{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T06:05:02Z","timestamp":1769925902590,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T00:00:00Z","timestamp":1291161600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1007\/s12083-010-0096-9","type":"journal-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T11:59:40Z","timestamp":1291118380000},"page":"376-390","source":"Crossref","is-referenced-by-count":12,"title":["Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks"],"prefix":"10.1007","volume":"4","author":[{"given":"Huaiqing","family":"Lin","sequence":"first","affiliation":[]},{"given":"Zhitang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qingfeng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,12,1]]},"reference":[{"key":"96_CR1","unstructured":"Milojicic DS, Kalogeraki V, Lukose R, Nagaraja K, Pruyne J, Richard B, Rollins S, Xu ZC (2002) Peer-to-Peer Computing. HP Laboratories Palo Alto HPL-2002-57"},{"key":"96_CR2","unstructured":"Altman JE (2003) PKI Security for JXTA overlay networks. Sun Microsystem Palo Alto TR-I2-03-06"},{"key":"96_CR3","doi-asserted-by":"crossref","unstructured":"Khambatti M, Dasgupta P, Ryu KD (2004) A role-based trust model for peer-to-peer communities and dynamic coalitions. In: Proceedings of the Second IEEE International Information Assurance Workshop, Charlotte, North Carolina, pp 141\u2013154","DOI":"10.1109\/IWIA.2004.1288044"},{"key":"96_CR4","unstructured":"Li NH, Mitchell JC, Winsborough WH (2002) Design of a role-based trust management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, pp 114\u2013130"},{"key":"96_CR5","unstructured":"Winsborough WH, Seamons KE, Jones VE (2000) Automated trust negotiation. In: Proceedings of DARPA Information Survivability Conference and Exposition, Hilton Head, South Carolina, pp 88\u2013102"},{"key":"96_CR6","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/S0278-0984(02)11030-3","volume":"11","author":"P Resnick","year":"2002","unstructured":"Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: empirical analysis of ebay\u2019s reputation system. Adv Appl Microecon 11:127\u2013157","journal-title":"Adv Appl Microecon"},{"key":"96_CR7","unstructured":"Kamvar SD, Schlosser MT, Hector Garcia-Molina (2003) EigenRep: reputation management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web, vol. 1, pp 123~134"},{"issue":"4","key":"96_CR8","first-page":"571","volume":"15","author":"W Dou","year":"2004","unstructured":"Dou W, Wang HM, Yan JIA, Peng ZOU (2004) A recommendation-based peer-to-peer trust model. Journal of Software 15(4):571\u2013583","journal-title":"Journal of Software"},{"issue":"7","key":"96_CR9","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L Xiong","year":"2004","unstructured":"Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843\u2013857","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"96_CR10","doi-asserted-by":"crossref","unstructured":"Wang Y, Vassileva J (2003) Bayesian network-based trust model. In: Proceedings of IEEE\/WIC International Conference on Web Intelligence, Halifax, Canada, pp 372\u2013378","DOI":"10.1109\/WI.2003.1241218"},{"key":"96_CR11","doi-asserted-by":"crossref","unstructured":"Wang Y, Vassileva J (2003) Trust and reputation model in peer-to-peer networks. In: Proceedings of the Third IEEE International Conference on Peer-to-Peer Computing, Link\u00f6ping, Sweden, pp 150\u2013158","DOI":"10.1109\/PTP.2003.1231515"},{"key":"96_CR12","unstructured":"Song WH, Phoha VV (2004) Neural network-based reputation model in a distributed system. In: proceedings of IEEE 2004 CEC, Beijing, China, pp 321\u2013324"},{"issue":"1","key":"96_CR13","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/1044552.1044558","volume":"39","author":"MS Hou","year":"2005","unstructured":"Hou MS, Lu XL, Zhou X, Zhan C (2005) A trust model of p2p system based on confirmation theory. Operat Syst Rev 39(1):56\u201362","journal-title":"Operat Syst Rev"},{"key":"96_CR14","doi-asserted-by":"crossref","unstructured":"Chen H, Yu S, Shang J etc (2009) Comparison with several fuzzy trust methods for P2P-based system. In: proceedings of the 2009 International Conference on Information Technology and Computer Science, Washington, DC, USA, pp 188\u2013191","DOI":"10.1109\/ITCS.2009.208"},{"key":"96_CR15","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/978-3-540-30078-6_35","volume":"3177","author":"S Zhang","year":"2004","unstructured":"Zhang S, Lu D, Yang Y (2004) A fuzzy set based trust and reputation model in P2P networks. Lect Notes Comput Sci 3177:211\u2013217","journal-title":"Lect Notes Comput Sci"},{"key":"96_CR16","doi-asserted-by":"crossref","unstructured":"Xi J, Nie P, Lu J (2008) A P2P trust model based on dynamic fuzzy theory. In: proceedings of 2008 International Symposiums