{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T06:46:47Z","timestamp":1775371607725,"version":"3.50.1"},"reference-count":175,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T00:00:00Z","timestamp":1375315200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2013,8]]},"abstract":"<jats:p>\n            Web-based social networks have become popular as a medium for disseminating information and connecting like-minded people. The public accessibility of such networks with the ability to share opinions, thoughts, information, and experience offers great promise to enterprises and governments. In addition to individuals using such networks to connect to their friends and families, governments and enterprises have started exploiting these platforms for delivering their services to citizens and customers. However, the success of such attempts relies on the level of trust that members have with each other as well as with the service provider. Therefore, trust becomes an essential and important element of a successful social network. In this article, we present the first comprehensive review of social and computer science literature on trust in social networks. We first review the existing definitions of trust and define\n            <jats:italic>social trust<\/jats:italic>\n            in the context of social networks. We then discuss recent works addressing three aspects of social trust:\n            <jats:italic>trust information collection<\/jats:italic>\n            ,\n            <jats:italic>trust evaluation<\/jats:italic>\n            , and\n            <jats:italic>trust dissemination<\/jats:italic>\n            . Finally, we compare and contrast the literature and identify areas for further research in social trust.\n          <\/jats:p>","DOI":"10.1145\/2501654.2501661","type":"journal-article","created":{"date-parts":[[2013,8,27]],"date-time":"2013-08-27T12:58:51Z","timestamp":1377608331000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":517,"title":["A survey of trust in social networks"],"prefix":"10.1145","volume":"45","author":[{"given":"Wanita","family":"Sherchan","sequence":"first","affiliation":[{"name":"IBM Research- Australia, Australia"}]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"CSIRO ICT Centre, Australia"}]},{"given":"Cecile","family":"Paris","sequence":"additional","affiliation":[{"name":"CSIRO ICT Centre, Australia"}]}],"member":"320","published-online":{"date-parts":[[2013,8,30]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/820262.820322"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI'10)","author":"Adali S."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0047-2727(01)00084-6"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367525"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.002"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.180"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/001872675400700102"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1922649.1922651"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/REV.2008.3"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Boltzmann L. 1964. Lectures on Gas Theory. Translated by Stephen G. Brush. University of California Press Berkeley.  Boltzmann L. 1964. Lectures on Gas Theory. Translated by Stephen G. Brush. University of California Press Berkeley.","DOI":"10.1525\/9780520327474"},{"key":"e_1_2_1_11_1","first-page":"251","article-title":"Meaningful distinctions within a concept: Relational, collective, and generalized social capital. Social Sci","volume":"38","author":"Brunie A.","year":"2009","journal-title":"Res."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(98)00005-7"},{"key":"e_1_2_1_13_1","first-page":"3","article-title":"Normative reputation and the costs of compliance","volume":"1","author":"Castelfranchi C.","year":"1998","journal-title":"J. Artif. Soc. Social Simul."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378889.1378908"},{"key":"e_1_2_1_15_1","unstructured":"Challener D. Yoder K. Catherman R. Safford D. and Van Doorn L. 2007. A Practical Guide to Trusted Computing. 1st Ed. IBM Press.   Challener D. Yoder K. Catherman R. Safford D. and Van Doorn L. 2007. A Practical Guide to Trusted Computing. 1 st Ed. IBM Press."},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Chang E. Dillon T. S. and Hussain F. 2006. Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence. Wiley Periodicals.   Chang E. Dillon T. S. and Hussain F. 2006. Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence. Wiley Periodicals.","DOI":"10.1002\/9780470028261"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/502585.502625"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25283-9_9"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Christianson B. and Harbison W. 1996. Why isn't trust transitive&quest; In Proceedings of the Security Protocols Workshop. 171--176.   Christianson B. and Harbison W. 1996. Why isn't trust transitive&quest; In Proceedings of the Security Protocols Workshop. 