume":"5586","author":"Z Yan","year":"2009","unstructured":"Yan Z, Yan R (2009) Formalizing trust based on usage behaviours for mobile applications. ATC09, LNCS 5586:194\u2013208","journal-title":"ATC09, LNCS"},{"issue":"1","key":"420_CR47","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSP.2011.15","volume":"9","author":"J Schiffman","year":"2011","unstructured":"Schiffman J, Moyer T, Jaeger T, McDaniel P (2011) Network-based root of trust for installation. IEEE Secur Priv 9(1):40\u201348","journal-title":"IEEE Secur Priv"},{"key":"420_CR48","unstructured":"Wu J, Fang M, Yu P, Zhang X (2009) A secure software download framework based on mobile trusted computing. WCSE '09, pp 171\u2013176"},{"issue":"3","key":"420_CR49","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MVT.2009.933475","volume":"4","author":"A Ahtiainen","year":"2009","unstructured":"Ahtiainen A, Kalliojarvi K, Kasslin M, Leppanen K, Richter A, Ruuska P, Wijting C (2009) Awareness networking in wireless environments: means of exchanging information. IEEE Veh Technol Mag 4(3):48\u201354","journal-title":"IEEE Veh Technol Mag"},{"key":"420_CR50","unstructured":"Nokia SmartPhone 360 panel survey results: http:\/\/www.nwiki.nokia.com\/Smartphone360\/WebHome . Accessed 31 Jan 2009"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0420-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-011-0420-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0420-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T12:56:29Z","timestamp":1741265789000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-011-0420-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,23]]},"references-count":50,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["420"],"URL":"https:\/\/doi.org\/10.1007\/s00779-011-0420-2","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"type":"print","value":"1617-4909"},{"type":"electronic","value":"1617-4917"}],"subject":[],"published":{"date-parts":[[2011,6,23]]}}}