{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T01:03:25Z","timestamp":1775091805747,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2006,3,10]],"date-time":"2006-03-10T00:00:00Z","timestamp":1141948800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Auton Agent Multi-Agent Syst"],"published-print":{"date-parts":[[2006,9]]},"DOI":"10.1007\/s10458-005-6825-4","type":"journal-article","created":{"date-parts":[[2006,3,10]],"date-time":"2006-03-10T12:28:17Z","timestamp":1141993697000},"page":"119-154","source":"Crossref","is-referenced-by-count":518,"title":["An integrated trust and reputation model for open multi-agent systems"],"prefix":"10.1007","volume":"13","author":[{"given":"Trung Dong","family":"Huynh","sequence":"first","affiliation":[]},{"given":"Nicholas R.","family":"Jennings","sequence":"additional","affiliation":[]},{"given":"Nigel R.","family":"Shadbolt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,3,10]]},"reference":[{"key":"6825_CR1","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., & Hailes, S. (2000). Supporting trust in virtual communities. In Proceedings of the 33rd Hawaii international conference on system sciences. Vol. 6., IEEE Computer Society Press.","DOI":"10.1109\/HICSS.2000.926814"},{"key":"6825_CR2","unstructured":"Amazon Site. (http:\/\/www.amazon.com) World Wide Web."},{"key":"6825_CR3","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Hendler, J., & Lassila, O. (2001). The semantic web. Scientific American.","DOI":"10.1038\/scientificamerican0501-34"},{"issue":"1","key":"6825_CR4","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1142\/S0218843003000681","volume":"12","author":"J. Carbo","year":"2003","unstructured":"Carbo J., Molina J.M. and Davila J. (2003). Trust management through fuzzy reputation. International Journal of Cooperative Information Systems 12(1): 135\u2013155","journal-title":"International Journal of Cooperative Information Systems"},{"key":"6825_CR5","doi-asserted-by":"crossref","unstructured":"Castelfranchi, C., & Falcone, R. (2001). Social trust: A cognitive approach. In C. Castelfranchi, & Y. Tan, (Eds.), Trust and deception in virtual societies. (pp. 55\u201390). Kluwer Academic Publishers.","DOI":"10.1007\/978-94-017-3614-5"},{"key":"6825_CR6","unstructured":"Cohen, P. R. (1995). Empirical methods for artificial intelligence. The MIT Press."},{"key":"6825_CR7","doi-asserted-by":"crossref","unstructured":"Conte, R., & Paolucci, M. (2002). Reputation in artificial societies. Kluwer Academic Publishers.","DOI":"10.1007\/978-1-4615-1159-5"},{"key":"6825_CR8","unstructured":"Dasgupta, P. (2000). Trust as a Commodity. In D. Gambetta (Ed.), Trust: Making and breaking cooperative relations. Electronic edn. Department of Sociology, University of Oxford 49\u201372."},{"key":"6825_CR9","unstructured":"DeGroot, M. H., & Schervish, M. J. (2002). Probability and statistics. Addison-Wesley."},{"key":"6825_CR10","unstructured":"eBay Site. (http:\/\/www.ebay.com) World Wide Web."},{"issue":"3","key":"6825_CR11","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1177\/109434200101500302","volume":"15","author":"I. Foster","year":"2001","unstructured":"Foster I., Kesselman C. and Tuecke S. (2001). The anatomy of the grid: enabling scalable virtual organizations. The International Journal of High Performance Computing Applications 15(3): 200\u2013222","journal-title":"The International Journal of High Performance Computing Applications"},{"key":"6825_CR12","unstructured":"Gambetta, D. (2000). Trust: Making and breaking cooperative relations. Electronic edn. Department of Sociology, University of Oxford."},{"key":"6825_CR13","doi-asserted-by":"crossref","unstructured":"Grandison, T., & Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications Surveys & Tutorials, 3(4).","DOI":"10.1109\/COMST.2000.5340804"},{"key":"6825_CR14","unstructured":"Huynh, T. D., Jennings, N. R., & Shadbolt, N. R. (2004a). Developing an integrated trust and reputation model for open multi-agent systems. In R. Falcone, S. Barber, J. Sabater, & M. Singh, (Eds.), Proceedings of the 7th international workshop on trust in agent societies (pp. 65\u201374)."},{"key":"6825_CR15","unstructured":"Huynh, T. D., Jennings, N. R., & Shadbolt, N. R. (2004b). FIRE: An integrated trust and reputation model for open multi-agent systems. In Proceedings of the 16th European conference on artificial intelligence (ECAI) (pp. 18\u201322)."