171--176.","DOI":"10.1007\/3-540-62494-5_16"},{"key":"e_1_2_1_20_1","unstructured":"Claridge T. 2004. Social capital and natural resource management. M.S. thesis Australia. http:\/\/www. socialcapitalresearch.com\/literature\/nrm.html.  Claridge T. 2004. Social capital and natural resource management. M.S. thesis Australia. http:\/\/www. socialcapitalresearch.com\/literature\/nrm.html."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1086\/228943"},{"key":"e_1_2_1_22_1","unstructured":"Coleman J. S. 1990. Foundations of Social Theory. Belknap Press Cambridge MA.  Coleman J. S. 1990. Foundations of Social Theory. Belknap Press Cambridge MA."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/019027250506800202"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1108\/08876040210419406"},{"key":"e_1_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Dohmen T. Falk A. Huffman D. and Sunde U. 2006. The intergenerational transmission of risk and trust attitudes. IZA working paper. http:\/\/www.cens.uni-bonn.de\/team\/board\/armin-falk\/the-intergenerational-transmission-of-risk-and-trust-attitudes-review-of-economic-studies-2012-792-645-677-with-thomas-dohmen-david-huffman-and-uwe-sunde&nldr;pdf.  Dohmen T. Falk A. Huffman D. and Sunde U. 2006. The intergenerational transmission of risk and trust attitudes. IZA working paper. http:\/\/www.cens.uni-bonn.de\/team\/board\/armin-falk\/the-intergenerational-transmission-of-risk-and-trust-attitudes-review-of-economic-studies-2012-792-645-677-with-thomas-dohmen-david-huffman-and-uwe-sunde&nldr;pdf.","DOI":"10.1093\/restud\/rdr027"},{"key":"e_1_2_1_26_1","first-page":"417","article-title":"Trust as an action. Euro","volume":"46","author":"Dumouchel P.","year":"2005","journal-title":"J. Sociol."},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the 13th Americas Conference on Information Systems.","author":"Dwyer C."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12459-4_3"},{"key":"e_1_2_1_29_1","volume-title":"Trust: The Social Virtues and the Creation of Prosperity","author":"Fukuyama F.","year":"1995"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518736"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the Semantic Network Analysis Workshop at the 4th International Semantic Web Conference.","author":"Golbeck J.","year":"2005"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11890850_12"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1561\/1800000006"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v12i11.2023"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 7th International Workshop on Cooperative Intelligent Agents. 238--249","author":"Golbeck J."},{"key":"e_1_2_1_36_1","unstructured":"Golbeck J. A. 2005b. Computing and applying trust in web-based social networks. Ph.D. thesis University of Maryland at College Park MD.   Golbeck J. A. 2005b. Computing and applying trust in web-based social networks. Ph.D. thesis University of Maryland at College Park MD."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1086\/225469"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1086\/228311"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIZ.2009.48"},{"key":"e_1_2_1_42_1","unstructured":"Hanchard S. 2008. Measuring trust and social networks - Where do we put our trust online&quest; Hitwise. http:\/\/weblogs.hitwise.com\/sandra-hanchard\/2008\/09\/measuring_trust_and_social_net.html.  Hanchard S. 2008. Measuring trust and social networks - Where do we put our trust online&quest; Hitwise. http:\/\/weblogs.hitwise.com\/sandra-hanchard\/2008\/09\/measuring_trust_and_social_net.html."},{"key":"e_1_2_1_43_1","unstructured":"Hang W. C. and Singh M. P. 2010. Trust based recommendation based on graph similarities. http:\/\/www.csc. ncsu.edu\/faculty\/mpsingh\/papers\/mas\/aamas-trust-10-graph.pdf.  Hang W. C. and Singh M. P. 2010. Trust based recommendation based on graph similarities. http:\/\/www.csc. ncsu.edu\/faculty\/mpsingh\/papers\/mas\/aamas-trust-10-graph.pdf."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/13691180500146185"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.1994.9990143"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1002\/bs.3830370304"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358995"},{"key":"e_1_2_1_48_1","first-page":"2","article-title":"Trust-based recommendations for publications: A multi-layer network approach","volume":"2","author":"Hess C.","year":"2006","journal-title":"IEEE Tech. Commit. Digital Librar. Bull."},{"key":"e_1_2_1_49_1","unstructured":"Hess C. 2008. Trust-based recommendations in multi-layer networks. Ph.D. thesis Otto-Friedrich University Bamberg\/University Paris-Sud.  Hess C. 2008. Trust-based recommendations in multi-layer networks. Ph.D. thesis Otto-Friedrich University Bamberg\/University Paris-Sud."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592452"},{"key":"e_1_2_1_51_1","volume-title":"Advances in Personal Relationships","author":"Holmes J."