{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:37:23Z","timestamp":1729676243973,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/ptp.2004.1334937","type":"proceedings-article","created":{"date-parts":[[2004,11,8]],"date-time":"2004-11-08T16:27:50Z","timestamp":1099931270000},"page":"108-115","source":"Crossref","is-referenced-by-count":1,"title":["Collaborative automated trust negotiation in peer-to-peer systems"],"prefix":"10.1109","author":[{"family":"Song Ye","sequence":"first","affiliation":[]},{"given":"F.","family":"Makedon","sequence":"additional","affiliation":[]},{"given":"J.","family":"Ford","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"A social mechanism of reputation management in electronic communities","author":"yu","year":"2000","journal-title":"Proceedings of Fourth International Workshop on Cooperative Information Agents"},{"key":"22","first-page":"110","article-title":"A unified scheme for resource protection in automated trust negotiation","author":"yu","year":"2003","journal-title":"Proceedings of IEEE Symposium on Security and Privacy"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2002.1011297"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/605434.605435"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.824965"},{"key":"15","article-title":"Protecting privacy during on-line trust negotiation","author":"seamons","year":"2002","journal-title":"Proceeding of the 2nd Workshop on Privacy Enhancing Technologies"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644532"},{"key":"13","first-page":"156","article-title":"A measurement study of peer-to-peer file sharing systems","author":"saroiu","year":"2002","journal-title":"Proceedings of the SPIE conference on Multimedia Computing and Networking"},{"key":"14","article-title":"Limiting the disclosure of access control policies during automated trust negotiation","author":"seamons","year":"2001","journal-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS'01)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005143"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926814"},{"key":"20","first-page":"210","article-title":"PRUNES: An efficient and complete strategy for automated trust negotiation over the internet","author":"yu","year":"2000","journal-title":"Proceedings of the 7th a CM Conference on Computer and Communications Security"},{"journal-title":"Technical Report","article-title":"Trust negotiation in peer-to-peer systems","year":"2004","key":"2"},{"year":"0","key":"1"},{"key":"10","first-page":"172","article-title":"Security for structured peer-to-peer overlay networks","author":"ganesh","year":"2002","journal-title":"Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI'02)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/511495.511496"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339345"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v5i10.792","article-title":"Free riding on gnutella","volume":"5","author":"adar","year":"2000","journal-title":"First Monday"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/502585.502638"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872061"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/586135.586138"}],"event":{"name":"Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings.","location":"Zurich, Switzerland"},"container-title":["Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9261\/29415\/01334937.pdf?arnumber=1334937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T11:37:38Z","timestamp":1497613058000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1334937\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ptp.2004.1334937","relation":{},"subject":[]}}