{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:03:37Z","timestamp":1760061817244},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2009,1,13]],"date-time":"2009-01-13T00:00:00Z","timestamp":1231804800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1007\/s10207-008-0069-7","type":"journal-article","created":{"date-parts":[[2009,1,12]],"date-time":"2009-01-12T01:06:27Z","timestamp":1231722387000},"page":"103-119","source":"Crossref","is-referenced-by-count":9,"title":["An analysis of accuracy experiments carried out over of a multi-faceted model of trust"],"prefix":"10.1007","volume":"8","author":[{"given":"Karl","family":"Quinn","sequence":"first","affiliation":[]},{"given":"David","family":"Lewis","sequence":"additional","affiliation":[]},{"given":"Declan","family":"O\u2019Sullivan","sequence":"additional","affiliation":[]},{"given":"Vincent P.","family":"Wade","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,1,13]]},"reference":[{"key":"69_CR1","unstructured":"Abdul-Rahman, A.: A Framework for Decentralised Trust Reasoning. PhD doctoral thesis, Department of Computer Science, University of London (2005)"},{"key":"69_CR2","unstructured":"Amazon website, http:\/\/www.amazon.com"},{"key":"69_CR3","unstructured":"Bebo website, http:\/\/www.bebo.com"},{"issue":"3","key":"69_CR4","first-page":"127","volume":"2","author":"Y. Chu","year":"1997","unstructured":"Chu Y., Feigenbaum J., LaMacchia B., Resnick P., Strauss Ma.: REFEREE: trust management for web applications. World Wide Web J 2(3), 127\u2013139 (1997)","journal-title":"World Wide Web J"},{"key":"69_CR5","doi-asserted-by":"crossref","unstructured":"Douceur, J.R.: The Sybil Attack. In: Proceedings of the IPTPS02 Workshop, Cambridge, MA, USA, March 2002","DOI":"10.1007\/3-540-45748-8_24"},{"key":"69_CR6","unstructured":"eBay website, http:\/\/www.ebay.com"},{"key":"69_CR7","unstructured":"Epinions website, http:\/\/www.epinions.com"},{"key":"69_CR8","unstructured":"Dumbill, E.: XML Watch: finding friends with XML and RDF.\u2019, IBM Developer Works. http:\/\/www-106.ibm.com\/developerworks\/xml\/library\/xfoaf.html , June 2002"},{"key":"69_CR9","unstructured":"Gambetta, D. (ed.): Trust: making and breaking cooperative relations, http:\/\/www.sociology.ox.ac.uk\/papers\/biographies.html-dgpp .158\u2013175 Blackwell, Oxford (1988)"},{"key":"69_CR10","doi-asserted-by":"crossref","unstructured":"Gil, Y., Ratnakar, V.: Trusting information sources one citizen at a time. In: Proceedings of the First International Semantic Web Conference (ISWC), Sardinia, Italy, June (2002)","DOI":"10.1007\/3-540-48005-6_14"},{"key":"69_CR11","doi-asserted-by":"crossref","unstructured":"Golbeck, J., Hendler, J., Parsia, B.: Trust Networks on the Semantic Web. In: 12th International Web Conference (WWW03), Budapest, Hungary, May (2003)","DOI":"10.1007\/978-3-540-45217-1_18"},{"key":"69_CR12","unstructured":"Golbeck, J., James, H.: Accuracy of metrics for inferring trust and reputation. In: Proceedings of 14th International Conference on Knowledge Engineering and Knowledge Management, October 5\u20138, 2004, Northamptonshire, UK (2004)"},{"key":"69_CR13","unstructured":"Golbeck, J.: Computing and Applying Trust in Web-based Social Networks. PhD thesis, Department of Computer Science, University of Maryland (2005)"},{"key":"69_CR14","unstructured":"Golbeck, J., Hendler, J.: FilmTrust: Movie recommendations using trust in web-based social networks. In: Proceedings of the IEEE Consumer Communications and Networking Conference, January (2006)"},{"key":"69_CR15","unstructured":"Golbeck, J., Hendler, J.: Inferring Reputation on the Semantic Web. In: 13th International Web Conference (WWW2004), New York, NY, USA, May (2004)"},{"key":"69_CR16","unstructured":"Gollmann, D.: Why Trust is Bad for Security. In: Keynote Speech, IEEE 6th International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), Stockholm, Sweden, 6\u20138 June (2005)"},{"key":"69_CR17","unstructured":"Grandison, T., Sloman, M.: SULTAN\u2014a Language for Trust Specification and Analysis. In: Proceedings of the 8th Annual Workshop HP OpenView University Association (HP-OVUA), Berlin, Germany, June 24\u201327 (2001)"},{"key":"69_CR18","doi-asserted-by":"crossref","unstructured":"Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys, 3, pp. 2\u201316, Fourth Quarter (2000)","DOI":"10.1109\/COMST.2000.5340804"},{"key":"69_CR19","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proceedings International WWW Conference, Budapest, Hungary (2003)","DOI":"10.1145\/775152.775242"},{"key":"69_CR20","unstructured":"Kleinberg, J.: Authoritative sources in a Hyperlinked Environment. In: Proceedings of the 9th ACM-SIAM Symposium on Discrete Algorithms (1998)"},{"key":"69_CR21","unstructured":"Labalme, F., Burton, K.: Enhancing the Internet with Reputations. An OpenPrivacy White Paper, March (2001). http:\/\/www.openprivacy.org\/papers\/200103-white.html"},{"key":"69_CR22","unstructured":"Levien, R., Aiken, A.: Attack resistant trust metrics for public key certification. In: 7th USENIX Security Symposium, San Antonio, Texas, January (1998)"},{"key":"69_CR23","unstructured":"Marsh, S.: Formalising Trust as a Computational Concept. PhD thesis, University of Stirling, Department of Computer Science and Mathematics (1994)"},{"key":"69_CR24","unstructured":"McGuinness, D.L., van Harmelen, F.: OWL Web Ontology Language Overview. W3C Proposed Recommendation, 15th Dec (2003)"},{"key":"69_CR25","unstructured":"McKnight, H.D., Chervany, N.L.: The Meanings of Trust; Technical Report 94\u201304, Carlson School of Management, University of Minnesota (1996)"},{"key":"69_CR26","unstructured":"Musen, M.A., Tu, S.W., Eriksson, H., Gennari, J.H., Puerta, A.R.: PROTEGE-II: An Environment for Reusable Problem-Solving Methods and Domain Ontologies. In: International Joint Conference on Artificial Intelligence, Chambery, Savoie, France (1993)"},{"key":"69_CR27","unstructured":"MySpace website, http:\/\/www.myspace.com"},{"key":"69_CR28","doi-asserted-by":"crossref","unstructured":"Quinn, K., O\u2019Sullivan, D., Lewis, D., Wade, V.P.: The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust. 4th International Conference on Trust Management (iTrust 2006), Pisa, Italy, 15\u201319 May (2006)","DOI":"10.1007\/11755593_24"},{"key":"69_CR29","unstructured":"Quinn, K.: A Multi-Faceted Model of Trust that is Personalisable and Specialisable. PhD Thesis, Department of Computer Science and Statistics, University of Dublin, Trinity College of Dublin, Dublin (2007)"},{"issue":"1","key":"69_CR30","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/MIS.2002.988440","volume":"17","author":"N Shadbolt","year":"2002","unstructured":"Shadbolt N: A Matter of Trust. IEEE Intell. Syst. 17(1), 2\u20133 (2002)","journal-title":"IEEE Intell. Syst."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-008-0069-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-008-0069-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-008-0069-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T07:01:23Z","timestamp":1559113283000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-008-0069-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1,13]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,4]]}},"alternative-id":["69"],"URL":"https:\/\/doi.org\/10.1007\/s10207-008-0069-7","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,1,13]]}}}