{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T06:57:40Z","timestamp":1767164260587,"version":"build-2238731810"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/perser.2004.1356779","type":"proceedings-article","created":{"date-parts":[[2004,12,23]],"date-time":"2004-12-23T04:34:02Z","timestamp":1103776442000},"page":"113-120","source":"Crossref","is-referenced-by-count":16,"title":["Trummar - a trust model for mobile agent systems based on reputation"],"prefix":"10.1109","author":[{"given":"G.","family":"Derbas","sequence":"first","affiliation":[]},{"given":"A.","family":"Kayssi","sequence":"additional","affiliation":[]},{"given":"H.","family":"Artail","sequence":"additional","affiliation":[]},{"given":"A.","family":"Chehab","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","article-title":"Towards incentive-compatible reputation management","author":"jurca","year":"2002","journal-title":"Proceedings of the AAMAS 2002 Workshop on Deception Fraud and Trust in Agent Societies"},{"key":"14","article-title":"Modeling reputation in agent-based marketplaces to improve the performance of buying agents","author":"tran","year":"2003","journal-title":"Proc Ninth Int'l Conf User Modeling (UM '03)"},{"key":"11","article-title":"Soft security: Isolating unreliable agents","author":"barber","year":"2002","journal-title":"Proceedings of the AAMAS 2002 Workshop on Deception Fraud and Trust in Agent Societies"},{"key":"12","article-title":"Belief revision process based on trust: Agents evaluating reputation of information sources","author":"barber","year":"2000","journal-title":"Workshop on Trust in Cyber-societies"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926814"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36609-1_10","article-title":"Evaluating reputation in multi-agents systems","author":"mui","year":"2003","journal-title":"Trust Reputation and Security Theories and Practices"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994181"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36609-1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2002.1040858"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2002.1017189"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2002.1012962"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544853"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICMAS.2000.858519"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2002.1011307"}],"event":{"name":"The IEEE\/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings.","location":"Beirut, Lebanon"},"container-title":["The IEEE\/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9379\/29787\/01356779.pdf?arnumber=1356779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T09:42:58Z","timestamp":1497606178000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1356779\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"aliases":["10.1109\/perser.2004.34"],"URL":"https:\/\/doi.org\/10.1109\/perser.2004.1356779","relation":{},"subject":[]}}