{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:33Z","timestamp":1750307553978,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1655984","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"320-325","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A weighted closeness-based trust combination model"],"prefix":"10.1145","author":[{"given":"Tian","family":"Jun-feng","sequence":"first","affiliation":[{"name":"College of Mathematics &amp; Computer Science of HeBei University, Baoding, HeBei, China"}]},{"given":"Lu","family":"Yu-zhen","sequence":"additional","affiliation":[{"name":"College of Mathematics &amp; Computer Science of HeBei University, Baoding, HeBei, China"}]},{"given":"Yuan","family":"Peng","sequence":"additional","affiliation":[{"name":"College of Mathematics &amp; Computer Science of HeBei University, Baoding, HeBei, China"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"164","volume-title":"J. Dale, G Dinolt, eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press","author":"Blaze M.","year":"1996","unstructured":"M. Blaze , J. Feigenbaum , J. Lacy , \" Decentralized trust management\" , In: J. Dale, G Dinolt, eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press , ( 1996 ), pp. 164 -- 173 . M. Blaze, J. Feigenbaum, J. Lacy, \"Decentralized trust management\", In: J. Dale, G Dinolt, eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, (1996), pp. 164--173."},{"key":"e_1_3_2_1_2_1","first-page":"3","volume-title":"GOLLMANN D. Proc of the 3rd European Symposium on Research in Computer Security. Brighton: Springer-Verlag","author":"Beth","year":"1994","unstructured":"Beth T, Borcherding M, Klein B, \"Valuation of trust in open networks \", GOLLMANN D. Proc of the 3rd European Symposium on Research in Computer Security. Brighton: Springer-Verlag , ( 1994 ), pp. 3 -- 18 . Beth T, Borcherding M, Klein B, \"Valuation of trust in open networks\", GOLLMANN D. Proc of the 3rd European Symposium on Research in Computer Security. Brighton: Springer-Verlag, (1994), pp.3--18."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/646647.699329"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544809"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"issue":"01","key":"e_1_3_2_1_7_1","first-page":"17","article-title":"FSTM: a Subjective Trust Model Based on Fuzzy Theory for P2P Network","volume":"29","author":"HU","year":"2008","unstructured":"HU He-ping, LIU Hai-kun, LI Rui-xuan , \" FSTM: a Subjective Trust Model Based on Fuzzy Theory for P2P Network \", Journal of Chinese Computer Systems, Shenyang , 2008 , 29 ( 01 ), pp. 17 -- 21 . HU He-ping, LIU Hai-kun, LI Rui-xuan, \"FSTM: a Subjective Trust Model Based on Fuzzy Theory for P2P Network\", Journal of Chinese Computer Systems, Shenyang, 2008, 29(01), pp. 17--21.","journal-title":"Journal of Chinese Computer Systems, Shenyang"},{"issue":"15","key":"e_1_3_2_1_8_1","first-page":"88","article-title":"Trust evaluation model based on semiring","volume":"44","author":"TIAN","year":"2008","unstructured":"TIAN Jun-feng, CHEN Xiao-xiang, LIU Tao , \" Trust evaluation model based on semiring \", Computer Engineering and Applications, Beijing , 2008 , 44 ( 15 ), pp. 88 -- 91 . TIAN Jun-feng, CHEN Xiao-xiang, LIU Tao, \"Trust evaluation model based on semiring\", Computer Engineering and Applications, Beijing, 2008, 44(15), pp.88--91.","journal-title":"Computer Engineering and Applications, Beijing"},{"issue":"10","key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"1654","DOI":"10.1360\/crad20051002","article-title":"Research on a Fuzzy Logic-Based Subjective Trust Management Model","volume":"42","author":"Wen Tang","year":"2005","unstructured":"Tang Wen , Hu Jianbin , Chen Zhong , \" Research on a Fuzzy Logic-Based Subjective Trust Management Model \", Journal of Computer Research and Developmen, Beijing , 2005 , 42 ( 10 ), pp. 1654 -- 1659 . Tang Wen, Hu Jianbin, Chen Zhong, \"Research on a Fuzzy Logic-Based Subjective Trust Management Model\", Journal of Computer Research and Developmen, Beijing, 2005, 42(10), pp.1654--1659.","journal-title":"Journal of Computer Research and Developmen, Beijing"},{"issue":"17","key":"e_1_3_2_1_10_1","first-page":"1","article-title":"Behavior trust computation in distributed network","volume":"44","author":"TIAN","year":"2008","unstructured":"TIAN Li-qin, LIN Chuang , YANG Yang , \" Behavior trust computation in distributed network \", Computer Engineering and Applications, Beijing , 2008 , 44 ( 17 ), pp. 1 -- 5 . TIAN Li-qin, LIN Chuang, YANG Yang, \"Behavior trust computation in distributed network\", Computer Engineering and Applications, Beijing, 2008, 44(17), pp. 1--5.","journal-title":"Computer Engineering and Applications, Beijing"},{"issue":"3","key":"e_1_3_2_1_11_1","first-page":"493","article-title":"DTM: A Dynamic Trust Management Model for Internet Computing Environments","volume":"32","author":"Jian-Xin LI","year":"2009","unstructured":"LI Jian-Xin , HUAI Jin-Peng , LI Xian-Xian , LIN Li , \" DTM: A Dynamic Trust Management Model for Internet Computing Environments \", Chinese Journal of Computers, Beijing , 2009 , 32 ( 3 ), pp. 493 -- 505 . LI Jian-Xin, HUAI Jin-Peng, LI Xian-Xian, LIN Li, \"DTM: A Dynamic Trust Management Model for Internet Computing Environments\", Chinese Journal of Computers, Beijing, 2009, 32(3), pp. 493--505.","journal-title":"Chinese Journal of Computers, Beijing"},{"key":"e_1_3_2_1_12_1","first-page":"405","article-title":"Trust Quantitative Model with Multiple Decision Factors in Trusted Network","author":"Xiao-Yong LI","year":"2009","unstructured":"LI Xiao-Yong , GUI Xiao-Lin , \" Trust Quantitative Model with Multiple Decision Factors in Trusted Network \", Chinese Journal of Computers, Beijing , 2009 , pp. 405 -- 416 . LI Xiao-Yong, GUI Xiao-Lin, \"Trust Quantitative Model with Multiple Decision Factors in Trusted Network\", Chinese Journal of Computers, Beijing, 2009, pp. 405--416.","journal-title":"Chinese Journal of Computers, Beijing"}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","sponsor":["AICIT","ETRI","KISTI"],"location":"Seoul Korea","acronym":"ICIS '09"},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1655984","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1655984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:41Z","timestamp":1750249421000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1655984"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":12,"alternative-id":["10.1145\/1655925.1655984","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1655984","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}