on Information Processing, Moscow, Russia, pp187\u2013191","DOI":"10.1109\/ISIP.2008.62"},{"issue":"4","key":"96_CR17","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1002\/asi.20307","volume":"57","author":"R Aringhieri","year":"2006","unstructured":"Aringhieri R, Damiani E, Vimercati SDCD, Paraboschi S, Samarati P (2006) Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems: special topic section on soft approaches to information retrieval and information access on the web. J Am Soc Inf Sci Technol 57(4):528\u2013537","journal-title":"J Am Soc Inf Sci Technol"},{"issue":"1","key":"96_CR18","first-page":"19","volume":"5","author":"P Bedi","year":"2006","unstructured":"Bedi P, Kaur H (2006) Trust based personalized recommender system. INFOCOM J Comput Sci 5(1):19\u201326","journal-title":"INFOCOM J Comput Sci"},{"key":"96_CR19","doi-asserted-by":"crossref","unstructured":"Griffiths N, Chao KM, Younas M (2006) Fuzzy trust for peer-to-peer systems. In: Proceedings of the 26th IEEE International Conference Workshops on Distributed Computing Systems, Lisbon, Portugal, pp 73","DOI":"10.1109\/ICDCSW.2006.57"},{"issue":"1","key":"96_CR20","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s10723-005-5465-x","volume":"3","author":"SS Song","year":"2005","unstructured":"Song SS, Hwang K, Kwok YK (2005) Trusted grid computing with security binding and trust integration. J Grid Comput 3(1):53\u201373","journal-title":"J Grid Comput"},{"issue":"6","key":"96_CR21","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MIC.2005.136","volume":"9","author":"SS Song","year":"2005","unstructured":"Song SS, Hwang K, Zhou RF, Kwok YK (2005) Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Comput 9(6):24\u201334","journal-title":"IEEE Internet Comput"},{"key":"96_CR22","doi-asserted-by":"crossref","unstructured":"Aberer K, Despotovic Z (2001) Managing trust in a Peer-2-Peer information system. In: Proceedings of the 10th International Conference on Information and Knowledge Management, Atlanta, Georgia, USA, pp 310\u2013317","DOI":"10.1145\/502585.502638"},{"key":"96_CR23","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh LA (1965) Fuzzy sets. Inf Control 8:338\u2013353","journal-title":"Inf Control"},{"issue":"5","key":"96_CR24","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.1080\/00207179108934205","volume":"54","author":"GVS Raju","year":"1991","unstructured":"Raju GVS, Zhou J, Kisner RA (1991) Hierarchical fuzzy control. Int J Control 54(5):1201\u20131216","journal-title":"Int J Control"},{"issue":"5","key":"96_CR25","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1109\/91.797984","volume":"7","author":"LX Wang","year":"1999","unstructured":"Wang LX (1999) Analysis and design of hierarchical fuzzy systems. IEEE Trans Fuzzy Syst 7(5):617\u2013624","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"2","key":"96_CR26","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s00500-006-0074-6","volume":"11","author":"B Lazzerini","year":"2006","unstructured":"Lazzerini B, Marcelloni F (2006) A hierarchical fuzzy clustering-based system to create user profiles. Soft Comput 11(2):157\u2013168","journal-title":"Soft Comput"},{"key":"96_CR27","doi-asserted-by":"crossref","unstructured":"Mohammadian M (2005) Innovative design of adaptive hierarchical fuzzy logic systems. In: Proceedings of the 2005 International Conference on Computational Intelligence for Modelling, Control and Automation, and International Conference on Intelligent Agents, Web Technologies and Internet Commerce, Xian, China, pp 1072\u20131079","DOI":"10.1109\/CIMCA.2005.1631612"},{"issue":"1","key":"96_CR28","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TIE.2002.807676","volume":"50","author":"W Rattasiri","year":"2003","unstructured":"Rattasiri W, Halgamuge SK (2003) Computationally advantageous and stable hierarchical fuzzy systems for active suspension. IEEE Trans Ind Electron 50(1):48\u201361","journal-title":"IEEE Trans Ind Electron"},{"key":"96_CR29","unstructured":"Singh A, Liu L (2003) TrustMe: Anonymous management of trust relationships in decentralized p2p systems. In: Proceedings of IEEE International Conference on P2P Computing, Link\u00f6ping, Sweden, pp 142\u2013149"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-010-0096-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-010-0096-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-010-0096-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T17:34:17Z","timestamp":1559842457000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-010-0096-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,1]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["96"],"URL":"https:\/\/doi.org\/10.1007\/s12083-010-0096-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12,1]]}}}