{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:11:05Z","timestamp":1729663865172,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/chinagrid.2010.39","type":"proceedings-article","created":{"date-parts":[[2010,9,8]],"date-time":"2010-09-08T16:20:02Z","timestamp":1283962802000},"page":"234-239","source":"Crossref","is-referenced-by-count":0,"title":["A Trust Evaluation Model Based on Resistive Network"],"prefix":"10.1109","author":[{"given":"Xiaoqian","family":"Liu","sequence":"first","affiliation":[]},{"given":"Shoubao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Shuling","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Introduction to Algorithms","year":"0","author":"gormen","key":"ref10"},{"journal-title":"Sophisticated Network Theory and Applications","year":"0","author":"wang","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2004-00125-x"},{"key":"ref13","first-page":"59","article-title":"Semantic constraints for trust transitivity [C]","volume":"2005","author":"josang","year":"2005","journal-title":"Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling-Volume"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926814"},{"key":"ref15","article-title":"A reputation-based trust model for peer-to-peer ecommerce communities [C]","author":"xiong","year":"2003","journal-title":"IEEE Conference on E-Commerce (CEC'03)"},{"key":"ref16","article-title":"A decentralized trust model [C]","author":"abdul-rahman","year":"1998","journal-title":"Proceedings of the 1997 New Security Paradigms Workshop"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/352871.352889"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/941079.941081"},{"key":"ref3","first-page":"115","article-title":"Advanced P2P Architecture Using Autonomous Agents","author":"homayounfar","year":"2002","journal-title":"15th International Conference on Computer Applications in Industry and Engineering"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1126\/science.162.3859.1243","article-title":"The tragedy of the Commons","volume":"162","author":"hardin","year":"1968","journal-title":"Science"},{"key":"ref5","article-title":"Free riding on Gnutella","author":"adar","year":"2000","journal-title":"Xerox PARC"},{"key":"ref8","article-title":"Reputation in Auctions: Theory, and Evidence from eBay","author":"houser","year":"2004","journal-title":"Journal of Economics and Management Strategy"},{"year":"0","key":"ref7"},{"journal-title":"Trust-Aware P2P Topology Structure and Correlated Technical Study","year":"2003","author":"dou","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1610546"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"}],"event":{"name":"2010 Fifth Chinagrid Annual Conference (ChinaGrid)","start":{"date-parts":[[2010,7,16]]},"location":"Guangzhou, TBD, China","end":{"date-parts":[[2010,7,18]]}},"container-title":["2010 Fifth Annual ChinaGrid Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5562735\/5562862\/05562876.pdf?arnumber=5562876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T09:49:22Z","timestamp":1497865762000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5562876\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/chinagrid.2010.39","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}