{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:15:56Z","timestamp":1729628156454,"version":"3.28.0"},"reference-count":52,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.186","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"1522-1527","source":"Crossref","is-referenced-by-count":2,"title":["A Research Model for Trustworthy Pervasive Social Networking"],"prefix":"10.1109","author":[{"given":"Zheng","family":"Yan","sequence":"first","affiliation":[]},{"given":"Peng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Valtteri","family":"Niemi","sequence":"additional","affiliation":[]},{"given":"Raimo","family":"Kantola","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1185448.1185475"},{"key":"36","first-page":"218","article-title":"Mailtrust: A mail reputation mechanism based on improved trustguard","author":"zhang","year":"2010","journal-title":"Proceedings of the CMC"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"journal-title":"Observation-Based Cooperation Enforcement in Ad hoc Networks","year":"2003","author":"bansal","key":"34"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.419"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2009.15"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.319"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/245108.245121"},{"key":"42","first-page":"167","article-title":"Trust in recommender systems","author":"o'donovan","year":"2006","journal-title":"Proc of IUI'05"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1145\/1216895.1216897"},{"key":"40","first-page":"63","article-title":"Topical trustrank: Using topicality to combat web spam","author":"wu","year":"2008","journal-title":"Proc of WWW '06"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1080192.1080204"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2010.5466696"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02704-8_14"},{"key":"25","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1145\/779928.779981","article-title":"Reputation rating system based on past behavior of evaluators","author":"kujimura","year":"2003","journal-title":"Proc of the 4th ACM Conference on Electronic Commerce"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.180"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4473092"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.14778\/1687553.1687611"},{"journal-title":"MicroBlog","year":"2012","key":"2"},{"journal-title":"Junction Stanford MobiSocial Group","year":"2012","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2009.933475"},{"journal-title":"EZSetup","year":"2012","key":"6"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-CPSCom.2010.65"},{"key":"31","article-title":"The effect of rumor spreading in reputation systems for mobile ad-hoc networks","author":"buchegger","year":"2003","journal-title":"WiOpt 03 Modeling and optimization in mobile ad hoc and wireless networks"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935160"},{"key":"9","article-title":"A practical reputation system for pervasive social chatting","author":"yan","year":"2012","journal-title":"Journal of Computer and System Sciences"},{"journal-title":"Familiar Strangers","year":"2012","key":"8"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/S0278-0984(02)11030-3"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-804-8.ch013"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.136"},{"key":"15","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","article-title":"Information theoretic framework of trust modeling and evaluation for ad hoc networks","volume":"24","author":"sun","year":"2006","journal-title":"IEEE Journal on Selected Area in Communications"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861390"},{"key":"13","first-page":"337","article-title":"Sensing meets mobile social networks: The design, implementation and evaluation of the cenceme application","author":"emiliano","year":"2008","journal-title":"Proceedings on SenSys '08"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61520-682-7"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16355-5_33"},{"key":"12","first-page":"216","article-title":"An investigation into facebook friends grouping","author":"kelley","year":"2011","journal-title":"Proc IFIP conference on Human-Computer Interaction (INTERACT)"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481349"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"49","first-page":"1","article-title":"Preserving privacy in locationbased mobile social applications","author":"krishna","year":"2010","journal-title":"Proc HotMobile"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180349"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2005.117"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2009.822"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2007.67"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2006.61"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23641-9_25"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.243"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0214-3"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2008.156"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06681010.pdf?arnumber=6681010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,4]],"date-time":"2019-08-04T21:36:41Z","timestamp":1564954601000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6681010\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.186","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}