{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T22:23:43Z","timestamp":1771626223265,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2009,1,15]],"date-time":"2009-01-15T00:00:00Z","timestamp":1231977600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SOCA"],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1007\/s11761-008-0035-2","type":"journal-article","created":{"date-parts":[[2009,1,14]],"date-time":"2009-01-14T09:56:26Z","timestamp":1231926986000},"page":"129-146","source":"Crossref","is-referenced-by-count":28,"title":["Trust management towards service-oriented applications"],"prefix":"10.1007","volume":"3","author":[{"given":"Yan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Kwei-Jay","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,1,15]]},"reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: HICSS, pp 9\u201317","DOI":"10.1109\/HICSS.2000.926814"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Cheng A, Friedman E (2005) Sybilproof reputation mechanisms. In: SIGCOMM05 Workshops","DOI":"10.1145\/1080192.1080202"},{"key":"35_CR3","unstructured":"Damiani E, di Vimercati SDC, Paraboschi S, Samarati P, Violante F (2002) A reputation based approach for choosing reliable resources in peertopeer networks. In: Proceedings of ACM CCS\u201902. Washington DC, USA, pp 207\u2013216, November 2002"},{"key":"35_CR4","unstructured":"eBay. http:\/\/www.eBay.com\/"},{"key":"35_CR5","unstructured":"GNutella. http:\/\/www.gnutella.com\/"},{"key":"35_CR6","unstructured":"Griffiths N (2005) Task delegation using experience-based multidimensional trust. In: Proceedings of the 4th International Joint Conference on Autonomous Agents in Multi-Agent Systems (AAMAS-05), pp 489\u2013496"},{"issue":"4","key":"35_CR7","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1016\/j.eswa.2006.01.017","volume":"31","author":"N Griffiths","year":"2006","unstructured":"Griffiths N (2006) Enhancing peer-to-peer collaboration using trust. Expert Syst Appl 31(4): 849\u2013858","journal-title":"Expert Syst Appl"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Griffiths N, Chao K-M, Younas M (2006) Fuzzy trust for peer-to-peer systems. In: ICDCS Workshops, p 73","DOI":"10.1109\/ICDCSW.2006.57"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Guha RV, Kumar R, Raghavan P, Tomkins A (2004) Propagation of trust and distrust. In: WWW, pp 403\u2013412","DOI":"10.1145\/988672.988727"},{"issue":"2","key":"35_CR10","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10458-005-6825-4","volume":"13","author":"T Huynh","year":"2006","unstructured":"Huynh T, Jennings N, Shadbolt N (2006) An integrated trust and reputation model for open multi-agent systems. Auton Agents Multi Agent Syst 13(2): 119\u2013154","journal-title":"Auton Agents Multi Agent Syst"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International WWW Conference. Budapest, Hungary, May 2003","DOI":"10.1145\/775152.775242"},{"key":"35_CR12","unstructured":"Lin K-J, Lu H, Yu T, en Tai C (2005) A reputation and trust management broker framework for web applications. In: Proceedings of The 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE\u201905), pp 262\u2013269, March 2005"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Marti S, Garcia-Molina H (2004) Limited reputation sharing in P2P systems. In: Proceedings of ACM EC\u201904, New York, USA, pp 91\u2013101, May 2004","DOI":"10.1145\/988772.988787"},{"key":"35_CR14","unstructured":"Napster. http:\/\/www.napster.com\/"},{"key":"35_CR15","doi-asserted-by":"crossref","unstructured":"Ray I, Chakraborty S (2004) A vector model of trust for developing trustworthy systems. In: Proceedings of ESORICS 2004. Lecture notes in Computer Science, vol 3193. Springer, Berlin, pp 260\u2013275","DOI":"10.1007\/978-3-540-30108-0_16"},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Sabater J, Sierra C (2002) REGRET: A reputation model for gregarious societies. In: Proceedings of the First International Joint Conference on Autonomous Agents in Multi-Agent Systems (AAMAS-01), pp 475\u2013482","DOI":"10.1145\/544741.544854"},{"issue":"6","key":"35_CR17","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MIC.2005.136","volume":"9","author":"S Song","year":"2005","unstructured":"Song S, Hwang K, Zhou R, Kwok Y-K (2005) Trusted p2p transactions with fuzzy reputation aggregation. IEEE Internet Comput 9(6): 24\u201334","journal-title":"IEEE Internet Comput"},{"key":"35_CR18","unstructured":"Steiner JG, Neuman C, Schiller JI (1988) Kerberos: an authentication service for open network systems. In: Proceedings of the USENIX Winter 1988 Technical Conference"},{"key":"35_CR19","doi-asserted-by":"crossref","unstructured":"Vu L-H, Hauswirth M, Aberer K (2005) Qos-based service selection and ranking with trust and reputation management. In: Proceedings of 13th International Conference on Cooperative Information Systems (CoopIS 2005), Oct 31\u2013Nov 4 2005","DOI":"10.1007\/11575771_30"},{"key":"35_CR20","doi-asserted-by":"crossref","unstructured":"Wang Y, Lin K-J, Wong DS, Varadharajan V (2007) The design of a rule-based and event-driven trust management framework. In: The IEEE International Conference on e-Business Engineering (ICEBE 2007), Hong Kong, pp 97\u2013104, October 2007","DOI":"10.1109\/ICEBE.2007.28"},{"key":"35_CR21","doi-asserted-by":"crossref","unstructured":"Wang Y, Varadharajan V (2004) Interaction trust evaluation in decentralized environments. In: Bauknecht K, Bichler M, Pr\u00f6ll B (eds) Proceedings of 5th International Conference on Electronic Commerce and Web Technologies (EC-Web\u201904). Lecture notes in Computer Science, vol 3182. Springer, Zaragoza, Spain, pp 144\u2013153","DOI":"10.1007\/978-3-540-30077-9_15"},{"key":"35_CR22","doi-asserted-by":"crossref","unstructured":"Wang Y, Varadharajan V (2005) Trust2: developing trust in peer-to-peer environments. In: Proceedings of 2005 IEEE International Conference on Services Computing (SCC 2005). Orlando, Florida, USA, pp 24\u201331, July 2005","DOI":"10.1109\/SCC.2005.104"},{"key":"35_CR23","doi-asserted-by":"crossref","unstructured":"Wang Y, Varadharajan V (2005) Two-phase peer evaluation in P2P e-commerce environments. In: Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Serivce (EEE-05). Hong Kong, China, pp 654\u2013657, March 29\u2013April 1 (2005)","DOI":"10.1109\/EEE.2005.140"},{"issue":"7","key":"35_CR24","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L Xiong","year":"2004","unstructured":"Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7): 843\u2013857","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"35_CR25","unstructured":"Yu B, Singh MP, Sycara K (2004) Developing trust in large-scale peer-to-peer systems. In: Proceedings of 2004 IEEE First Symposium on Multi-Agent Security and Survivability, pp 1\u201310, August 2004"},{"key":"35_CR26","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1080\/08839510050144868","volume":"9","author":"G Zacharia","year":"2000","unstructured":"Zacharia G, Maes P (2000) Trust management through reputation mechanisms. Appl Artif Intell J 9: 881\u2013908","journal-title":"Appl Artif Intell J"},{"key":"35_CR27","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"L Zadeh","year":"1965","unstructured":"Zadeh L (1965) Fuzzy sets. Inform Control 8: 338\u2013353","journal-title":"Inform Control"}],"container-title":["Service Oriented Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-008-0035-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11761-008-0035-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11761-008-0035-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T17:46:03Z","timestamp":1559411163000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11761-008-0035-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1,15]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["35"],"URL":"https:\/\/doi.org\/10.1007\/s11761-008-0035-2","relation":{},"ISSN":["1863-2386","1863-2394"],"issn-type":[{"value":"1863-2386","type":"print"},{"value":"1863-2394","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,1,15]]}}}