{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:26:21Z","timestamp":1761611181427},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2006,6,9]],"date-time":"2006-06-09T00:00:00Z","timestamp":1149811200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2006,10,10]]},"DOI":"10.1007\/s10776-006-0040-3","type":"journal-article","created":{"date-parts":[[2006,6,8]],"date-time":"2006-06-08T14:57:54Z","timestamp":1149778674000},"page":"263-274","source":"Crossref","is-referenced-by-count":8,"title":["Querying in Packs: Trustworthy Data Management in Ad Hoc Networks"],"prefix":"10.1007","volume":"13","author":[{"given":"Anand","family":"Patwardhan","sequence":"first","affiliation":[]},{"given":"Filip","family":"Perich","sequence":"additional","affiliation":[]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Finin","sequence":"additional","affiliation":[]},{"given":"Yelena","family":"Yesha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,6,9]]},"reference":[{"key":"40_CR1","unstructured":"M. Cherniak, E. Galvez, D. Brooks, M. Franklin, and S. Zdonik, Profile Driven Data Management, in 28th International Conference on Very Large Databases, August 2002"},{"key":"40_CR2","doi-asserted-by":"crossref","unstructured":"F. Perich, S. Avancha, D. Chakraborty, A. Joshi, and Y. Yesha, Profile driven data management for pervasive environments, in 13th International Conference on Database and Expert Systems Applications (DEXA 2002), Aix en Provence, France, September 2002","DOI":"10.1007\/3-540-46146-9_36"},{"key":"40_CR3","unstructured":"L. Kagal, T. Finin, and A. Joshi, A policy language for a pervasive computing environment, in IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003"},{"key":"40_CR4","unstructured":"F. Perich, MoGATU BDI Ontology, http:\/\/www.mogatu.umbc.edu\/bdi\/ , 2004"},{"issue":"5","key":"40_CR5","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1109\/TKDE.2004.1277823","volume":"16","author":"F. Perich","year":"2004","unstructured":"F. Perich, A. Joshi, T. Finin, and Y. Yesha, On data management in pervasive computing environments, IEEE Transactions on Knowledge and Data Engineering 16(5): 621\u2013634, 2004","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"40_CR6","unstructured":"F. Perich, MoGATU: Data Management in Pervasive Computing Enviroments, http:\/\/www.mogatu.umbc.edu\/ , 2001\u20132005"},{"key":"40_CR7","unstructured":"N. Luhmann, '\u2019Trust and Power\u201d, 1st ed. John Wiley & Sons, Inc., 1979"},{"key":"40_CR8","unstructured":"S. Marsh, Formalising trust as a computational concept, 1994"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"R. Guha, R. Kumar, P. Raghavan, and A. Tomkins, Propagation of trust and distrust, in WWW \u201904: Proceedings of the 13th international conference on World Wide Web, ACM Press, New York, NY, USA, pp. 403\u2013412, 2004","DOI":"10.1145\/988672.988727"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, The eigentrust algorithm for reputation management in p2p networks, in WWW \u201903: Proceedings of the 12th international conference on World Wide Web, ACM Press, New York, NY, USA, pp. 640\u2013651, 2003","DOI":"10.1145\/775152.775242"},{"key":"40_CR11","unstructured":"S. Buchegger and J.-Y.L. Boudec, A robust reputation system for p2p and mobile ad-hoc networks, 2004"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"M. J. Franklin. Challenges in ubiquitous data management, in Informatics - 10\u00a0Years Back. 10\u00a0Years Ahead., Springer-Verlag, pp. 24\u201333, 2001","DOI":"10.1007\/3-540-44577-3_2"},{"issue":"4","key":"40_CR13","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/98.944001","volume":"8","author":"M. Cherniack","year":"2001","unstructured":"M. Cherniack, M. J. Franklin, and S. Zdonik. Expressing user profiles for data recharging, IEEE Personal Communications 8(4): 32\u201338, 2001 (see also IEEE Wireless Communications)","journal-title":"IEEE Personal Communications"},{"key":"40_CR14","unstructured":"g2dn: