{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T03:50:18Z","timestamp":1701402618559},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2010,1,15]],"date-time":"2010-01-15T00:00:00Z","timestamp":1263513600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1007\/s11235-009-9259-5","type":"journal-article","created":{"date-parts":[[2010,1,14]],"date-time":"2010-01-14T21:13:44Z","timestamp":1263503624000},"page":"191-203","source":"Crossref","is-referenced-by-count":19,"title":["Reputation and trust management in heterogeneous peer-to-peer networks"],"prefix":"10.1007","volume":"44","author":[{"given":"Xiaowen","family":"Chu","sequence":"first","affiliation":[]},{"given":"Xiaowei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kaiyong","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jiangchuan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,1,15]]},"reference":[{"key":"9259_CR1","doi-asserted-by":"crossref","unstructured":"Huang, Y., Fu, T. Z., Chiu, Dr., Lui, J. C., & Huang, C. (2008). Challenges, design and analysis of a large-scale P2P-vod system. In Proceedings of the ACM SIGCOMM 2008 conference on data communication, Seattle, WA, USA, August 17\u201322, 2008 (pp. 375\u2013388).","DOI":"10.1145\/1402958.1403001"},{"key":"9259_CR2","unstructured":"Meeker, M., & Joseph, D. (2006). State of the Internet\u2014Web 2.0. In Web 2.0 conference, San Francisco, USA."},{"issue":"2","key":"9259_CR3","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618\u2013644.","journal-title":"Decision Support Systems"},{"key":"9259_CR4","doi-asserted-by":"crossref","unstructured":"Kamvar, S. D., Schlosser, M. T., & Garcia-Molina, H. (2003). The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the twelfth international world wide web conference, Budapest, Hungary.","DOI":"10.1145\/775152.775242"},{"key":"9259_CR5","doi-asserted-by":"crossref","unstructured":"Cornelli, F., Damiani, E., & De Capitani, S. (2002). Choosing reputable servents in a P2P network. In Proceedings of the 11th world wide web conference, Hawaii, USA.","DOI":"10.1145\/511446.511496"},{"key":"9259_CR6","doi-asserted-by":"crossref","unstructured":"Walsh, K., & Sirer, E. G. (2005). Fighting peer-to-peer SPAM and decoys with object reputation. In Applications, technologies, architectures, and protocols for computer communication (pp. 138\u2013143).","DOI":"10.1145\/1080192.1080204"},{"key":"9259_CR7","doi-asserted-by":"crossref","unstructured":"Lee, S., & Sherwood, R. (2003). Cooperative peer groups in NICE. In Proceedings of IEEE Infocom 2003, San Francisco, USA.","DOI":"10.1109\/INFCOM.2003.1208963"},{"key":"9259_CR8","unstructured":"Xiong, L., & Liu, L. (2003). A reputation-based trust model for peer-to-peer ecommerce communities. In IEEE international conference on E-commerce (CEC\u201903), Newport Beach, CA, USA."},{"key":"9259_CR9","volume-title":"LIP: A lifetime and popularity based ranking approach to filter out fake files in P2P file sharing systems","author":"Q. Feng","year":"2006","unstructured":"Feng, Q., & Dai, Y. (2006). LIP: A lifetime and popularity based ranking approach to filter out fake files in P2P file sharing systems. Beijing: Peking University."},{"key":"9259_CR10","doi-asserted-by":"crossref","unstructured":"Aberer, K., & Despotovic, Z. (2001). Managing trust in a peer-2-peer information system. In The 10th international conference on information and knowledge management (CIKM), Atlanta, USA.","DOI":"10.1145\/502585.502638"},{"issue":"4","key":"9259_CR11","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1109\/TPDS.2007.1021","volume":"18","author":"R. Zhou","year":"2007","unstructured":"Zhou, R., & Hwang, K. (2007). PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems, 18(4), 460\u2013473.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"9259_CR12","unstructured":"Adar, E. (2000). Free riding on Gnutella. http:\/\/www.hpl.hp.com\/research\/idl\/papers\/gnutella\/gnutella.pdf . Accessed 28 Jun 2008."},{"key":"9259_CR13","first-page":"31","volume":"3","author":"Q.-Y. Feng","year":"2007","unstructured":"Feng, Q.-Y., & Dai, Y.