{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:57:13Z","timestamp":1725494233021},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540758525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75853-2_9","type":"book-chapter","created":{"date-parts":[[2007,11,3]],"date-time":"2007-11-03T07:18:16Z","timestamp":1194074296000},"page":"95-106","source":"Crossref","is-referenced-by-count":2,"title":["Distributed Dynamic Protection of Services on Ad Hoc and Peer to Peer Networks"],"prefix":"10.1007","author":[{"given":"Jimmy","family":"McGibney","sequence":"first","affiliation":[]},{"given":"Dmitri","family":"Botvich","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems, pp. 618\u2013644 (March 2007)","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"9_CR2","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1007\/978-94-017-3614-5_3","volume-title":"Trust and Deception in Virtual Societies","author":"R. Falcone","year":"2001","unstructured":"Falcone, R., Castelfranchi, C.: Social trust: a cognitive approach. In: Castelfranchi, C., Tan, Y.-H. (eds.) Trust and Deception in Virtual Societies, pp. 55\u201390. Kluwer Academic Publishers, Dordrecht (2001)"},{"key":"9_CR3","unstructured":"Dingledine, R., Freedman, M., Molnar, D.: Accountability measures for peer-to-peer systems, Peer-to-Peer: Harnessing the Power of Disruptive Technologies, O\u2019Reilly (2000)"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J. Douceur","year":"2002","unstructured":"Douceur, J.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"key":"9_CR5","unstructured":"Gambetta, D.: Can we trust trust? In: Gambetta, D. (ed.) Trust: making and breaking cooperative relations, pp. 213\u2013237. Basil Blackwell (1988)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: Proc. 12th World Wide Web Conf., Budapest (May 2003)","DOI":"10.1145\/775240.775242"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Gupta, M., Judge, P., Ammar, M.: A reputation system for peer-to-peer networks. In: Proc. 13th Int\u2019l Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV) (2003)","DOI":"10.1145\/776322.776346"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P., Violante, F.: A reputation-based approach for choosing reliable resources in peer-to-peer networks, In: Proc. 9th ACM conference on Computer and Communications Security (ASIACCS) (November 2002)","DOI":"10.1145\/586110.586138"},{"key":"9_CR9","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: bringing order to the web, Technical report, Stanford Digital Library Technologies Project (1998)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Repantis, T., Kalogeraki, V.: Decentralized trust management for ad-hoc peer-to-peer networks. In: Proc. MPAC 2006, Melbourne (November 2006), http:\/\/www.smartlab.cis.strath.ac.uk\/MPAC\/","DOI":"10.1145\/1169075.1169081"},{"key":"9_CR11","unstructured":"Zhou, L., Haas, Z.: Securing ad hoc networks. IEEE Network (November\/December 1999)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ubiquitous computing. IEEE Computer (Supplement on Security & Privacy), pp. 22-26 (April 2002)","DOI":"10.1109\/MC.2002.1012427"},{"key":"9_CR13","unstructured":"Yang, H., Shu, J., Meng, X., Lu, S.: SCAN: self-organized network-layer security in mobile ad hoc networks, IEEE Journal of Selected Areas in Communications (February 2006)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.-Y.: A robust reputation system for mobile ad-hoc networks, EPFL IC Technical Report IC\/2003\/50, EPFL (July 2003)","DOI":"10.1201\/9780203504086.ch20"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"McGibney, J., Botvich, D., Balasubramaniam, S.: A Combined Biologically and Socially Inspired Approach to Mitigating Ad Hoc Network Threats. In: Proc. 66th IEEE Vehicular Technology Conference (VTC), Baltimore (October 2007)","DOI":"10.1109\/VETECF.2007.422"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"McGibney, J., Schmidt, N., Patel, A.: A service-centric model for intrusion detection in next-generation networks. Computer Standards & Interfaces, pp. 513\u2013520 (June 2005)","DOI":"10.1016\/j.csi.2005.01.009"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","volume-title":"Service-Oriented Computing - ICSOC 2003","author":"R. Handorean","year":"2003","unstructured":"Handorean, R., Roman, G.-C.: Secure service provision in ad hoc networks. In: Orlowska, M.E., Weerawarana, S., Papazoglou, M.M.P., Yang, J. (eds.) ICSOC 2003. LNCS, vol.\u00a02910, Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","IP Operations and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75853-2_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:34:56Z","timestamp":1619519696000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75853-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540758525"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75853-2_9","relation":{},"subject":[]}}