{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:12:10Z","timestamp":1725783130821},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/efta.2007.4416865","type":"proceedings-article","created":{"date-parts":[[2008,1,4]],"date-time":"2008-01-04T20:59:03Z","timestamp":1199480343000},"page":"826-830","source":"Crossref","is-referenced-by-count":4,"title":["An overview of the interpretations of trust and reputation"],"prefix":"10.1109","author":[{"given":"Farookh Khadeer","family":"Hussain","sequence":"first","affiliation":[]},{"given":"Omar Khadeer","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0531(82)90030-8"},{"article-title":"A definition of trust for computing with social networks","year":"2005","author":"golbeck","key":"ref10"},{"article-title":"Definition of Trust","year":"2006","author":"buist","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544807"},{"key":"ref13","first-page":"7","article-title":"A Computational Model of Trust and Reputation for E-businesses","author":"mui","year":"2002","journal-title":"Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS 2002)"},{"key":"ref14","first-page":"123","article-title":"Evaluating Reputation in Multi-agents Systems","author":"mui","year":"2002","journal-title":"Proceedings of the International Workshop on Trust Reputation and Security Theories and Practice"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PTP.2003.1231515"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2003.1241218"},{"key":"ref17","first-page":"27","article-title":"On How Agents Make Friends: Mechanisms for Trust Acquisition","author":"esfandiari","year":"2001","journal-title":"Proceedings of the 5th International Conference on Autonomous Agents Workshop on Deception Fraud and Trust in Agent Societies (AAMAS 2001)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2003.1232058"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25980-0_16"},{"article-title":"Redefining Web-of-trust","year":"2005","author":"grishchenko","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/9780470028261"},{"key":"ref27","first-page":"296","article-title":"Trust in Modern Societies: The Search for the Bases of Social Order","author":"misztal","year":"1996"},{"key":"ref3","first-page":"226","article-title":"Trust, a Sociological Theory","author":"sztompka","year":"1999"},{"key":"ref6","first-page":"94","article-title":"Familiarity, Confidence, Trust: Problems and Alternatives","author":"luhmann","year":"0","journal-title":"Trust Making and Breaking Cooperative Relations"},{"key":"ref29","article-title":"A fuzzy model for context-dependent reputation","author":"grishchenko","year":"2004","journal-title":"Proceedings of the ISWC 2004 Workshop on Trust Security and Reputation on the Semantic Web"},{"key":"ref5","first-page":"450","article-title":"A Methodology for Trust Modelling in Service Oriented Environments","author":"khadeer hussain","year":"2007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304877"},{"key":"ref7","first-page":"213","article-title":"Can we trust trust?","author":"gambetta","year":"0","journal-title":"Trust Making and Breaking Cooperative Relations"},{"key":"ref2","first-page":"448","article-title":"The resolution of conflict: Constructive and destructive processes","author":"deutsch","year":"1985"},{"key":"ref9","first-page":"49","article-title":"Trust as Commodity","author":"dasgupta","year":"0","journal-title":"Trust Making and Breaking Cooperative Relations"},{"article-title":"Distributive justice: A social psychological perspective","year":"1985","author":"deutsch","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/375735.376110"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/08839510490509027"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544854"},{"key":"ref24","first-page":"3","article-title":"Relying on Trust to Find Reliable Information","author":"abdul-rahman","year":"1999","journal-title":"Proceedings of the 1999 International Symposium on Database Web and Cooperative Systems (DANTE 1999)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926814"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283739"},{"key":"ref25","article-title":"Using Recommenda tions for Managing Trust in Distributed Systems","author":"abdul-rahman","year":"1997","journal-title":"Proceedings of the IEEE Malaysia International Conference on Communication 1997 (MICC 1997)"}],"event":{"name":"2007 IEEE Conference on Emerging Technologies & Factory Automation (EFTA 2007)","start":{"date-parts":[[2007,9,25]]},"location":"Patras, Greece","end":{"date-parts":[[2007,9,28]]}},"container-title":["2007 IEEE Conference on Emerging Technologies &amp; Factory Automation (EFTA 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4416742\/4416743\/04416865.pdf?arnumber=4416865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T21:58:36Z","timestamp":1489701516000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4416865\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/efta.2007.4416865","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}