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1628\/093245607783242981"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDSO.2005.31"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00399.x"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1160633.1160854"},{"key":"e_1_2_1_56_1","volume-title":"Virtual Working: Social and Organisational Dynamics","author":"Jackson P. J.","year":"1999"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2007.07.008"},{"key":"e_1_2_1_58_1","volume-title":"Echo Chamber: Rush Limbaugh and the Conservative Media Establishment","author":"Jamieson K.","year":"2009"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0148-2963(03)00140-1"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1086\/233694"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of the 5th International Workshop on Security and Trust Management (STM'09)","author":"Josang A."},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of the 1st Workshop on Formal Aspects in Security and Trust (FAST'03)","author":"Josang A."},{"key":"e_1_2_1_64_1","volume-title":"Proceedings of the 29th Australasian Computer Science Conference (ACSC'06)","author":"Josang A."},{"key":"e_1_2_1_65_1","volume-title":"Proceedings of the 15th Bled Conference on Electronic Commerce. 891--900","author":"Josang A."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the IEEE Conference on E-Commerce (CEC'03)","author":"Jurca R."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/245108.245123"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1108\/08876040210419406"},{"key":"e_1_2_1_71_1","volume-title":"Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS'09)","volume":"2","author":"Kerr R."},{"key":"e_1_2_1_72_1","volume-title":"Proceedings of the 24th IEEE International Conference on Data Engineering Workshop. 531--536","author":"Kim Y. A.","year":"2008"},{"key":"e_1_2_1_73_1","first-page":"61","article-title":"The small world problem","volume":"39","author":"Kleinfeld J.","year":"2002","journal-title":"Soc. Social Sci. Public Policy"},{"key":"e_1_2_1_74_1","volume-title":"Trusting Agents for Trusting Electronic Societies","author":"Klos T. B."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1086\/230539"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:ITEM.0000008081.55563.d4"},{"key":"e_1_2_1_77_1","volume-title":"Proceedings of the 13th European Conference on Information Systems (ECIS'05)","author":"Kuan H."},{"key":"e_1_2_1_78_1","volume-title":"Sunny: A new algorithm for trust inference in social networks using probabilistic confidence models. In Proceedings of the 22nd National Conference on Artificial Intelligence","author":"Kuter U.","year":"2007"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.2307\/2096408"},{"key":"e_1_2_1_80_1","unstructured":"Lazarsfeld P. and Merton R. 1954. Friendship as a social process: A substantive and methodological analysis. In Freedom and Control in Modern Society M. Berger T. Abel and C. H. Page Eds. Van Nostrand New York 18--66.  Lazarsfeld P. and Merton R. 1954. Friendship as a social process: A substantive and methodological analysis. In Freedom and Control in Modern Society M. Berger T. Abel and C. H. Page Eds. Van Nostrand New York 18--66."},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1030.0136"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/63.4.967"},{"key":"e_1_2_1_83_1","first-page":"1","article-title":"A technique for the measurement of attitudes","volume":"140","author":"Likert R.","year":"1932","journal-title":"Archiv. Psychol."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1386790.1386838"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2007.82"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10383-4_42"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.17"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/NWESP.2005.32"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1108\/10662241111123739"},{"key":"e_1_2_1_90_1","unstructured":"Marsh S. P. 1994. Formalising trust as a computational concept. Ph.D. thesis University of Stirling.  Marsh S. P. 1994. Formalising trust as a computational concept. Ph.D. thesis University of Stirling."},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297235"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2009.380"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"e_1_2_1_94_1","unstructured":"Mika P. 2007. Social Networks and the Semantic Web. Springer.   Mika P. 2007. Social Networks and the Semantic Web. Springer."},{"key":"e_1_2_1_95_1","first-page":"333","article-title":"Organizational forms and managerial philosophies: A descriptive and analytical review","volume":"17","author":"Miles R. E.","year":"1995","journal-title":"Res. Organizat. Behav."},{"key":"e_1_2_1_96_1","first-page":"60","article-title":"The small world problem","volume":"1","author":"Milgram S.","year":"1967","journal-title":"Psychol. Today"},{"key":"e_1_2_1_97_1","unstructured":"Moibus M. and Quoc-Anh D. 2004. Social capital in social networks. http:\/\/www.earthinstitute. columbia.edu\/cgsd\/documents\/rosenblat.pdf.  Moibus M. and Quoc-Anh D. 2004. Social capital in social networks. http:\/\/www.earthinstitute. columbia.edu\/cgsd\/documents\/rosenblat.pdf."