{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,10]],"date-time":"2026-05-10T10:20:23Z","timestamp":1778408423491,"version":"3.51.4"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,7,7]],"date-time":"2011-07-07T00:00:00Z","timestamp":1309996800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s10462-011-9277-z","type":"journal-article","created":{"date-parts":[[2011,7,6]],"date-time":"2011-07-06T12:44:09Z","timestamp":1309956249000},"page":"1-25","source":"Crossref","is-referenced-by-count":238,"title":["Computational trust and reputation models for open multi-agent systems: a review"],"prefix":"10.1007","volume":"40","author":[{"given":"Isaac","family":"Pinyol","sequence":"first","affiliation":[]},{"given":"Jordi","family":"Sabater-Mir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,7,7]]},"reference":[{"key":"9277_CR1","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: Proceedings of the Hawaii\u2019s international conference on systems sciences. Maui, Hawaii","DOI":"10.1109\/HICSS.2000.926814"},{"key":"9277_CR2","unstructured":"Amazon (2002) Amazon auctions. http:\/\/auctions.amazon.com"},{"issue":"2","key":"9277_CR3","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.websem.2007.03.002","volume":"5","author":"D Artz","year":"2007","unstructured":"Artz D, Gil Y (2007) A survey of trust in computer science and the semantic web. Web Semant Sci Serv Agents World Wide Web, Softw Eng Semant Web 5(2): 58\u201371","journal-title":"Web Semant Sci Serv Agents World Wide Web, Softw Eng Semant Web"},{"key":"9277_CR4","unstructured":"Balke T, Knig S, Torsten E (2009) A survey on reputation systems for artificial societies. Technical Report 46, Bayreuth University"},{"key":"9277_CR5","doi-asserted-by":"crossref","unstructured":"Carbo J, Molina J, Davila J (2002) Trust management through fuzzy reputation. Int J Co-op Inf Syst pp (in press)","DOI":"10.1142\/S0218843003000681"},{"issue":"2","key":"9277_CR6","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1111\/1467-8640.t01-1-00201","volume":"18","author":"J Carter","year":"2002","unstructured":"Carter J, Bitting E, Ghorbani A (2002) Reputation formalization for an information-sharing multi-agent sytem. Comput Intell 18(2): 515\u2013534","journal-title":"Comput Intell"},{"key":"9277_CR7","unstructured":"Castelfranchi C, Falcone R (1998) Social trust. In: Proceedings of the first workshop on deception, fraud and trust in agent societies. Minneapolis, USA pp 35\u201349"},{"key":"9277_CR8","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s11229-006-9156-3","volume":"155","author":"C Castelfranchi","year":"2007","unstructured":"Castelfranchi C, Paglieri F (2007) The role of beliefs in goal dynamics: prolegomena to a constructive theory of intentions. Synthese 155: 237\u2013263","journal-title":"Synthese"},{"key":"9277_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-1159-5","volume-title":"Reputation in artificial societies: social beliefs for social order","author":"R Conte","year":"2002","unstructured":"Conte R, Paolucci M (2002) Reputation in artificial societies: social beliefs for social order. Kluwer, Dordrecht"},{"key":"9277_CR10","unstructured":"eBay (2002) eBay. http:\/\/www.eBay.com"},{"key":"9277_CR11","unstructured":"eRep (2006) eRep: social knowledge for e-governance. http:\/\/megatron.iiia.csic.es\/eRep"},{"key":"9277_CR12","unstructured":"eRep (2007) Deliverable 1.1: review of internet user-oriented reputation applications and application layer networks. http:\/\/megatron.iiia.csic.es\/eRep\/?q=node\/37"},{"key":"9277_CR13","unstructured":"Esfandiari B, Chandrasekharan S (2001) On how agents make friends: mechanisms for trust acquisition. In: Proceedings of the fourth workshop on deception, fraud and trust in agent societies. Montreal, Canada, pp 27\u201334"},{"key":"9277_CR14","unstructured":"ForTrust (2009) ForTrust: social trust analysis and formalization. http:\/\/www.irit.fr\/ForTrust\/"},{"key":"9277_CR15","first-page":"213","volume-title":"Trust: making and breaking cooperative relations, chapter can we trust trust?","author":"D Gambetta","year":"1990","unstructured":"Gambetta D (1990) Trust: making and breaking cooperative relations, chapter can we trust trust?. Basil Blackwell, Oxford, pp 213\u2013237"},{"issue":"6","key":"9277_CR16","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1016\/S1071-5819(03)00043-0","volume":"58","author":"S Grabner-Kruter","year":"2003","unstructured":"Grabner-Kruter S, Kaluscha EA (2003) Empirical research in on-line trust: a review and critical assessment. Int J Hum-Comput Stud 58(6): 783\u2013812","journal-title":"Int J Hum-Comput Stud"},{"key":"9277_CR17","doi-asserted-by":"crossref","unstructured":"Grandison T, Sloman M (2000) A survey of