},{"issue":"4","key":"6825_CR16","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/367211.367250","volume":"44","author":"N. R. Jennings","year":"2001","unstructured":"Jennings N. R. (2001). An agent-based approach for building complex software systems. Communications of the ACM 44(4): 35\u201341","journal-title":"Communications of the ACM"},{"key":"6825_CR17","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1007\/3-540-36609-1_11","volume-title":"Trust, reputation and security: theories and practice","author":"R. Jurca","year":"2003","unstructured":"Jurca R. and Faltings B. (2003). Towards incentive-compatible reputation management. In: Falcone, R., Barber, S., Korba, L. and Singh, M. (eds) Trust, reputation and security: theories and practice. Vol. 2631 of Lecture Notes in AI, Springer-Verlag, Berlin, Heidelberg 138\u2013147"},{"key":"6825_CR18","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1613\/jair.301","volume":"4","author":"L. P. Kaelbling","year":"1996","unstructured":"Kaelbling L. P., Littman M. L. and Moore A. W. (1996). Reinforcement learning: A survey. Journal of Artificial Intelligence Research 4: 237\u2013285","journal-title":"Journal of Artificial Intelligence Research"},{"key":"6825_CR19","unstructured":"Marsh, S. P. (1994). Formalising trust as a computational concept, PhD thesis, University of Stirling."},{"key":"6825_CR20","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/3-540-45547-7_10","volume-title":"Trust in cyber-societies","author":"Y. Mass","year":"2001","unstructured":"Mass Y. and Shehory O. (2001). Distributed trust in open multi-agent systems. In: Falcone, R., Singh, M. and Tan, Y. (eds) Trust in cyber-societies, pp 159\u2013173. Springer-Verlag, Berlin, Heidelberg"},{"issue":"1","key":"6825_CR21","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/844331.844335","volume":"3","author":"E. M. Maximilien","year":"2002","unstructured":"Maximilien E. M. and Singh M. P. (2002). Reputation and endorsement for web services. ACM SIGEcom Exchanges 3(1): 24\u201331","journal-title":"ACM SIGEcom Exchanges"},{"key":"6825_CR22","doi-asserted-by":"crossref","unstructured":"Mui, L., Mohtashemi, M., & Halberstadt, A. (2002). A computational model of trust and reputation. In Proceedings of the 35th Hawaii international conference on system science. (pp. 280\u2013287).","DOI":"10.1109\/HICSS.2002.994181"},{"key":"6825_CR23","doi-asserted-by":"crossref","unstructured":"Ooi, B. C., Liau, C. Y., & Tan, K. L. (2003). Managing trust in peer-to-peer systems using reputation-based techniques. In Proceedings of the 4th international conference in advances in web-age information management (WAIM 2003). Vol. 2762 of Lecture Notes in Computer Science. 2\u201312 Chengdu, China, August 17\u201319.","DOI":"10.1007\/978-3-540-45160-0_2"},{"issue":"1","key":"6825_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1017\/S0269888904000116","volume":"19","author":"S. D. Ramchurn","year":"2004","unstructured":"Ramchurn S. D., Huynh T. D. and Jennings N. R. (2004). Trust in multi-agent systems. The Knowledge Engineering Review 19(1): 1\u201325","journal-title":"The Knowledge Engineering Review"},{"key":"6825_CR25","doi-asserted-by":"crossref","unstructured":"Resnick, P., & Zeckhauser, R. (2002). Trust among strangers in internet transactions: Empirical analysis of eBay\u2019s reputation system. In M. R. Baye, (Ed.), The economics of the internet and e-commerce. Vol. 11 of Advances in Applied Microeconomics. Elsevier Science.","DOI":"10.1016\/S0278-0984(02)11030-3"},{"key":"6825_CR26","unstructured":"Sabater, J. (2003). Trust and Reputation for Agent Societies. PhD thesis, Universitat Aut\u00f2noma de Barcelona."},{"key":"6825_CR27","doi-asserted-by":"crossref","unstructured":"Sabater, J., & Sierra, C. (2001). REGRET: A reputation model for gregarious societies. In Fourth workshop on deception fraud and trust in agent societies (pp. 61\u201370). Montreal, Canada.","DOI":"10.1145\/375735.376110"},{"issue":"3","key":"6825_CR28","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MC.2003.1185214","volume":"36","author":"D. Saha","year":"2003","unstructured":"Saha D. and Mukherjee A. (2003). Pervasive computing: A paradigm for the 21st century. IEEE Computer 36(3): 25\u201331","journal-title":"IEEE Computer"},{"key":"6825_CR29","volume-title":"An introduction to modern information retrieval","author":"G. Salton","year":"1983","unstructured":"Salton G. and McGill M. (1983). An introduction to modern information retrieval. McGraw-Hill, New York"},{"issue":"8","key":"6825_CR30","first-page":"825","volume":"14","author":"M. Schillo","year":"2000","unstructured":"Schillo M., Rovatsos M. and Funk P. (2000). Using trust for detecting deceitful agents in artificial societies. Special Issue