},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1177\/S0038038501000190"},{"key":"e_1_2_1_99_1","article-title":"Risk and trust in social exchange: An experimental test of a classical proposition","volume":"5","author":"Molm L. D.","year":"2000","journal-title":"Amer. J. Sociol."},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijasuc.2010.1301"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-009-0235-6"},{"key":"e_1_2_1_102_1","unstructured":"Mui L. 2003. Computational models of trust and reputation: Agents evolutionary games and social networks. Ph.D. thesis. http:\/\/groups.csail.mit.edu\/medg\/people\/lmui\/docs\/phddissertation.pdf.  Mui L. 2003. Computational models of trust and reputation: Agents evolutionary games and social networks. Ph.D. thesis. http:\/\/groups.csail.mit.edu\/medg\/people\/lmui\/docs\/phddissertation.pdf."},{"key":"e_1_2_1_103_1","volume-title":"Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS'02)","author":"Mui L."},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.533225"},{"key":"e_1_2_1_105_1","volume-title":"Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications (SOCA'10)","author":"Nepal S."},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.112"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2010.126"},{"key":"e_1_2_1_108_1","volume-title":"Proceedings of the 20th International Joint Conference on Artificial Intelligence. Morgan Kaufmann Publishers","author":"O'Donovan J."},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-6419.00127"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.106"},{"key":"e_1_2_1_111_1","volume-title":"Bowling Alone: The Collapse and Revival of American Community","author":"Putnam R.","year":"2000"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1353\/jod.1995.0002"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_2_1_114_1","volume-title":"Proceedings of the 2nd International Semantic Web Conference. 351--368","author":"Richardson M."},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.90.2.439"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.1967.tb01454.x"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0031464"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.926617"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1007\/11429760_6"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.123"},{"key":"e_1_2_1_121_1","unstructured":"Sabater J. 2002. Trust and reputation for agent societies. Ph.D. thesis Autonomous University Of Barcelona Spain. http:\/\/www.tesisenxarxa.net\/TESIS_UAB\/AVAILABLE\/TDX-0123104172828\/\/jsm1de1.pdf.  Sabater J. 2002. Trust and reputation for agent societies. Ph.D. thesis Autonomous University Of Barcelona Spain. http:\/\/www.tesisenxarxa.net\/TESIS_UAB\/AVAILABLE\/TDX-0123104172828\/\/jsm1de1.pdf."},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544854"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-004-0041-5"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839510050127579"},{"key":"e_1_2_1_125_1","unstructured":"Schneider O. 2009. Trust-aware social networking: A distributed storage system based on social trust and geographic proximity. M.S. thesis. http:\/\/www.peerson.net\/papers\/oliver_da.pdf.  Schneider O. 2009. Trust-aware social networking: A distributed storage system based on social trust and geographic proximity. M.S. thesis. http:\/\/www.peerson.net\/papers\/oliver_da.pdf."},{"key":"e_1_2_1_126_1","unstructured":"Scully M. and Preuss G. 1996. Two faces of trust: The roles of calculative and relational trust in work transformation. Tech. rep. working paper no. 3923--96 Massachusetts Institute of Technology.  Scully M. and Preuss G. 1996. Two faces of trust: The roles of calculative and relational trust in work transformation. Tech. rep. working paper no. 3923--96 Massachusetts Institute of Technology."},{"key":"e_1_2_1_127_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. 272--282","author":"Seshadri A."},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/367211.367255"},{"key":"e_1_2_1_129_1","first-page":"85","article-title":"Privacy, trust and policy based authorization framework for services in distributed environments","volume":"2","author":"Singh S.","year":"2007","journal-title":"Int. J. Comput. Sci."},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.136"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC-EAST.2004.64"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2004.52"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11109-009-9101-5"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1567-4223(02)00017-0"},{"key":"e_1_2_1_135_1","unstructured":"Suryanarayana G. T. R. 2004. A survey of trust management and resource discovery technologies in peer-to-peer applications. Tech. rep. UCI-ISR-04-6 Institute for Software Research University of California Irvine.  Suryanarayana G. T. R. 2004. A survey of trust management and resource discovery technologies in peer-to-peer applications. Tech. rep. UCI-ISR-04-6 Institute for Software Research University of California Irvine."},{"key":"e_1_2_1_136_1","volume-title":"Trust: A Sociological Theory","author":"Sztompka P.","year":"1999"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb046407"},{"key":"e_1_2_1_138_1","volume-title":"Proceedings of the Workshop on Models of Trust for the Web (MTW'06)","volume":"190","author":"Toivonen S."