trust in internet applications. IEEE Commun Surv Tutor 3(4)","DOI":"10.1109\/COMST.2000.5340804"},{"key":"9277_CR18","unstructured":"Herzig A, Lorini E, Hubner JF, Ben-Naim J, Castelfranchi C, Demolombe R, Longin D, Vercouter L (2008) Prolegomena for a logic of trust and reputation. In: NORMAS\u201908. pp 143\u2013157"},{"key":"9277_CR19","unstructured":"Hoffman K, Zage D, Nita-Rotaru C (2007) A survey of attack and defense techniques for reputation systems. Technical Report CSD TR 07-013, Purdue University"},{"issue":"13","key":"9277_CR20","first-page":"119","volume":"2","author":"T Huynh","year":"2006","unstructured":"Huynh T, Jennings N, Shadbolt N (2006) An integrated trust and reputation model for open multi-agent systems. J AAMAS 2(13): 119\u2013154","journal-title":"J AAMAS"},{"issue":"2","key":"9277_CR21","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A Jsang","year":"2007","unstructured":"Jsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2): 618\u2013644 Emerging Issues in Collaborative Commerce","journal-title":"Decis Support Syst"},{"key":"9277_CR22","doi-asserted-by":"crossref","unstructured":"Koutrouli E, Tsalgatidou A (2006) Reputation-based trust systems for p2p applications: design issues and comparison framework. In: Trust and privacy in digital business, vol 4083 of LNCS. Springer, Berlin pp 152\u2013161","DOI":"10.1007\/11824633_16"},{"key":"9277_CR23","unstructured":"Kuhlen R (1999) Die Konsequenzen von Informationsassistenten. Was bedeutet informationelle Autonomie oder wie kann Vertrauen in elektronische Dienste in offenen Informationsmrkten gesichert wer-den? Suhrkamp, Frankfurt"},{"key":"9277_CR24","unstructured":"Lu G, Lu J, Yao S, Yip J (2007) A review on computational trust models for multi-agent systems. In: International conference on internet computing. pp 325\u2013331"},{"key":"9277_CR25","unstructured":"Luck M, McBurney P, Shehory O, Willmott S (2005) Agent technology: computing as interaction (a roadmap for agent based computing), AgentLink"},{"key":"9277_CR26","volume-title":"Trust and Power","author":"N Luhmann","year":"1979","unstructured":"Luhmann N (1979) Trust and Power. Wiley, Chichester"},{"key":"9277_CR27","unstructured":"Marsh S (1994) Formalising trust as a computational concept. PhD thesis, Department of Mathematics and Computer Science, University of Stirling"},{"key":"9277_CR28","doi-asserted-by":"crossref","unstructured":"Mui L, Halberstadt A, Mohtashemi M (2002) Notions of reputation in multi-agent systems: a review. In: Proceedings of the first international joint conference on autonomous agents and multiagent systems (AAMAS-02), Bologna, Italy, pp 280\u2013287","DOI":"10.1145\/544741.544807"},{"key":"9277_CR29","unstructured":"Mui L, Mohtashemi M, Ang C, Szolovits P, Halberstadt A (2001) Ratings in distributed systems: a bayesian approach. In: Proceedings of the 11th workshop on information technologies and systems (WITS), New Orleans, USA"},{"key":"9277_CR30","doi-asserted-by":"crossref","unstructured":"Mui L, Mohtashemi M, Halberstadt A (2002) A computational model for trust and reputation. In: Proceedings of the 35th Hawaii international conference on system sciences","DOI":"10.1109\/HICSS.2002.994181"},{"key":"9277_CR31","volume-title":"Trusting agents for trusting electronic societies, theory and applications in HCI and e-commerce, volume 3577 of lecture notes in computer science","author":"G Muller","year":"2005","unstructured":"Muller G, Vercouter L (2005) Decentralized monitoring of agent communications with a reputation model. In: Falcone R, Barber KS, Sabater-Mir J, Singh MP (eds) Trusting agents for trusting electronic societies, theory and applications in HCI and e-commerce, volume 3577 of lecture notes in computer science. Springer, Berlin"},{"key":"9277_CR32","doi-asserted-by":"crossref","unstructured":"OnSale (2002) OnSale. http:\/\/www.onsale.com","DOI":"10.1145\/504689.504690"},{"issue":"4","key":"9277_CR33","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/10864415.2002.11044246","volume":"6","author":"B Padovan","year":"2002","unstructured":"Padovan B, Sackmann S, Eymann T, Pippow I (2002) A prototype for an agent-based secure electronic marketplace including reputation-tracking mechanisms. Int J Electron Commer 6(4): 93\u2013113","journal-title":"Int J Electron Commer"},{"key":"9277_CR34","unstructured":"Pinyol I, Sabater-Mir J (2009) Pragmatic-strategic reputation-based decisions in bdi agents. In: Proceedings of the AAMAS\u201909, Budapest, Hungary, pp 1001\u20131008"},{"key":"9277_CR35","unstructured":"Pinyol I, Sabater-Mir J, Dellunde P, Paolucci M (2010) Reputation-based decisions for logic-based cognitive agents. Auton Agents Multi-Agent Syst pp 1\u201342"},{"key":"9277_CR36","unstructured":"Rasmusson