Gnutella2 developer\u2019s network. http:\/\/www.gnutella2.com\/"},{"key":"40_CR15","unstructured":"Open Source Napster Sever. http:\/\/www.sourceforge.net\/projects\/opennap\/"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, in Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications, ACM Press, pp. 149\u2013160, 2001","DOI":"10.1145\/383059.383071"},{"key":"40_CR17","doi-asserted-by":"crossref","unstructured":"J. B. Begole, J. C. Tang, R. B. Smith, and N. Yankelovich, Work rhythms: analyzing visualizations of awareness histories of distributed groups, in CSCW \u201902: Proceedings of the 2002 ACM conference on Computer supported cooperative work, ACM Press, pp. 334\u2013343, 2002","DOI":"10.1145\/587078.587125"},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"M. J. Covington, W. Long, S. Srinivasan, A. K. Dey, M. Ahamad, and G. D. Abowd, Securing context-aware applications using environment roles, in SACMAT \u201901: Proceedings of the sixth ACM symposium on Access control models and technologies, ACM Press, pp. 10\u201320, 2001","DOI":"10.1145\/373256.373258"},{"key":"40_CR19","doi-asserted-by":"crossref","unstructured":"T. Aura, Internet Draft: Cryptographically Generated Addresses (CGA). http:\/\/www.ietf.org\/proceedings\/04mar\/I-D\/draft-ietf-send-cga05.txt , February 2004","DOI":"10.17487\/rfc3972"},{"key":"40_CR20","unstructured":"G. Montenegro and C. Castelluccia. Statistically Unique and Cryptographically Verifiable(SUCV) identifiers and addresses. http:\/\/www.citeseer.ist.psu.edu\/montenegro02statistically.html , 2002"},{"issue":"3","key":"40_CR21","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1145\/355324.355325","volume":"7","author":"A. Dix","year":"2000","unstructured":"Dix A., Rodden T., Davies N., Trevor J., Friday A., and Palfreyman K.(2000). Exploiting space and location as a design framework for interactive mobile systems. ACM Transaction Computational-Human Interaction 7(3):285\u2013321","journal-title":"ACM Transaction Computational-Human Interaction"},{"key":"40_CR22","doi-asserted-by":"crossref","unstructured":"A. Roy, S. K. Das Bhaumik, A. Bhattacharya, K. Basu, D. J. Cook, and S. K. Das, Location aware resource management in smart homes, in Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, pp. 481\u2013488, 2003","DOI":"10.1109\/PERCOM.2003.1192773"},{"key":"40_CR23","doi-asserted-by":"crossref","unstructured":"F. Perich, J. L. Undercoffer, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, In reputation we believe: query processing in mobile ad-hoc networks, in International Conference on Mobile and Ubiquitous Systems: Networking and Services, Boston, MA, August 2004","DOI":"10.21236\/ADA439635"},{"key":"40_CR24","doi-asserted-by":"crossref","unstructured":"J. R. Douceur, The Sybil attack, in IPTPS, pp. 251\u2013260, 2002","DOI":"10.1007\/3-540-45748-8_24"},{"key":"40_CR25","doi-asserted-by":"crossref","unstructured":"X. Zeng, R. Bagrodia, and M. Gerla. GloMoSim: A Library for Parallel Simulation of Large-Scale Wireless Networks, in Workshop on Parallel and Distributed Simulation, 1998","DOI":"10.1145\/278009.278027"},{"key":"40_CR26","unstructured":"Web Ontology Language (OWL) http:\/\/www.w3.org\/2004\/OWL\/ , February 2005"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-006-0040-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10776-006-0040-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-006-0040-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T12:01:31Z","timestamp":1559304091000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10776-006-0040-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,6,9]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2006,10,10]]}},"alternative-id":["40"],"URL":"https:\/\/doi.org\/10.1007\/s10776-006-0040-3","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"value":"1068-9605","type":"print"},{"value":"1572-8129","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,6,9]]}}}