{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:13:08Z","timestamp":1764331988292},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,2,1]],"date-time":"2012-02-01T00:00:00Z","timestamp":1328054400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Autom. Comput."],"published-print":{"date-parts":[[2012,2]]},"DOI":"10.1007\/s11633-012-0617-5","type":"journal-article","created":{"date-parts":[[2012,2,21]],"date-time":"2012-02-21T14:52:32Z","timestamp":1329835952000},"page":"63-71","source":"Crossref","is-referenced-by-count":7,"title":["METrust: A mutual evaluation-based trust model for P2P networks"],"prefix":"10.1007","volume":"9","author":[{"given":"Chun-Ling","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Xiao-Long","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Bing-Zhen","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,2,22]]},"reference":[{"issue":"2","key":"617_CR1","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MIC.2009.33","volume":"13","author":"M. Karakaya","year":"2009","unstructured":"M. Karakaya, I. Korpeoglu, O. Ulusoy, B. U. Ankara. Free riding in peer-to-peer networks. Internet Computing, vol. 13, no. 2, pp. 92\u201398, 2009.","journal-title":"Internet Computing"},{"issue":"2","key":"617_CR2","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/s11633-010-0180-x","volume":"7","author":"H. F. Deng","year":"2010","unstructured":"H. F. Deng, W. Deng, H. Li, H. J. Yang. Authentication and access control in RFID based logistics-customs clearance service platform. International Journal of Automation and Computing, vol. 7, no. 2, pp. 180\u2013189, 2010.","journal-title":"International Journal of Automation and Computing"},{"issue":"2","key":"617_CR3","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1007\/s11633-008-0202-0","volume":"5","author":"C. W. Chang","year":"2008","unstructured":"C. W. Chang, H. Pan, H. Y. Jia. A secure short message communication protocol. International Journal of Automation and Computing, vol. 5, no. 2, pp. 202\u2013207, 2008.","journal-title":"International Journal of Automation and Computing"},{"key":"617_CR4","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1145\/775152.775242","volume-title":"Proceedings of the 12th international World Wide Web conference","author":"S. D. Kamvar","year":"2003","unstructured":"S. D. Kamvar, M. T. Schlosser, H. Garcia-Molina. The Eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th international World Wide Web conference, ACM, Budapest, Hungary, pp. 640\u2013651, 2003."},{"issue":"4","key":"617_CR5","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1109\/TPDS.2007.1021","volume":"18","author":"R. F. Zhou","year":"2007","unstructured":"R. F. Zhou, K. Hwang. PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 4, pp. 460\u2013473, 2007.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"9","key":"617_CR6","doi-asserted-by":"crossref","first-page":"1282","DOI":"10.1109\/TKDE.2008.48","volume":"20","author":"R. F. Zhou","year":"2008","unstructured":"R. F. Zhou, K. Hwang, M. Cai. GossipTrust for fast reputation aggregation in peer-to-peer networks. IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 9, pp. 1282\u20131295, 2008.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"7","key":"617_CR7","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L. Xiong","year":"2004","unstructured":"L. Xiong, L. Liu. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 7, pp. 843\u2013857, 2004.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"617_CR8","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1145\/1060745.1060808","volume-title":"Proceedings of the 14th World Wide Web Conference","author":"M. Srivatsa","year":"2005","unstructured":"M. Srivatsa, L. Xiong, L. Liu. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In Proceedings of the 14th World Wide Web Conference, ACM, Chiba, Japan, pp. 422\u2013431, 2005."},{"issue":"10","key":"617_CR9","doi-asserted-by":"crossref","first-page":"2885","DOI":"10.3724\/SP.J.1001.2009.03554","volume":"20","author":"J. L. Hu","year":"2009","unstructured":"J. L. Hu, Q. Y. Wu, B. Zhou, J. H. Liu. Robust feedback credibility-based distributed P2P trust model. Journal of Software, vol. 20, no. 10, pp. 2885\u20132898, 2009.","journal-title":"Journal of Software"},{"issue":"2","key":"617_CR10","first-page":"120","volume":"31","author":"Z. G. Shi","year":"2010","unstructured":"Z. G. Shi, J. W. Liu, Z. L. Wang. Dynamic P2P trust model based on time-window feedback mechanism. Journal on Communications, vol. 31, no. 2, pp. 120\u2013129, 2010. (in Chinese)","journal-title":"Journal on Communications"},{"issue":"2","key":"617_CR11","doi-asserted-by":"crossref","first-page":"270","DOI":"10.3724\/SP.J.1016.2008.00270","volume":"31","author":"C. Q. Tian","year":"2008","unstructured":"C. Q. Tian, S.H. Zou, W. D. Wang, S. D. Cheng. A