L, Janson ARS (1997) Using agents to secure the internet marketplace. In: Proceedings of the practical applications of agents as multi-agent systems"},{"key":"9277_CR37","doi-asserted-by":"crossref","unstructured":"Rasmusson L, Janson S (1996) Simulated social control for secure internet commerce. In: Proceedings of the 1996 workshop on new security paradigms. ACM Press, London, UK, pp 18\u201325","DOI":"10.1145\/304851.304857"},{"key":"9277_CR38","unstructured":"Regan K, Cohen R (2005) Indirect reputation assessment for adaptive buying agents in electronic markets. Business Agents and the Semantic Web workshop, 1"},{"key":"9277_CR39","unstructured":"Ripperger T (1998) konomik des Vertrauens\u2013Analyse eines Organisationsprinzips Tbinger"},{"key":"9277_CR40","doi-asserted-by":"crossref","unstructured":"Ruohomaa S, Kutvonen L, Koutrouli E (2007) Reputation management survey. In: ARES \u201907: proceedings of the the second international conference on availability, reliability and security, IEEE Computer Society. Washington, pp 103\u2013111","DOI":"10.1109\/ARES.2007.123"},{"key":"9277_CR41","doi-asserted-by":"crossref","unstructured":"Sabater J, Sierra C (2001) Regret: A reputation model for gregarious societies. In: Proceedings of the fourth workshop on deception, fraud and trust in agent societies, Montreal, pp 61\u201369","DOI":"10.1145\/375735.376110"},{"key":"9277_CR42","doi-asserted-by":"crossref","unstructured":"Sabater J, Sierra C (2002) Reputation and social network analysis in multi-agent systems. In: Proceedings of AAMAS-02. Bologna, pp 475\u2013482","DOI":"10.1145\/544741.544854"},{"issue":"1","key":"9277_CR43","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s10462-004-0041-5","volume":"24","author":"J Sabater","year":"2005","unstructured":"Sabater J, Sierra C (2005) Review on computational trust and reputation models. Artif Intel Rev 24(1): 33\u201360","journal-title":"Artif Intel Rev"},{"key":"9277_CR44","unstructured":"Sabater-Mir J (2003) Trust and reputation for agent societies. PhD thesis, IIIA-CSIC, Barcelona, Spain"},{"key":"9277_CR45","unstructured":"Sabater-Mir J, Paolucci M, Conte R (2006) Repage: reputation and image among limited autonomous partners. JASSS 9(2)"},{"key":"9277_CR46","unstructured":"Schillo M, Funk P, Rovatsos M (1999) Who can you trust: dealing with deception. In: Proceedings of the second workshop on deception, fraud and trust in agent societies. Seattle, pp 95\u2013106"},{"key":"9277_CR47","doi-asserted-by":"crossref","unstructured":"Schillo M, Funk P, Rovatsos M (2000) Using trust for detecting deceitful agents in artificial societites. Applied artificial intelligence, (Special Issue on Trust, Deception and Fraud in Agent Societies)","DOI":"10.1080\/08839510050127579"},{"key":"9277_CR48","doi-asserted-by":"crossref","unstructured":"Sen S, Sajja N (2002) Robustness of reputation-based trust: Boolean case. In: Proceedings of the first international joint conference on autonomous agents and multiagent systems (AAMAS-02). Bologna, pp 288\u2013293","DOI":"10.1145\/544741.544808"},{"key":"9277_CR49","doi-asserted-by":"crossref","unstructured":"Sierra C, Debenham J (2005) An information-based model for trust. In: Proceedings of the fourth international joint conference on autonomous agents and multiagent systems, AAMAS \u201905. ACM, New York, pp 497\u2013504","DOI":"10.1145\/1082473.1082549"},{"key":"9277_CR50","unstructured":"Suryanarayana G, Taylo RN (2004) A survey of trust management and resource discovery technologies in peer-to-peer applications. ISR Technical Report UCI-ISR-04-6, University of California"},{"key":"9277_CR51","doi-asserted-by":"crossref","unstructured":"Yu B, Singh MP (2003) Detecting deception in reputation management. In: AAMAS \u201903: proceedings of the second international joint conference on autonomous agents and multiagent systems. ACM Press, New York, pp 73\u201380","DOI":"10.1145\/860575.860588"},{"key":"9277_CR52","unstructured":"Zacharia G (1999) Collaborative reputation mechanisms for online communities. Master\u2019s thesis, Massachusetts Institute of Technology, September 1999"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-011-9277-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10462-011-9277-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-011-9277-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,27]],"date-time":"2021-11-27T17:41:14Z","timestamp":1638034874000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10462-011-9277-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,7]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["9277"],"URL":"https:\/\/doi.org\/10.1007\/s10462-011-9277-z","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7,7]]}}}