{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:17:04Z","timestamp":1777371424263,"version":"3.51.4"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,3,11]],"date-time":"2011-03-11T00:00:00Z","timestamp":1299801600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11227-011-0576-6","type":"journal-article","created":{"date-parts":[[2011,3,10]],"date-time":"2011-03-10T15:25:35Z","timestamp":1299770735000},"page":"805-829","source":"Crossref","is-referenced-by-count":27,"title":["VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks"],"prefix":"10.1007","volume":"64","author":[{"given":"Huanyu","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Xiaolin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,3,11]]},"reference":[{"key":"576_CR1","unstructured":"Advogato\u2019s trust metric (white paper). http:\/\/www.advogato.org\/trustmetric.html"},{"key":"576_CR2","first-page":"65","volume-title":"3rd international workshop on adversarial information retrieval on the web","author":"D Donato","year":"2007","unstructured":"Donato D, Castillo C, Paniccia M, Cortese G, Selis M, Leonardi S (2007) New metrics for reputation management in p2p networks. In: 3rd international workshop on adversarial information retrieval on the web, Banff, Alberta, Canada, May 8, 2007, pp 65\u201372"},{"key":"576_CR3","unstructured":"eBay. http:\/\/www.ebay.com"},{"key":"576_CR4","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1109\/ICDCS.Workshops.2008.37","volume-title":"28th international conference on distributed computing systems workshops. ICDCS \u201908","author":"Q Feng","year":"2008","unstructured":"Feng Q, Yang Y, Sun YL, Dai Y (2008) Modeling attack behaviors in rating systems. In: 28th international conference on distributed computing systems workshops. ICDCS \u201908, Beijing, China, June 17\u201320, 2008, pp 241\u2013248"},{"key":"576_CR5","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1145\/775152.775242","volume-title":"Proceedings of the 12th international conference on world wide web (WWW2003)","author":"SD Kamvar","year":"2003","unstructured":"Kamvar SD, Schlosser MT, Molina H-G (2003) The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th international conference on world wide web (WWW2003), Budapest, Hungary, May 20\u201324, 2003, pp 640\u2013651"},{"key":"576_CR6","first-page":"1272","volume-title":"INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications societies","author":"S Lee","year":"2003","unstructured":"Lee S, Sherwood R, Bhattacharjee B (2003) Cooperative peer groups in nice. In: INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications societies. March\u2013April 2003, vol 2. IEEE Press, New York, pp 1272\u20131282"},{"issue":"7","key":"576_CR7","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"X. Li","year":"2004","unstructured":"Li X., Ling L. (2004) Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843\u2013857","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"576_CR8","volume-title":"Proceedings of the 38th annual Hawaii international conference on system sciences. HICSS \u201905","author":"Z Liang","year":"2005","unstructured":"Liang Z, Shi W (2005) Pet: a personalized trust model with reputation and risk evaluation for p2p resource sharing. In: Proceedings of the 38th annual Hawaii international conference on system sciences. HICSS \u201905, Jan 2005"},{"issue":"2","key":"576_CR9","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.peva.2007.04.001","volume":"65","author":"Z. Liang","year":"2008","unstructured":"Liang Z., Shi W. (2008) Analysis of ratings on trust inference in open environments. Perform Eval 65(2):99\u2013128","journal-title":"Perform Eval"},{"issue":"4","key":"576_CR10","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.comnet.2005.07.011","volume":"50","author":"S Marti","year":"2006","unstructured":"Marti S, Garcia-Molina H (2006) Taxonomy of trust: categorizing p2p reputation systems. Comput Netw 50(4):472\u2013484","journal-title":"Comput Netw"},{"key":"576_CR11","first-page":"208","volume-title":"15th IFIP\/IEEE international workshop on distributed systems: operations and management (DSOM\u201904)","author":"L Mekouar","year":"2005","unstructured":"Mekouar L, Iraqi Y, Boutaba R (2005) A reputation management and selection advisor schemes for peer-to-peer systems. In: 15th IFIP\/IEEE international workshop on distributed systems: operations and management (DSOM\u201904), Davis, CA, Nov 15, 2004, pp 208\u2013219"},{"key":"576_CR12","first-page":"1","volume-title":"NSDI\u201908: Proceedings of the 5th USENIX symposium on networked systems design and implementation","author":"M Piatek","year":"2008","unstructured":"Piatek M, Isdal T, Krishnamurthy A, Anderson T (2008) One hop reputations for peer to peer file sharing workloads. In: NSDI\u201908: Proceedings of the 5th USENIX symposium on networked systems design and implementation, Berkeley, CA, USA, 2008, pp 1\u201314"},{"issue":"12","key":"576_CR13","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P Resnick","year":"2000","unstructured":"Resnick P, Zeckhauser R, Friedman E, Kuwabara K (2000) Reputation systems. Commun ACM 43(12):45\u201348","journal-title":"Commun ACM"},{"key":"576_CR14","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/ARES.2007.123","volume-title":"ARES \u201907: proceedings of the second international conference on availability, reliability and security","author":"S Ruohomaa","year":"2007","unstructured":"Ruohomaa S, Kutvonen L, Koutrouli E (2007) Reputation management survey. In: ARES \u201907: proceedings of the second international conference on availability, reliability and security, Washington, DC, USA, 2007. IEEE Comput. Soc., Los Alamitos, pp 103\u2013111"},{"issue":"3","key":"576_CR15","first-page":"235","volume":"6","author":"AA Selcuk","year":"2008","unstructured":"Selcuk AA, Uzun E, Pariente MR (2008) A reputation-based trust management system for p2p networks. Int J Netw Secur 6(3):235\u2013245","journal-title":"Int J Netw Secur"},{"issue":"6","key":"576_CR16","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MIC.2005.136","volume":"9","author":"S Song","year":"2005","unstructured":"Song S, Hwang K, Zhou R, Kwok Y-K (2005) Trusted p2p transactions with fuzzy reputation aggregation. IEEE Internet Comput 9(6):24\u201334","journal-title":"IEEE Internet Comput"},{"key":"576_CR17","unstructured":"Microsoft TechNet. \u201csplit horizon\u201d and \u201csplit horizon with Poisson reverse\u201d. Convergence in RIP Internetworks"},{"key":"576_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/INFOCOM.2006.154","volume-title":"Proceedings of INFOCOM 2006. 