{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T08:30:38Z","timestamp":1725525038517},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/clei.2014.6965185","type":"proceedings-article","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T19:06:09Z","timestamp":1417460769000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Trust-based improved recommendation of IT-related Web resources"],"prefix":"10.1109","author":[{"given":"Pablo","family":"Cruz","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Oscar","family":"Cornejo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hernan","family":"Astudillo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/978-1-84800-356-9_9","article-title":"Capturing trust in social web applications","author":"o'donovan","year":"2009","journal-title":"Computing with Social Trust"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2500276"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/569905.569910"},{"key":"23","article-title":"Personalizing Applications through Integration of Inferred Trust Values in Semantic Web-Based Social Networks","author":"golbeck","year":"2005","journal-title":"Proceedings of the 4th International Semantic Web Conference (Semantic Network Analysis Workshop)"},{"key":"18","article-title":"Attack resistant trust metrics for public key certification","author":"levien","year":"1998","journal-title":"7th USENIX Security Symposium"},{"key":"15","article-title":"Trust-aware collaborative filtering for recom-mender systems","author":"massa","year":"2004","journal-title":"Federated Int Conference on the Move to Meaningful Internet CoopIS Doa Odbase"},{"journal-title":"Computing and Applying Trust in Web-Based Social Networks","year":"2005","author":"golbeck","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"14","article-title":"Security and trust issues in semantic grids","author":"olmedilla","year":"2005","journal-title":"Proceedings of the Dagsthul Seminar Semantic Grid The Convergence of Technologies"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.002"},{"key":"12","first-page":"280","article-title":"A computational Model of Trust and Reputation","author":"mui","year":"2002","journal-title":"Proceedings of the 35th International Conference on System Science"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1040830.1040870"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-356-9_1"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.2991\/978-94-91216-08-4"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/944012.944015"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390344"},{"key":"10","first-page":"223","article-title":"Towards a theory of trust in networks of humans and computers","author":"virgil","year":"2011","journal-title":"Proceedings of the 19th International Conference on Security Protocols"},{"journal-title":"Formalising trust as a computational concept","year":"1994","author":"marsh","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s10272-009-0295-x"},{"key":"5","article-title":"Organizational Trust in the Canadian Forces","author":"adams","year":"2008","journal-title":"National Defence and the Canadian Forces"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2501654.2501661"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.2307\/1388493"},{"key":"8","article-title":"Trust-based recommendation based on graph similarity","author":"hang","year":"2010","journal-title":"Proc Trust Agent Societies Workshop AAMAS"}],"event":{"name":"2014 XL Latin American Computing Conference (CLEI)","start":{"date-parts":[[2014,9,15]]},"location":"Montevideo, Uruguay","end":{"date-parts":[[2014,9,19]]}},"container-title":["2014 XL Latin American Computing Conference (CLEI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6939950\/6965096\/06965185.pdf?arnumber=6965185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T21:16:57Z","timestamp":1498166217000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6965185\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/clei.2014.6965185","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}