{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:27:00Z","timestamp":1742394420314},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2005,10,24]],"date-time":"2005-10-24T00:00:00Z","timestamp":1130112000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2005,12]]},"DOI":"10.1007\/s11036-005-4453-5","type":"journal-article","created":{"date-parts":[[2005,11,10]],"date-time":"2005-11-10T10:38:27Z","timestamp":1131619107000},"page":"971-983","source":"Crossref","is-referenced-by-count":31,"title":["Enforcing Cooperative Resource Sharing in Untrusted P2P Computing Environments"],"prefix":"10.1007","volume":"10","author":[{"given":"Zhengqiang","family":"Liang","sequence":"first","affiliation":[]},{"given":"Weisong","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,10,24]]},"reference":[{"key":"4453_CR1","doi-asserted-by":"crossref","unstructured":"E. Adar and B. Huberman, Free riding on gnutella, First Monday 5(10) (2000).","DOI":"10.5210\/fm.v5i10.792"},{"key":"4453_CR2","doi-asserted-by":"crossref","unstructured":"Y. Amir, B. Awerbuch and R. Borgstrom, A cost-benefit framework for online management of a metacomputing systems, in: Proc. of the first Inernational Conference on Information and Computational Economy (1998).","DOI":"10.1145\/288994.289026"},{"key":"4453_CR3","doi-asserted-by":"crossref","unstructured":"P. Barford and M.E. Crovella, Generating representative web workloads for network and server performance evaluation, in: Proceedings of Performance \u203298\/ACM SIGMETRICS \u203298 (1998).","DOI":"10.1145\/277851.277897"},{"key":"4453_CR4","doi-asserted-by":"crossref","unstructured":"M. Blaze, J. Feigenbaum and J. Lacy, Decentralized trust management, in: IEEE Symposium on Security and Privacy (1996).","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"4453_CR5","doi-asserted-by":"crossref","unstructured":"R. Buyya, D. Abramson and J. Giddy, A case for economy grid architecture for service-oriented grid computing, in: Proceedings of the 10th IEEE International Heterogeneous Computing Workshop (2001).","DOI":"10.1109\/IPDPS.2001.925033"},{"key":"4453_CR6","volume-title":"Market-based Cluster Resource Management","author":"B. Chun","year":"2001","unstructured":"B. Chun, Market-based cluster resource management, Ph.D. thesis, Department of Electrical Engineering and Computer Science, UC Berkeley (2001)."},{"key":"4453_CR7","doi-asserted-by":"crossref","unstructured":"F. Cornelli, E. Damiani, S.D.C. Vimercati, S. Paraboschi and P. Samarati, Choosing reputable servents in a P2P network, in: Proc. of the 11th International World Wide Web Conference (2002).","DOI":"10.1145\/511446.511496"},{"key":"4453_CR8","doi-asserted-by":"crossref","unstructured":"J. Douceur, The Sybil Attack, in: Proc. of the 1st International Workshop on Peer-to-Peer Systems (IPTPS\u203202) (2002).","DOI":"10.1007\/3-540-45748-8_24"},{"key":"4453_CR9","doi-asserted-by":"crossref","unstructured":"Y. Fu, J. Chase, B. Chun, S. Schwab and A. Vahdat, SHARP: An Architecture for secure resource peering, In: Proc. of the 19th ACM Symp. on Operating Systems Principles (SOSP-19) (2003).","DOI":"10.1145\/945445.945459"},{"key":"4453_CR10","unstructured":"R. Gupta and A.K. Somani, CompuP2P: An architecture for sharing of compute power in peer-to-peer networks with selfish nodes, in: Second Workshop on the Economics of Peer-to-Peer Systems, Harvard University (2004)."},{"key":"4453_CR11","doi-asserted-by":"crossref","unstructured":"D. Hausheer, N.C. Liebau, A. Mauthe, R. Steinmetz and B. Stiller, Token-based accounting and distributed pricing to introduce market mechanisms in a peer-to-peer file sharing scenario, in: Third International Conference on Peer-to-Peer Computing (P2P\u203203) (2003).","DOI":"10.1109\/PTP.2003.1231523"},{"key":"4453_CR12","unstructured":"H. Junseok, The economics of dynamic bandwidth transaction service: toward pricing modeling, in: MSI Workshop on Modelling, University College London, (2001) pp. 18\u201319."},{"key":"4453_CR13","doi-asserted-by":"crossref","unstructured":"S. Kamvar, M.T. Schlosser and H. Gacia-Molina: The eigentrust algorithm for reputation management in P2P networks, in: Proc. of the 12th International World Wide Web Conference (2003).","DOI":"10.1145\/775152.775242"},{"key":"4453_CR14","volume-title":"Enforcing Cooperative Resource Sharing in Untrusted Peer-to-Peer Environment","author":"Z. Liang","year":"2004","unstructured":"Z. Liang and W. Shi, Enforcing cooperative resource sharing in untrusted peer-to-peer environment, Technical report MIST-TR-2004-014, Department of Computer Science, Wayne State University (2004)."},{"key":"4453_CR15","volume-title":"Analysis of Recommendations on Trust Inference in the Open Environment","author":"Z. Liang","year":"2005","unstructured":"Z. Liang and W. Shi, Analysis of recommendations on trust inference in the open environment, Technical report MIST-TR.-2005-002, Department of Computer Science, Wayne State University (2005)."},{"key":"4453_CR16","unstructured":"S. Marsh, Formalising trust as a computational concept, Ph.D. thesis, University of Stirling (1994)."},{"key":"4453_CR17","doi-asserted-by":"crossref","unstructured":"L. Mui, M. Mohtashemi and A. Halberstadt, A Computational model of trust and reputation, in: Proceedings of the 35th Hawaii International Conference on System Sciences (2002).","DOI":"10.1109\/HICSS.2002.994181"},{"key":"4453_CR18","volume-title":"A Case for Peer-to-Peer Web Server Sharing","author":"J. Ravi","year":"2003","unstructured":"J. Ravi, Z. Liang and W. Shi, A Case for peer-to-peer web server sharing, Technical Report MIST-TR.-2003-010, Department of Computer Science, Wayne State University (2003)."},{"key":"4453_CR19","doi-asserted-by":"crossref","unstructured":"Y. Wang and J. Vassileva, Trust and reputation model in peer-to-peer networks, in: Third International Conference on Peer-to-Peer Computing (P2P\u203203) (2003).","DOI":"10.1109\/PTP.2003.1231515"},{"key":"4453_CR20","doi-asserted-by":"crossref","unstructured":"B. Yang and H. Carcia-Molina, PPay: Micropayments for peer-to-peer systems, in: Proceedings of ACM CCS\u203203 (2003).","DOI":"10.1145\/948109.948150"},{"key":"4453_CR21","doi-asserted-by":"crossref","unstructured":"T. Zhao and V. Karamcheti, Enforcing resource sharing agreements among distributed server clusters, in: Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS) (2002).","DOI":"10.1109\/IPDPS.2002.1015497"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-005-4453-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-005-4453-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-005-4453-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,10]],"date-time":"2020-04-10T19:42:25Z","timestamp":1586547745000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-005-4453-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,10,24]]},"references-count":21,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2005,12]]}},"alternative-id":["4453"],"URL":"https:\/\/doi.org\/10.1007\/s11036-005-4453-5","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,10,24]]}}}