{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:57:54Z","timestamp":1729673874035,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/cybersec.2012.6246132","type":"proceedings-article","created":{"date-parts":[[2012,7,31]],"date-time":"2012-07-31T17:52:55Z","timestamp":1343757175000},"page":"165-170","source":"Crossref","is-referenced-by-count":0,"title":["P2P dynamic trust management system based on trust network"],"prefix":"10.1109","author":[{"family":"Xiangkun Dai","sequence":"first","affiliation":[]},{"family":"Caiyi Zhu","sequence":"additional","affiliation":[]},{"family":"Yucui Guo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861390"},{"key":"15","first-page":"145","article-title":"Research on trust model for P2P electronic commerce[J]","volume":"41","author":"zhang","year":"2011","journal-title":"Mathematics in Practice and Theory"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.04.001"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1360\/jos181510"},{"journal-title":"The Analytic Hierarchy Process","year":"1980","author":"saaty","key":"14"},{"key":"11","first-page":"1301","article-title":"DyTrust: A time-frame based dynamic trust model for P2P systems [J]","volume":"29","author":"chang","year":"2006","journal-title":"Chinese Journal of Computer"},{"key":"12","first-page":"3","author":"gui","year":"2011","journal-title":"Trust Management and Calculation (In Chinese)[M]"},{"journal-title":"Formalising trust as a computational concept","year":"1994","author":"stephen","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1209003"},{"journal-title":"Peer-to-Peer Harnessing the Power of Disruptive Technology[M]","year":"2001","author":"andrew","key":"1"},{"key":"10","first-page":"3","author":"gui","year":"2005","journal-title":"Grid Technology Introduction (In Chinese)[ M]"},{"key":"7","first-page":"9","article-title":"Fuzzy trust integration for security enforcement in grid computing[C]","author":"song","year":"2004","journal-title":"Proceeding of the IFIP International Conference on Network and Parrallel Computing"},{"journal-title":"The Study of Dynamic Trust Relationship Modeling and Managing [D]","year":"2005","author":"chenlin","key":"6"},{"journal-title":"Design of Trust Metrics Based on Dempstershafer Theory","year":"0","author":"teng","key":"5"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafer","year":"1976","journal-title":"A mathematical theory of evidence[M]"},{"key":"9","first-page":"305","article-title":"Information theoretic framework of trust modeling and evaluation for adhoc networks[J]","volume":"249","author":"sun","year":"2006","journal-title":"IEEE Journal on Selected Areas in Communications Selected Areas in Communications"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"}],"event":{"name":"2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)","start":{"date-parts":[[2012,6,26]]},"location":"Kuala Lumpur, Malaysia","end":{"date-parts":[[2012,6,28]]}},"container-title":["Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6238218\/6246077\/06246132.pdf?arnumber=6246132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T19:16:31Z","timestamp":1643051791000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6246132\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cybersec.2012.6246132","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}