new trust model based on recommendation evidence for P2P networks. Chinese Journal of Computers, vol. 31, no. 2, pp. 270\u2013281, 2008. (in Chinese)","journal-title":"Chinese Journal of Computers"},{"key":"617_CR12","doi-asserted-by":"crossref","first-page":"99","DOI":"10.4028\/www.scientific.net\/AMM.20-23.99","volume":"20\u201323","author":"L. D. Huang","year":"2010","unstructured":"L. D. Huang, G. Xue, X. L. He, H. L. Zhuang. A trust model based on evidence theory for P2P systems. Applied Mechanics and Materials, vol. 20\u201323, pp. 99\u2013104, 2010.","journal-title":"Applied Mechanics and Materials"},{"issue":"5","key":"617_CR13","doi-asserted-by":"crossref","first-page":"994","DOI":"10.1016\/j.csi.2008.09.025","volume":"31","author":"J. Wang","year":"2009","unstructured":"J. Wang, H. J. Sun. A new evidential trust model for open communities. Computer Standards and Interfaces, vol. 31, no. 5, pp. 994\u20131001, 2009.","journal-title":"Computer Standards and Interfaces"},{"issue":"8","key":"617_CR14","doi-asserted-by":"crossref","first-page":"1317","DOI":"10.1016\/j.future.2009.05.001","volume":"26","author":"Y. F. Wang","year":"2010","unstructured":"Y. F. Wang, A. Nakao. Poisonedwater: An improved approach for accurate reputation ranking in P2P networks. Future Generation Computer Systems, vol. 26, no. 8, pp. 1317\u20131326, 2010.","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"617_CR15","doi-asserted-by":"crossref","first-page":"345","DOI":"10.3724\/SP.J.1016..2010.00345","volume":"33","author":"C. Q. Tian","year":"2010","unstructured":"C. Q. Tian, J. H. Jiang, Z. G. Hu, F. Li. A novel superpeer based trust model for peer-to-peer networks. Chinese Journal of Computers, vol. 33, no. 2, pp. 345\u2013355, 2010. (in Chinese)","journal-title":"Chinese Journal of Computers"},{"issue":"12","key":"617_CR16","doi-asserted-by":"crossref","first-page":"1400","DOI":"10.1016\/j.comcom.2009.03.002","volume":"32","author":"N. Fedotova","year":"2009","unstructured":"N. Fedotova, L. Veltri. Reputation management algorithms for DHT-based peer-to-peer environment. Computer Communications, vol. 32, no. 12, pp. 1400\u20131409, 2009.","journal-title":"Computer Communications"},{"key":"617_CR17","doi-asserted-by":"crossref","unstructured":"C. Selvaraj, S. Anand. A role based trust model for peer to peer systems. In Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, pp. 50\u201354, 2010.","DOI":"10.1142\/9789814289771_0010"},{"key":"617_CR18","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/SKG.2007.140","volume-title":"Proceedings of the 3rd International Conference on Semantics, Knowledge and Grid","author":"C. Y. Niu","year":"2007","unstructured":"C. Y. Niu, J. Wang, R. M. Shen. A trust-enhanced topology adaptation protocol for unstructured P2P overlays. In Proceedings of the 3rd International Conference on Semantics, Knowledge and Grid, ACM, Xi\u2019an, PRC, pp. 200\u2013205, 2007."},{"key":"617_CR19","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1109\/SNPD.2007.478","volume-title":"Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel\/Distributed Computing","author":"Y. M. Lliu","year":"2007","unstructured":"Y. M. Lliu, S. B. Yang, L. T. Guo, W. M. Chen, L. M. Guo. A distributed trust-based reputation model in P2P system. In Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel\/Distributed Computing, IEEE, Qingdao, China, vol. 1, pp. 294\u2013299, 2007."},{"issue":"4","key":"617_CR20","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1007\/s11633-009-0406-y","volume":"6","author":"S. S. S. Sivatha","year":"2009","unstructured":"S. S. S. Sivatha, S. Geetha, M. Marikannan, A. Kannan. A neuro-genetic based short-term forecasting framework for network intrusion prediction system. International Journal of Automation and Computing, vol. 6, no. 4, pp. 406\u2013414, 2009.","journal-title":"International Journal of Automation and Computing"}],"container-title":["International Journal of Automation and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-012-0617-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11633-012-0617-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-012-0617-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T04:51:12Z","timestamp":1640839872000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11633-012-0617-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,2]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,2]]}},"alternative-id":["617"],"URL":"https:\/\/doi.org\/10.1007\/s11633-012-0617-5","relation":{},"ISSN":["1476-8186","1751-8520"],"issn-type":[{"value":"1476-8186","type":"print"},{"value":"1751-8520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,2]]}}}