},{"key":"e_1_2_1_139_1","volume-title":"Proceedings of the INFOCOM IEEE Conference on Computer Communications Workshops. IEEE, 1--6.","author":"Trifunovic S."},{"key":"e_1_2_1_140_1","unstructured":"Tyler T. R. 1990. Why People Obey the Law. Yale University Press New Haven CT.  Tyler T. R. 1990. Why People Obey the Law. Yale University Press New Haven CT."},{"key":"e_1_2_1_141_1","volume-title":"Organizations: Frontiers of Theory and Research","author":"Tyler T. R.","year":"1996"},{"key":"e_1_2_1_142_1","unstructured":"Vigas F. B. and Donath J. 2004. Social network visualization: Can we go beyond the graph&quest; In Proceedings of the Workshop on Social Networks for Design and Analysis: Using Network Information in CSCW. 6--10.  Vigas F. B. and Donath J. 2004. Social network visualization: Can we go beyond the graph&quest; In Proceedings of the Workshop on Social Networks for Design and Analysis: Using Network Information in CSCW. 6--10."},{"key":"e_1_2_1_143_1","first-page":"95","article-title":"Towards reputable grids: Scalable computing","volume":"6","author":"von Laszewski G.","year":"2005","journal-title":"Pract. Exper."},{"key":"e_1_2_1_144_1","volume-title":"Proceedings of the 9th USENIX Security Symposium.","author":"Waldman M."},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639747"},{"key":"e_1_2_1_146_1","volume-title":"Proceedings of the International Conference on Computational Intelligence and Software Engineering (CiSE'10)","author":"Wang T."},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTDCS.2007.19"},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2007.16"},{"key":"e_1_2_1_149_1","volume-title":"Six Degrees: The Science of a Connected Age","author":"Watts D. J.","year":"2003"},{"key":"e_1_2_1_150_1","volume-title":"Proceedings of the 13th AAMAS Workshop on Trust in Agent Societies. http:\/\/www.csc.ncsu.edu\/faculty\/mpsingh\/papers\/mas\/aamas-trust-10-graph.pdf.","author":"Wei-Hang C."},{"key":"e_1_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1145\/238857.238860"},{"key":"e_1_2_1_152_1","first-page":"26","article-title":"The global village: Internet and community. Arts Sci","volume":"1","author":"Wellman B.","year":"2004","journal-title":"Rev."},{"key":"e_1_2_1_153_1","first-page":"131","article-title":"Calculativeness, trust and economic organization","volume":"30","author":"Williamson O. E.","year":"1993","journal-title":"J. Law Econ."},{"key":"e_1_2_1_154_1","volume-title":"Proceedings of the 28th Australasian Conference on Computer Science (ACSC'05)","author":"Wishart R."},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772790"},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1145\/779928.779972"},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69295-9_36"},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02704-8_15"},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.03.005"},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.2000.2909"},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2010.17"},{"key":"e_1_2_1_163_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556460.1556499"},{"key":"e_1_2_1_164_1","volume-title":"Proceedings of the 4th International Workshop on Cooperative Information Agents (CIA'00)","author":"Yu B."},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544809"},{"key":"e_1_2_1_166_1","volume-title":"Proceedings of the 1st IEEE Symposium on Multi-Agent Security and Survivability. IEEE Computer Society, 1--10","author":"Yu B."},{"key":"e_1_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839510050144868"},{"key":"e_1_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.35.2.151"},{"key":"e_1_2_1_169_1","volume-title":"Proceedings of the International Conference on Digital Government Research. Digital Government Society of North America, 17--26","author":"Zappen J. P."},{"key":"e_1_2_1_170_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2009.237"},{"key":"e_1_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1007\/11839569_18"},{"key":"e_1_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1043"},{"key":"e_1_2_1_173_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1021"},{"key":"e_1_2_1_174_1","volume-title":"Proceedings of the IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04)","author":"Ziegler C.-N."},{"key":"e_1_2_1_175_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2009.278"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2501654.2501661","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2501654.2501661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:48Z","timestamp":1750231728000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2501654.2501661"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":175,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["10.1145\/2501654.2501661"],"URL":"https:\/\/doi.org\/10.1145\/2501654.2501661","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8]]},"assertion":[{"value":"2011-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}