{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,10]],"date-time":"2023-06-10T22:40:18Z","timestamp":1686436818761},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T00:00:00Z","timestamp":1320105600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1007\/s11280-011-0148-y","type":"journal-article","created":{"date-parts":[[2011,11,2]],"date-time":"2011-11-02T16:44:05Z","timestamp":1320252245000},"page":"547-579","source":"Crossref","is-referenced-by-count":10,"title":["The study of trust vector based trust rating aggregation in service-oriented environments"],"prefix":"10.1007","volume":"15","author":[{"given":"Lei","family":"Li","sequence":"first","affiliation":[]},{"given":"Yan","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,11,1]]},"reference":[{"key":"148_CR1","doi-asserted-by":"crossref","unstructured":"Conner, W., Iyengar, A., Mikalsen, T.A., Rouvellou, I., Nahrstedt, K.: A trust management framework for service-oriented environments. In: WWW, pp. 891\u2013900 (2009)","DOI":"10.1145\/1526709.1526829"},{"key":"148_CR2","doi-asserted-by":"crossref","unstructured":"Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P., Violante, F.: A reputation-based approach for choosing reliable resources in peer-to-peer networks. In: ACM Conference on Computer and Communications Security (CCS 2002), pp. 207\u2013216 (2002)","DOI":"10.1145\/586110.586138"},{"issue":"3","key":"148_CR3","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.entcs.2005.09.036","volume":"157","author":"E Damiani","year":"2006","unstructured":"Damiani, E., di\u00a0Vimercati, S.D.C., Samarati, P., Viviani, M.: A wowa-based aggregation technique on trust values connected to metadata. Electr. Notes Theor. Comput. Sci. 157(3), 131\u2013142 (2006)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"148_CR4","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/BF01386390","volume":"1","author":"EW Dijkstra","year":"1959","unstructured":"Dijkstra, E.W.: A note on two problems in connexion with graphs. Numer. Math. 1, 269\u2013271 (1959)","journal-title":"Numer. Math."},{"key":"148_CR5","doi-asserted-by":"crossref","unstructured":"Griffiths, N.: Task delegation using experience-based multi-dimensional trust. In: AAMAS 2005, pp. 489\u2013496 (2005)","DOI":"10.1145\/1082473.1082548"},{"key":"148_CR6","unstructured":"Hines, W.W., Montgomery, D.C., Goldsman, D.M., Borror, C.M.: Probability and Statistics in Engineering. John Wiley & Sons, Inc (2003)"},{"issue":"2","key":"148_CR7","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10458-005-6825-4","volume":"13","author":"TD Huynh","year":"2006","unstructured":"Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. Auton. Agent Multi-Agent Syst. 13(2), 119\u2013154 (2006)","journal-title":"Auton. Agent Multi-Agent Syst."},{"key":"148_CR8","unstructured":"J\u00f8sang, A.: Subjective evidential reasoning. In: IPMU (2002)"},{"issue":"2","key":"148_CR9","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"key":"148_CR10","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: WWW 2003, pp. 640\u2013651 (2003)","DOI":"10.1145\/775240.775242"},{"key":"148_CR11","unstructured":"Knight, D.H., Chervany, N.L.: The meaning of trust. Tech. Rep. WP9604, University of Minnesota, Management Information Systems Research Center (1996)"},{"key":"148_CR12","doi-asserted-by":"crossref","unstructured":"Li, L., Wang, Y.: A trust vector approach to service-oriented applications. In: ICWS 2008, pp. 270\u2013277 (2008)","DOI":"10.1109\/ICWS.2008.80"},{"key":"148_CR13","doi-asserted-by":"crossref","unstructured":"Li, L., Wang, Y.: Subjective trust inference in composite services. In: AAAI 2010, pp. 1377\u20131384 (2010)","DOI":"10.1609\/aaai.v24i1.7504"},{"key":"148_CR14","doi-asserted-by":"crossref","unstructured":"Li, L., Wang, Y., Lim, E.P.: Trust-oriented composite service selection and discovery. In: ICSOC\/ServiceWave 2009, pp. 50\u201367 (2009)","DOI":"10.1007\/978-3-642-10383-4_4"},{"key":"148_CR15","doi-asserted-by":"crossref","unstructured":"Li, L., Wang, Y., Varadharajan, V.: Fuzzy regression based trust prediction in service-oriented applications. In: ATC 2009, pp. 221\u2013235 (2009)","DOI":"10.1007\/978-3-642-02704-8_17"},{"issue":"4","key":"148_CR16","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/s11280-011-0114-8","volume":"14","author":"M Li","year":"2011","unstructured":"Li, M., Sun, X., Wang, H., Zhang, Y., Zhang, J.: Privacy-aware access control with trust management in web service. World Wide Web 14(4), 407\u2013430 (2011)","journal-title":"World Wide Web"},{"issue":"1","key":"148_CR17","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s11280-008-0056-y","volume":"12","author":"Z Malik","year":"2009","unstructured":"Malik, Z., Bouguettaya, A.: Rater credibility assessment in web services interactions. World Wide Web 12(1), 3\u201325 (2009)","journal-title":"World Wide Web"},{"issue":"4","key":"148_CR18","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1007\/s00778-009-0138-1","volume":"18","author":"Z Malik","year":"2009","unstructured":"Malik, Z., Bouguettaya, A.: RATEWeb: Reputation assessment for trust establishment among web services. VLDB J. 18(4), 885\u2013911 (2009)","journal-title":"VLDB J."