{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:16Z","timestamp":1750307716010,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,12]],"date-time":"2009-06-12T00:00:00Z","timestamp":1244764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,12]]},"DOI":"10.1145\/1543834.1543880","type":"proceedings-article","created":{"date-parts":[[2009,6,24]],"date-time":"2009-06-24T21:59:19Z","timestamp":1245880759000},"page":"337-344","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["DynamicTrust"],"prefix":"10.1145","author":[{"given":"Fengming","family":"Liu","sequence":"first","affiliation":[{"name":"School of Management and Economics, Shandong Normal University, Jinan, China"}]},{"given":"Wenyin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Information School, Linyi Normal University, linyi, China"}]},{"given":"Yongsheng","family":"Ding","sequence":"additional","affiliation":[{"name":"College of Information Sciences and Technology, Donghua University, shanghai, China"}]},{"given":"Xiyu","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Management and Economics, Shandong Normal University, Jinan, China"}]},{"given":"Mingchun","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Management and Economics, Shandong Normal University, Jinan, China"}]},{"given":"Yu","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of commerce, Jinan Technology college, Jinan, China"}]}],"member":"320","published-online":{"date-parts":[[2009,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 9th international Conference on Database theory (January 08--10","volume":"2572","author":"Daswani N.","year":"2003"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1120717.1120723"},{"volume-title":"Proceeding of the 16th International Workshop on Database and Expert Systems Applications (August 22--26","year":"2005","author":"Claudiu Duma","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/820262.820322"},{"volume-title":"Proceedings of IEEE Consumer Communications and Networking Conference (January 03--06","year":"2005","author":"Dewan P.","key":"e_1_3_2_1_6_1"},{"volume-title":"Proceedings of the 10th IEEE international Workshop on Future Trends of Distributed Computing Systems (May 26 -- 28","year":"2004","author":"Liu Z.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 27th Australasian Conference on Computer Science --","volume":"26","author":"Pirzada A. A.","year":"2004"},{"volume-title":"Proceedings of Tenth Euromicro PDP (Parallel, Distributed and Network--based Processing) (January","year":"2002","author":"Buchegger S.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of IEEE Wireless Communications and Networking Conference","volume":"2","author":"He Q.","year":"2004"},{"key":"e_1_3_2_1_11_1","unstructured":"Michiardi P. and Molva R. 2002. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP Tc6\/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security (September 26 -- 27 2002). B. Jerman-Blazic and T. Klobucar Eds. IFIP Conference Proceedings vol. 228. Kluwer B.V. Deventer The Netherlands 107--121.   Michiardi P. and Molva R. 2002. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP Tc6\/Tc11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security (September 26 -- 27 2002). B. Jerman-Blazic and T. Klobucar Eds. IFIP Conference Proceedings vol. 228. Kluwer B.V. Deventer The Netherlands 107--121."},{"volume-title":"Proceedings of the 2004 IEEE international Symposium on Cluster Computing and the Grid (April 19 -- 22","year":"2004","author":"Papaioannou T. G.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586138"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"volume-title":"Proceeding of 9th Nordic Workshop on Secure IT-Systems (November","year":"2004","author":"Cvrcek D.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.832944"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 35th Annual Hawaii international Conference on System Sciences (Hicss'02)","volume":"7","author":"Mui L.","year":"2002"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"volume-title":"Proceedings of the 15th Bled Electronic Commerce Conference (June","year":"2002","author":"J\u00f8sang A.","key":"e_1_3_2_1_20_1"},{"volume-title":"Proceedings of the 2003 IEEE\/WIC international Conference on Web intelligence (October 13 -- 17","year":"2003","author":"Wang Y.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544809"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.832944"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544854"},{"volume-title":"Proceedings of the International Joint Conference on Neural Networks IJCNN and IEEE International Conference on Fuzzy Systems (July 25--29, 2004","year":"2004","author":"Kaur D.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","first-page":"9","article-title":"Trust Management through Reputation Mechanisms","volume":"14","author":"Giorgos Zacharia","year":"2000","journal-title":"Applied Artificial Intelligence"},{"volume-title":"Proceeding of the 17th IEEE Symposium on Security and Privacy, 164--173","author":"Blaze M.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","unstructured":"Terzis S. Wagealla W. English C. McGettrick A. and Nixon P. 2004. The SECURE Collaboration Model: SECURE Deliverables D2.1 D.2.2 and D2.3. http:\/\/secure.dsg.cs.tcd.ie.  Terzis S. Wagealla W. English C. McGettrick A. and Nixon P. 2004. The SECURE Collaboration Model: SECURE Deliverables D2.1 D.2.2 and D2.3. http:\/\/secure.dsg.cs.tcd.ie."},{"key":"e_1_3_2_1_29_1","unstructured":"Marsh S. 1994. Formalising Trust as a Computational Concept. Doctoral Thesis. Department of Mathematics and Computer Science University of Stirling.  Marsh S. 1994. Formalising Trust as a Computational Concept. Doctoral Thesis. Department of Mathematics and Computer Science University of Stirling."},{"volume-title":"Proceedings of the 4th International Conference on Electronic Commerce and Web Technologies, LNCS 2378","author":"Kinateder M.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","first-page":"1497","article-title":"A New Network Simulation Platform Based on Ecological Network Computation","volume":"14","author":"Ren L.-H.","year":"2002","journal-title":"Journal of System Simulation"},{"key":"e_1_3_2_1_32_1","first-page":"185","article-title":"Design of a Bio-network Architecture Based on Immune Emergent Computation","volume":"18","author":"Ding Y.-S.","year":"2003","journal-title":"Control and Decision"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"}],"event":{"name":"GEC '09: GEC '09 - ACM\/SIGEVO Genetic and Evolutionary Computation Summit","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation","ACM Association for Computing Machinery"],"location":"Shanghai China","acronym":"GEC '09"},"container-title":["Proceedings of the first ACM\/SIGEVO Summit on Genetic and Evolutionary Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1543834.1543880","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1543834.1543880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:30:21Z","timestamp":1750253421000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1543834.1543880"}},"subtitle":["three-dimensional dynamic computing model of trust in peer-to-peer networks"],"short-title":[],"issued":{"date-parts":[[2009,6,12]]},"references-count":32,"alternative-id":["10.1145\/1543834.1543880","10.1145\/1543834"],"URL":"https:\/\/doi.org\/10.1145\/1543834.1543880","relation":{},"subject":[],"published":{"date-parts":[[2009,6,12]]},"assertion":[{"value":"2009-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}