of the Applied Artificial Intelligence Journal on \u201cDeception, Fraud and Trust in Agent Societies\u201d 14(8): 825\u2013848","journal-title":"Special Issue of the Applied Artificial Intelligence Journal on \u201cDeception, Fraud and Trust in Agent Societies\u201d"},{"key":"6825_CR31","doi-asserted-by":"crossref","unstructured":"Sen, S., & Sajja, N. (2002). Robustness of reputation-based trust: Boolean case. In Proceedings of the first intenational joint conference on autonomous agents and multiagent systems. Vol. 1. (pp. 288\u2013293).","DOI":"10.1145\/544741.544808"},{"issue":"6","key":"6825_CR32","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MIC.2003.1250583","volume":"7","author":"H. Skogsrud","year":"2003","unstructured":"Skogsrud H., Benatallah B. and Casati F. (2003). Model-driven trust negotiation for web services. IEEE Internet Computing 7(6): 45\u201352","journal-title":"IEEE Internet Computing"},{"key":"6825_CR33","doi-asserted-by":"crossref","unstructured":"Steinmetz, R., & Wehrle, K., (Eds.) (2005). Peer-to-peer systems and applications. Vol. 3485 of Lecture Notes on Computer Science, Springer Publishing.","DOI":"10.1007\/11530657"},{"key":"6825_CR34","doi-asserted-by":"crossref","unstructured":"Teacy, W. T. L., Patel, J., Jennings, N. R., & Luck, M. (2005). Coping with inaccurate reputation sources: Experimental analysis of a probabilistic trust model. In proceedings of fourth international joint conference on autonomous agents and multiagent systems (pp. 997\u20131004).","DOI":"10.1145\/1082473.1082624"},{"key":"6825_CR35","doi-asserted-by":"crossref","unstructured":"Uszok, A., Bradshaw, J. M., & Jeffers, R. (2004). KAoS: A policy and domain services framework for grid computing and semantic web services. In C. Jensen, S. Poslad, & T. Dimitrakos, (Eds.), Trust management: Second international conference, iTrust 2004, Oxford, UK, March 29\u2013April 1, 2004. Proceedings. Vol. 2995 of Lecture Notes in Computer Science., (pp. 16\u201326). Springer-Verlag, Berlin, Heidelberg.","DOI":"10.1007\/978-3-540-24747-0_2"},{"key":"6825_CR36","doi-asserted-by":"crossref","unstructured":"Wasserman, S., & Faust, K. (1994). Social network analysis : Methods and applications. Volume 8 of Structural Analysis in the Social Sciences. Cambridge University Press.","DOI":"10.1017\/CBO9780511815478"},{"key":"6825_CR37","doi-asserted-by":"crossref","unstructured":"Yolum, P., & Singh, M. P. (2004). Service graphs for building trust. In International conference on cooperative information systems (CoopIS). Vol. 3290 of Lecture Notes in Computer Science (pp. 509\u2013525).","DOI":"10.1007\/978-3-540-30468-5_32"},{"key":"6825_CR38","doi-asserted-by":"crossref","unstructured":"Yu, B., & Singh, M. P. (2002). An evidential model of distributed reputation management. In Proceedings of first international joint conference on autonomous agents and multi-agent systems. Vol. 1. (pp. 294\u2013301). ACM Press.","DOI":"10.1145\/544741.544809"},{"key":"6825_CR39","doi-asserted-by":"crossref","unstructured":"Yu, B., & Singh, M. P. (2003). Searching social networks. In Proceedings of the second international joint conference on autonomous agents and multiAgent systems (AAMAS) (pp. 65\u201372). ACM Press.","DOI":"10.1145\/860575.860587"},{"issue":"9","key":"6825_CR40","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1080\/08839510050144868","volume":"14","author":"G. Zacharia","year":"2000","unstructured":"Zacharia G. and Maes P. (2000). Trust management through reputation mechanisms. Applied Artificial Intelligence 14(9): 881\u2013908","journal-title":"Applied Artificial Intelligence"},{"key":"6825_CR41","volume-title":"The official PGP user\u2019s guide","author":"P. R. Zimmermann","year":"1995","unstructured":"Zimmermann P. R. (1995). The official PGP user\u2019s guide. MIT Press, Cambridge, MA"}],"container-title":["Autonomous Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-005-6825-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10458-005-6825-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-005-6825-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T17:28:22Z","timestamp":1559150902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10458-005-6825-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,10]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2006,9]]}},"alternative-id":["6825"],"URL":"https:\/\/doi.org\/10.1007\/s10458-005-6825-4","relation":{},"ISSN":["1387-2532","1573-7454"],"issn-type":[{"value":"1387-2532","type":"print"},{"value":"1573-7454","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,3,10]]}}}