},{"key":"148_CR19","doi-asserted-by":"crossref","unstructured":"Marti, S., Garcia-Molina, H.: Limited reputation sharing in p2p systems. In: ACM EC 2004, pp. 91\u2013101 (2004)","DOI":"10.1145\/988772.988787"},{"issue":"2","key":"148_CR20","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1142\/S0218843008001816","volume":"17","author":"MP Papazoglou","year":"2008","unstructured":"Papazoglou, M.P., Traverso, P., Dustdar, S., Leymann, F.: Service-oriented computing: a research roadmap. Int. J. Cooperative Inf. Syst. 17(2), 223\u2013255 (2008)","journal-title":"Int. J. Cooperative Inf. Syst."},{"key":"148_CR21","unstructured":"Rao, S.: Applied Numerical Methods for Engineers and Scientists. Prentice Hall (2002)"},{"key":"148_CR22","doi-asserted-by":"crossref","unstructured":"Ray, I., Chakraborty, S.: A vector model of trust for developing trustworthy systems. In: 9th European Symposium on Research Computer Security, pp. 260\u2013275 (2004)","DOI":"10.1007\/978-3-540-30108-0_16"},{"key":"148_CR23","doi-asserted-by":"crossref","unstructured":"Sabater, J., Sierra, C.: REGRET: reputation in gregarious societies. In: Agents 2001, pp. 194\u2013195 (2001)","DOI":"10.1145\/375735.376110"},{"key":"148_CR24","doi-asserted-by":"crossref","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press (1976)","DOI":"10.1515\/9780691214696"},{"issue":"6","key":"148_CR25","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MIC.2005.136","volume":"9","author":"S Song","year":"2005","unstructured":"Song, S., Hwang, K., Zhou, R., Kwok, Y.K.: Trusted p2p transactions with fuzzy reputation aggregation. IEEE Internet Comput. 9(6), 24\u201334 (2005)","journal-title":"IEEE Internet Comput."},{"issue":"2","key":"148_CR26","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s10458-006-5952-x","volume":"12","author":"WTL Teacy","year":"2006","unstructured":"Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M.: Travos: Trust and reputation in the context of inaccurate information sources. Auton. Agent Multi-Agent Syst. 12(2), 183\u2013198 (2006)","journal-title":"Auton. Agent Multi-Agent Syst."},{"key":"148_CR27","doi-asserted-by":"crossref","unstructured":"Vu, L.H., Hauswirth, M., Aberer, K.: QoS-based service selection and ranking with trust and reputation management. In: CoopIS 2005, pp. 466\u2013483 (2005)","DOI":"10.1007\/11575771_30"},{"key":"148_CR28","unstructured":"Wang, Y., Li, L.: Two-dimensional trust rating aggregations in service-oriented applications. IEEE Trans. Services Comput. (2011, in press)"},{"key":"148_CR29","doi-asserted-by":"crossref","unstructured":"Wang, Y., Lim, E.P.: The evaluation of situational transaction trust in e-service environments. In: ICEBE 2008, pp. 265\u2013272 (2008)","DOI":"10.1109\/ICEBE.2008.12"},{"issue":"4","key":"148_CR30","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MIC.2008.84","volume":"12","author":"Y Wang","year":"2008","unstructured":"Wang, Y., Lin, K.J.: Reputation-oriented trustworthy computing in e-commerce environments. IEEE Internet Comput. 12(4), 55\u201359 (2008)","journal-title":"IEEE Internet Comput."},{"issue":"2","key":"148_CR31","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s11761-008-0035-2","volume":"3","author":"Y Wang","year":"2009","unstructured":"Wang, Y., Lin, K.J., Wong, D.S., Varadharajan, V.: Trust management towards service-oriented applications. SOCA 3(2), 129\u2013146 (2009)","journal-title":"SOCA"},{"key":"148_CR32","doi-asserted-by":"crossref","unstructured":"Wilson, R.A., Keil, F.C.: The MIT Encyclopedia of the Cognitive Sciences. The MIT Press (1999)","DOI":"10.7551\/mitpress\/4660.001.0001"},{"issue":"7","key":"148_CR33","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L Xiong","year":"2004","unstructured":"Xiong, L., Liu, L.: PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16(7), 843\u2013857 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"9","key":"148_CR34","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1080\/08839510050144868","volume":"14","author":"G Zacharia","year":"2000","unstructured":"Zacharia, G., Maes, P.: Trust management through reputation mechanisms. Appl. Artif. Intell. 14(9), 881\u2013907 (2000)","journal-title":"Appl. Artif. Intell."},{"key":"148_CR35","doi-asserted-by":"crossref","unstructured":"Zhao, H., Li, X.: Vectortrust: Trust vector aggregation scheme for trust management in peer-to-peer networks. In: 18th Internatonal Conference on Computer Communications and Networks, pp. 1\u20136 (2009)","DOI":"10.1109\/ICCCN.2009.5235290"},{"issue":"4","key":"148_CR36","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1109\/TPDS.2007.1021","volume":"18","author":"R Zhou","year":"2007","unstructured":"Zhou, R., Hwang, K.: Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans. Parallel Distrib. Syst. 18(4), 460\u2013473 (2007)","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-011-0148-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-011-0148-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-011-0148-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,10]],"date-time":"2023-06-10T22:10:10Z","timestamp":1686435010000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-011-0148-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11,1]]},"references-count":36,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2012,9]]}},"alternative-id":["148"],"URL":"https:\/\/doi.org\/10.1007\/s11280-011-0148-y","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,11,1]]}}}