25th IEEE international conference on computer communications","author":"YL Sun","year":"2006","unstructured":"Sun YL, Han Z, Yu W, Liu KJR (2006) A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In: Proceedings of INFOCOM 2006. 25th IEEE international conference on computer communications, Barcelona, April 2006, pp 1\u201313"},{"key":"576_CR19","first-page":"1","volume-title":"NSDI\u201906: proceedings of the 3rd conference on 3rd symposium on networked systems design","author":"K Walsh","year":"2006","unstructured":"Walsh K, Sirer EG (2006) Experience with an object reputation system for peer-to-peer filesharing. In: NSDI\u201906: proceedings of the 3rd conference on 3rd symposium on networked systems design, Berkeley, CA, USA, 2006, p 1"},{"key":"576_CR20","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/ICDCSW.2007.16","volume-title":"27th International conference on distributed computing systems workshops. ICDCSW \u201907","author":"Y Wang","year":"2007","unstructured":"Wang Y, Vassileva J (2007) A review on trust and reputation for web service selection. In: 27th International conference on distributed computing systems workshops. ICDCSW \u201907, Los Alamitos, CA, USA, June 25\u201329, 2007, p 25"},{"key":"576_CR21","unstructured":"Wilensky U (1999) Netlogo"},{"key":"576_CR22","volume-title":"Proceedings of IFIPTM-joint iTrust and PST conferences on privacy, trust management and security","author":"D Yao","year":"2007","unstructured":"Yao D, Tamassia R, Proctor S (2007) Private distributed scalar product protocol with application to privacy-preserving computation of trust. In: Proceedings of IFIPTM-joint iTrust and PST conferences on privacy, trust management and security, Moncton, New Brunswick, Canada, Jul 2007"},{"key":"576_CR23","first-page":"154","volume-title":"Proceedings of fourth international workshop on cooperative information agents","author":"B Yu","year":"2000","unstructured":"Yu B, Singh MP (2000) A social mechanism of reputation management in electronic communities. In: Proceedings of fourth international workshop on cooperative information agents, pp 154\u2013165"},{"key":"576_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/MASSUR.2004.1368412","volume-title":"IEEE first symposium on multi-agent security and survivability","author":"B Yu","year":"2004","unstructured":"Yu B, Singh MP, Sycara K (2004) Developing trust in large-scale peer-to-peer systems. In: IEEE first symposium on multi-agent security and survivability, Aug 2004, pp 1\u201310"},{"key":"576_CR25","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1109\/ICDCS.Workshops.2008.106","volume-title":"28th international conference on distributed computing systems workshops. ICDCS \u201908","author":"Q Zhang","year":"2008","unstructured":"Zhang Q, Yu T (2008) On the modeling of honest players in reputation systems. In: 28th international conference on distributed computing systems workshops. ICDCS \u201908, Beijing, China, June 17\u201320, 2008, pp 249\u2013254"},{"key":"576_CR26","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1109\/ICDCS.Workshops.2008.96","volume-title":"28th international conference on distributed computing systems workshops. ICDCS \u201908","author":"H Zhao","year":"2008","unstructured":"Zhao H, Li X (2008) H-trust: a robust and lightweight group reputation system for peer-to-peer desktop grid. In: 28th international conference on distributed computing systems workshops. ICDCS \u201908, Beijing, China, June 17\u201320, 2008, pp 235\u2013240"},{"issue":"5","key":"576_CR27","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1007\/s11390-009-9275-7","volume":"24","author":"H Zhao","year":"2009","unstructured":"Zhao H, Li X (2009) H-trust: a robust and lightweight group reputation system for peer-to-peer desktop grid. J Comput Sci Technol 24(5):833\u2013843","journal-title":"J Comput Sci Technol"},{"key":"576_CR28","volume-title":"The 18th IEEE international conference on computer communications and networks (ICCCN 2009)","author":"H Zhao","year":"2009","unstructured":"Zhao H, Li X (2009) VectorTrust: Trust vector aggregation scheme for trust management in peer-to-peer networks. In: The 18th IEEE international conference on computer communications and networks (ICCCN 2009), San Francisco, CA, USA, Aug 2\u20136, 2009"},{"issue":"4","key":"576_CR29","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1109\/TPDS.2007.1021","volume":"18","author":"R Zhou","year":"2007","unstructured":"Zhou R, Hwang K (2007) Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18(4):460\u2013473","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"9","key":"576_CR30","doi-asserted-by":"crossref","first-page":"1282","DOI":"10.1109\/TKDE.2008.48","volume":"20","author":"R Zhou","year":"2008","unstructured":"Zhou R, Hwang K, Cai M (2008) Gossiptrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans Knowl Data Eng 20(9):1282\u20131295","journal-title":"IEEE Trans Knowl Data Eng"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0576-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-011-0576-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0576-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,20]],"date-time":"2021-11-20T06:24:26Z","timestamp":1637389466000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-011-0576-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,11]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["576"],"URL":"https:\/\/doi.org\/10.1007\/s11227-011-0576-6","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3,11]]}}}