{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:26:23Z","timestamp":1761611183705},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2006,7,18]],"date-time":"2006-07-18T00:00:00Z","timestamp":1153180800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Grid Computing"],"published-print":{"date-parts":[[2006,9]]},"DOI":"10.1007\/s10723-006-9041-9","type":"journal-article","created":{"date-parts":[[2006,7,17]],"date-time":"2006-07-17T08:48:18Z","timestamp":1153126098000},"page":"247-263","source":"Crossref","is-referenced-by-count":14,"title":["Trust Brokering and Its Use for Resource Matchmaking in Public-Resource Grids"],"prefix":"10.1007","volume":"4","author":[{"given":"Farag","family":"Azzedin","sequence":"first","affiliation":[]},{"given":"Muthucumaru","family":"Maheswaran","sequence":"additional","affiliation":[]},{"given":"Arindam","family":"Mitra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,7,18]]},"reference":[{"key":"9041_CR1","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Hawaii International Conference System Sciences, 2000","DOI":"10.1109\/HICSS.2000.926814"},{"key":"9041_CR2","doi-asserted-by":"crossref","unstructured":"Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: 10th International Conference on Information and Knowledge Management (CIKM\u201901), pp. 310\u2013317, 2001","DOI":"10.1145\/502585.502638"},{"key":"9041_CR3","doi-asserted-by":"crossref","unstructured":"Azzedin, F., Maheswaran, M.: Integrating trust into Grid resource management systems. In: 2002 International Conference Parallel Processing (ICPP \u201902), pp. 47\u201354, 2002","DOI":"10.1109\/ICPP.2002.1040858"},{"key":"9041_CR4","unstructured":"Chen, R., Yeager, W.: Poblano: A Distributed Trust Model for Peer-to-Peer Networks. http:\/\/security.jxta.org (2001)"},{"key":"9041_CR5","doi-asserted-by":"crossref","unstructured":"Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P., Violante, F.: A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: 9th ACM Conference on Computer and Communications Security, pp. 207\u2013216, 2002","DOI":"10.1145\/586110.586138"},{"key":"9041_CR6","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Freedman, M.J., Molnar, D.: Accountability. In: Oram, A. (ed.) Peer-to-Peer: Harnessing the Power of Disruptive Technologies, pp. 271\u2013340. O'Reilly and Associates, Sebastopol, California (2001)","DOI":"10.1145\/375348.377427"},{"key":"9041_CR7","unstructured":"Foster, I., Kesselman, C. (eds.): The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco, California (1999)"},{"key":"9041_CR8","doi-asserted-by":"crossref","unstructured":"Foster, I., Iamnitchi, A.: On death, taxes, and the convergence of peer-to-peer and Grid computing. In: 2nd International Workshop on Peer-to-Peer Systems (IPTPS03), 2003","DOI":"10.1007\/978-3-540-45172-3_11"},{"key":"9041_CR9","doi-asserted-by":"crossref","unstructured":"Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid: Enabling scalable virtual organizations. Int. J. Supercomput. Appl. (2001)","DOI":"10.1177\/109434200101500302"},{"issue":"3","key":"9041_CR10","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/4236.935182","volume":"5","author":"L. Gong","year":"2001","unstructured":"Gong, L.: JXTA: A network programming environment. IEEE Internet Computing 5(3), 88\u201395 (2001)","journal-title":"IEEE Internet Computing"},{"key":"9041_CR11","doi-asserted-by":"crossref","unstructured":"Habra, N., Chalier, B.L., Mounji, A., Mathieu, I.: ASAX: Software architecture and rule-based language for universal audit trail analysis. In: European Symposium on Research in Computer Security (ESORIC'92), pp. 435\u2013450, 1992","DOI":"10.1007\/BFb0013912"},{"key":"9041_CR12","unstructured":"Katz, Y., Golbeck, J.: Social network-based trust in prioritized default logic. In: 21st National Conference on Artificial Intelligence (AAAI-06), 2006"},{"key":"9041_CR13","doi-asserted-by":"crossref","unstructured":"Kim, M., Noble, B.: Mobile Networks Estimation. In: 7th Annual Conference on Mobile Computing and Networking, 2001","DOI":"10.1145\/381677.381705"},{"key":"9041_CR14","unstructured":"Lunt, T.F.: Detecting intruders in computer systems. In: Conference on Auditing and Computer Technology, 1993"},{"issue":"2","key":"9041_CR15","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1006\/jpdc.1999.1581","volume":"59","author":"M. Maheswaran","year":"1999","unstructured":"Maheswaran, M., Ali, S., Siegel, H.J., Hensgen, D., Freund, R.F.: Dynamic mapping of a class of independent tasks onto heterogeneous computing systems. J. Parallel Distrib. Comput. 59(2), 107\u2013131 (1999)","journal-title":"J. Parallel Distrib. Comput."},{"key":"9041_CR16","unstructured":"Pierre, G., van Steen, M.: A trust model for peer-to-peer content distribution networks (2001)"},{"key":"9041_CR17","doi-asserted-by":"crossref","unstructured":"Sen, S., Sajja, N.: Robustness of reputation-based trust: Boolean case. In: 1st International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS-02), pp. 288\u2013293, 2002","DOI":"10.1145\/544741.544808"},{"issue":"1","key":"9041_CR18","first-page":"39","volume":"10","author":"S.E. Smaha","year":"1994","unstructured":"Smaha, S.E., Winslow, J.: Misuse detection tools. J. Comput. Secur. 10(1), 39\u201349 (1994)","journal-title":"J. Comput. Secur."},{"key":"9041_CR19","first-page":"271","volume-title":"Peer-to-Peer: Harnessing the Power of Disruptive Technologies","author":"M. Waldman","year":"2001","unstructured":"Waldman, M., Cranor, L.F., Rubin, A.: Trust. In: Oram, A. (ed.) Peer-to-Peer: Harnessing the Power of Disruptive Technologies, pp. 271\u2013340. O'Reilly and Associates, Sebastopol, California (2001)"},{"key":"9041_CR20","doi-asserted-by":"crossref","unstructured":"Yu, B., Singh, M.P.: An evidential model for distributed reputation management. In: 1st Int'l Joint Conf. Autonomous Agents and Multi-Agent Systems (AAMAS-02), pp. 294\u2013301, 2002","DOI":"10.1145\/544741.544809"}],"container-title":["Journal of Grid Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-006-9041-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10723-006-9041-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10723-006-9041-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T18:47:12Z","timestamp":1559242032000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10723-006-9041-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,18]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,9]]}},"alternative-id":["9041"],"URL":"https:\/\/doi.org\/10.1007\/s10723-006-9041-9","relation":{},"ISSN":["1570-7873","1572-9184"],"issn-type":[{"value":"1570-7873","type":"print"},{"value":"1572-9184","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,7,18]]}}}