{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:18Z","timestamp":1750307778257,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,11,2]],"date-time":"2007-11-02T00:00:00Z","timestamp":1193961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,11,2]]},"DOI":"10.1145\/1314403.1314416","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"72-81","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Using reputation to augment explicit authorization"],"prefix":"10.1145","author":[{"given":"Phillip J.","family":"Windley","sequence":"first","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Devlin","family":"Daley","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Bryant","family":"Cutler","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Kevin","family":"Tew","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]}],"member":"320","published-online":{"date-parts":[[2007,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/auctions.amazon.com","author":"Amazon","year":"2006","unstructured":"Amazon auctions. http:\/\/auctions.amazon.com , 2006 . Amazon auctions. http:\/\/auctions.amazon.com, 2006."},{"key":"e_1_3_2_1_2_1","volume-title":"The Evolution of Cooperation","author":"Axelrod R.","year":"1984","unstructured":"R. Axelrod . The Evolution of Cooperation . Basic Books , New York , 1984 . R. Axelrod. The Evolution of Cooperation. Basic Books, New York, 1984."},{"key":"e_1_3_2_1_3_1","volume-title":"Image and Impression Management","author":"Bromley D. B.","year":"1993","unstructured":"D. B. Bromley . Reputation , Image and Impression Management . John Wiley & amp; Sons, 1993 . D. B. Bromley. Reputation, Image and Impression Management. John Wiley &amp; Sons, 1993."},{"key":"e_1_3_2_1_4_1","volume-title":"Reputation formalization within information sharing multiagent architectures. Computational Intelligence, (5):45--64","author":"Carter J.","year":"2002","unstructured":"J. Carter , E. Bitting , and A. A. Ghorbani . Reputation formalization within information sharing multiagent architectures. Computational Intelligence, (5):45--64 , 2002 . J. Carter, E. Bitting, and A. A. Ghorbani. Reputation formalization within information sharing multiagent architectures. Computational Intelligence, (5):45--64, 2002."},{"key":"e_1_3_2_1_5_1","unstructured":"D. Chappel. Understanding Windows CardSpace. http:\/\/msdn2.microsoft.com\/en-gb\/library\/aa480189.aspx April 2006.  D. Chappel. Understanding Windows CardSpace. http:\/\/msdn2.microsoft.com\/en-gb\/library\/aa480189.aspx April 2006."},{"key":"e_1_3_2_1_6_1","first-page":"49","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"Dasgupta P.","year":"2000","unstructured":"P. Dasgupta . Trust: Making and Breaking Cooperative Relations , chapter Trust As a Commodity, pages 49 -- 72 . Department of Sociology , University of Oxford, 2000 . P. Dasgupta. Trust: Making and Breaking Cooperative Relations, chapter Trust As a Commodity, pages 49--72. Department of Sociology, University of Oxford, 2000."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/352871.352889"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.10.1407.17308"},{"volume-title":"http:\/\/www.ebay.com","year":"2006","key":"e_1_3_2_1_9_1","unstructured":"eBay. http:\/\/www.ebay.com , 2006 . eBay. http:\/\/www.ebay.com, 2006."},{"key":"e_1_3_2_1_10_1","first-page":"27","volume-title":"Proceedings of the Fourth Workshop on Deception, Fraud and Trust in Agent Societies 2001","author":"Esfandiari B.","year":"2001","unstructured":"B. Esfandiari and S. Chandrasekharan . On how agents make friends: mechanisms for trust acquisition . In Proceedings of the Fourth Workshop on Deception, Fraud and Trust in Agent Societies 2001 , pages 27 -- 34 , 2001 . B. Esfandiari and S. Chandrasekharan. On how agents make friends: mechanisms for trust acquisition. In Proceedings of the Fourth Workshop on Deception, Fraud and Trust in Agent Societies 2001, pages 27--34, 2001."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1162\/105864001300122476"},{"key":"e_1_3_2_1_12_1","volume-title":"1739--1740","author":"Hume D.","year":"1975","unstructured":"D. Hume . A Treatise on Human Nature . Penguine Classics ( 1975 ), 1739--1740 . D. Hume. A Treatise on Human Nature. Penguine Classics (1975), 1739--1740."},{"key":"e_1_3_2_1_13_1","unstructured":"F. Labalme and K. Burton. OpenPrivacy.org. http:\/\/www.openprivacy.org\/.  F. Labalme and K. Burton. OpenPrivacy.org. http:\/\/www.openprivacy.org\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/EEE.2005.14"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0531(82)90031-X"},{"key":"e_1_3_2_1_17_1","unstructured":"J. Miller. MicroID - small decentralized and verifiable identity. http:\/\/microid.org\/.  J. Miller. MicroID - small decentralized and verifiable identity. http:\/\/microid.org\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/820745.821158"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544807"},{"key":"e_1_3_2_1_20_1","volume-title":"http:\/\/openid.net\/specs.bml","author":"ID","year":"2006","unstructured":"Open ID specification. http:\/\/openid.net\/specs.bml , 2006 . OpenID specification. http:\/\/openid.net\/specs.bml, 2006."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10683-006-4309-2"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-004-0041-5"},{"issue":"8","key":"e_1_3_2_1_24_1","first-page":"825","article-title":"Using trust for detecting deceitful agents in artificial societies. In Applied Artificial Intelligence, Special Issue on Trust","volume":"14","author":"Schillo M.","year":"2000","unstructured":"M. Schillo , P. Funk , and M. Rovatsos . Using trust for detecting deceitful agents in artificial societies. In Applied Artificial Intelligence, Special Issue on Trust , Deception and Fraud in Agent Societies , 14 ( 8 ): 825 -- 848 , September 2000 . M. Schillo, P. Funk, and M. Rovatsos. Using trust for detecting deceitful agents in artificial societies. In Applied Artificial Intelligence, Special Issue on Trust, Deception and Fraud in Agent Societies, 14(8):825--848, September 2000.","journal-title":"Deception and Fraud in Agent Societies"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544808"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1086\/406755"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"e_1_3_2_1_28_1","volume-title":"Digital Identity","author":"Windley P. J.","year":"2004","unstructured":"P. J. Windley . Digital Identity . O'Reilly Media , 2004 . P. J. Windley. Digital Identity. O'Reilly Media, 2004."},{"key":"e_1_3_2_1_29_1","unstructured":"P. J. Windley. Principles of reputation. http:\/\/www.windley.com\/archives\/2006\/06\/principles_of_r June 2006.  P. J. Windley. Principles of reputation. http:\/\/www.windley.com\/archives\/2006\/06\/principles_of_r June 2006."}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Fairfax Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Digital identity management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314403.1314416","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314403.1314416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314403.1314416"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11,2]]},"references-count":28,"alternative-id":["10.1145\/1314403.1314416","10.1145\/1314403"],"URL":"https:\/\/doi.org\/10.1145\/1314403.1314416","relation":{},"subject":[],"published":{"date-parts":[[2007,11,2]]},"assertion":[{"value":"2007-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}