{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:49:48Z","timestamp":1730238588973,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10]]},"DOI":"10.1109\/icdim.2007.4444294","type":"proceedings-article","created":{"date-parts":[[2008,7,23]],"date-time":"2008-07-23T09:49:26Z","timestamp":1216806566000},"page":"621-626","source":"Crossref","is-referenced-by-count":1,"title":["Reputation system for large scale environments"],"prefix":"10.1109","author":[{"given":"Roman","family":"Spanek","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/776322.776346"},{"key":"ref12","article-title":"A policy based approach to security for the semantic web","author":"kagal","year":"2003","journal-title":"Proceedings of the 2nd International Semantic Web Conference"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref14","first-page":"640651","article-title":"Eigenrep: Reputation management in p2p networks","author":"kamvar","year":"2003","journal-title":"Proc 12th Int'l Conf WWW"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208963"},{"key":"ref16","article-title":"A role-based trust-management frame-work","author":"li","year":"2003","journal-title":"DARPA Information Survivability Conference and Exposition (DISCEX)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544853"},{"key":"ref18","first-page":"475","article-title":"Secure grid-based computing with social-network based trust management in the semantic web","volume":"16","author":"\u0161p\u00e1nek","year":"2006","journal-title":"Neural Network World International Journal on Neural and Mass-Parallel Computing and Information Systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/375735.376110"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2005.13"},{"key":"ref3","first-page":"134143","article-title":"Regulating service access and information release on the web","author":"bonatti","year":"2000","journal-title":"CCS 00 Proceedings of the 7th ACM conference on computer and communications security"},{"key":"ref6","article-title":"Dynamic trust metrics for peer-topeer systems","author":"duma","year":"2005","journal-title":"Proceedings of 2nd IEEE Workshop on P2P Data Management Security and Trust (in connection with DEXA05)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/586135.586138"},{"journal-title":"PGP Pretty Good Privacy","year":"1995","author":"garfinkel","key":"ref8"},{"key":"ref7","article-title":"Spki certificate theory","author":"ellison","year":"1999","journal-title":"Internet RFC 2693"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2004.1309162"},{"key":"ref1","article-title":"Negotiating trust on the grid","author":"basney","year":"2004","journal-title":"2nd WWW Workshop on Semantics in P2P and Grid Computing"},{"journal-title":"Algorithmic Graph Theory and Perfect Graphs","year":"1980","author":"golumbic","key":"ref9"},{"key":"ref20","article-title":"An authentication service for open network systems","author":"neuman","year":"1988","journal-title":"Proc Winter USENIX Conference"},{"key":"ref22","article-title":"Secure grid-based computing with social-network based trust management in the (semantic) web","author":"\u0161p\u00e1nek","year":"2006","journal-title":"Proceedings of The 8th International Conference on information Integration and Web-based Application & Services (iiWAS2006)"},{"key":"ref21","article-title":"Semantic web languages for policy representation and reasoning: A comparison of kaos, rei and ponder","author":"tonti","year":"2003","journal-title":"Proceedings of the 2nd International Semantic Web Conference"}],"event":{"name":"Second IEEE International Conference on Digital Information Management","start":{"date-parts":[[2007,10,28]]},"location":"Lyon","end":{"date-parts":[[2007,10,31]]}},"container-title":["2007 2nd International Conference on Digital Information Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4444189\/4444274\/04444294.pdf?arnumber=4444294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,27]],"date-time":"2017-07-27T16:39:39Z","timestamp":1501173579000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4444294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icdim.2007.4444294","relation":{},"subject":[],"published":{"date-parts":[[2007,10]]}}}