-F. (2007). P2P network trust mechanism review. Communication of CCF, 3, 31\u201340.","journal-title":"Communication of CCF"},{"key":"9259_CR14","doi-asserted-by":"crossref","unstructured":"Zhou, L., Zhang, L., McSherry, F., Immorlica, N., Costa, M., & Chien, S. (2005). A first look at peer-to-peer worms: Threats and defenses. In Proceedings of 4th international workshop on peer-to-peer systems, IPTPS 2005, Ithaca, NY, USA.","DOI":"10.1007\/11558989_3"},{"key":"9259_CR15","doi-asserted-by":"crossref","unstructured":"Christin, N., Weigend, A. S., & Chuang, J. (2005). Content availability, pollution and poisoning in file sharing peer-to-peer networks. In Proceedings of the 6th ACM conference on electronic commerce (EC\u201905), Vancouver, Canada (pp. 68\u201377).","DOI":"10.1145\/1064009.1064017"},{"key":"9259_CR16","doi-asserted-by":"crossref","unstructured":"Liang, J., Naoumov, N., & Ross, K. W. (2006). The index poisoning attack in P2P file-sharing systems. In Proceedings of IEEE Infocom 2006, Barcelona, Spain.","DOI":"10.1109\/INFOCOM.2006.232"},{"key":"9259_CR17","first-page":"65","volume-title":"Game-theoretic models of bargaining","author":"R. Wilson","year":"1985","unstructured":"Wilson, R. (1985). Reputation in games and markets. In A. Roth (Ed.), Game-theoretic models of bargaining (pp. 65\u201384). New York: Cambridge University Press."},{"key":"9259_CR18","doi-asserted-by":"crossref","unstructured":"Khambatti, M., Dasgupta, P., & Ryu, K. D. (2004). A role-based trust model for peer-to-peer communities and dynamic coalitions. In Information assurance workshop, 2004. Proceedings. Second IEEE international (pp. 141\u2013154).","DOI":"10.1109\/IWIA.2004.1288044"},{"issue":"3","key":"9259_CR19","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L. Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., & Pease, M. (1982). The byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3), 382\u2013401.","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"9259_CR20","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1145\/322186.322188","volume":"27","author":"M. Pease","year":"1980","unstructured":"Pease, M., Shostak, R., & Lamport, L. (1980). Reaching agreement in the presence of faults. Journal of the Association for Computing Machinery, 27, 228\u2013234.","journal-title":"Journal of the Association for Computing Machinery"},{"key":"9259_CR21","doi-asserted-by":"crossref","unstructured":"Wang, Y., & Varadharajan., V. (2005). Trust2: developing trust in peer-to-peer environments. In 2005 IEEE international conference on services computing (SCC\u201905) (Vol. 1, pp. 24\u201334).","DOI":"10.1109\/SCC.2005.104"},{"issue":"4","key":"9259_CR22","doi-asserted-by":"crossref","first-page":"946","DOI":"10.3724\/SP.J.1001.2008.00946","volume":"19","author":"D. Peng","year":"2008","unstructured":"Peng, D., Lin, C., & Liu, W. (2008). A distributed trust mechanism directly evaluating reputation of nodes. Journal of Software, 19(4), 946\u2013955.","journal-title":"Journal of Software"},{"key":"9259_CR23","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1038\/31225","volume":"393","author":"A. Nowak","year":"1998","unstructured":"Nowak, A., & Sigmund, K. (1998). Evolution of indirect reciprocity by image scoring. Nature, 393, 573\u2013577.","journal-title":"Nature"},{"key":"9259_CR24","doi-asserted-by":"crossref","unstructured":"Ge, Z., Figueiredo, D. R., Jaiswal, S., Kurose, J., & Towsley, D. (2003). Modeling peer-peer file sharing system. In Proceedings of the IEEE Infocom 2003 (pp. 2188\u20132198).","DOI":"10.1109\/INFCOM.2003.1209239"},{"issue":"3","key":"9259_CR25","first-page":"915","volume":"25","author":"W. Li","year":"2008","unstructured":"Li, W., Xie, D., & Wu, Y. (2008). History and recommendation-based trust model in P2P environment. Application Research of Computers, 25(3), 915\u2013919.","journal-title":"Application Research of Computers"},{"issue":"04","key":"9259_CR26","first-page":"571","volume":"15","author":"W. Dou","year":"2004","unstructured":"Dou, W., Wand, H., Jia, Y., & Zou, P. (2004). A recommendation-based peer-to-peer trust model. Journal of Software, 15(04), 571\u2013583.","journal-title":"Journal of Software"},{"key":"9259_CR27","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1145\/988672.988727","volume-title":"Proceedings of the 13th international conference on world wide web","author":"R. Guha","year":"2004","unstructured":"Guha, R., Kumar, R., Raghavan, P., & Tomkin, A. (2004). Propagation of trust and distrust. In Proceedings of the 13th international conference on world wide web (pp. 403\u2013412). New York: ACM Press."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-009-9259-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-009-9259-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-009-9259-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:50:08Z","timestamp":1559386208000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-009-9259-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,15]]},"references-count":27,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2010,8]]}},"alternative-id":["9259"],"URL":"https:\/\/doi.org\/10.1007\/s11235-009-9259-5","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1,15]]}}}