{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T13:40:09Z","timestamp":1732628409690,"version":"3.28.2"},"reference-count":48,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["WEB"],"published-print":{"date-parts":[[2017,8,11]]},"DOI":"10.3233\/web-170361","type":"journal-article","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T15:32:41Z","timestamp":1502465561000},"page":"251-268","source":"Crossref","is-referenced-by-count":1,"title":["Impact of social influence on trust management within communities of agents"],"prefix":"10.1177","volume":"15","author":[{"given":"Reda","family":"Yaich","sequence":"first","affiliation":[{"name":"IMT Atlantique, Lab-STICC, UMR CNRS 6285, Institut Mines-T\u00e9l\u00e9com, France. E-mail:\u00a0reda.yaich@imt-atlantique.fr"}]},{"given":"Olivier","family":"Boissier","sequence":"additional","affiliation":[{"name":"Mines Saint-\u00c9tienne, Laboratoire Hubert Curien UMR CNRS 5516, Institut Henri Fayol, France. E-mails:\u00a0boissier@emse.fr,\u00a0picard@emse.fr"}]},{"given":"Gauthier","family":"Picard","sequence":"additional","affiliation":[{"name":"Mines Saint-\u00c9tienne, Laboratoire Hubert Curien UMR CNRS 5516, Institut Henri Fayol, France. E-mails:\u00a0boissier@emse.fr,\u00a0picard@emse.fr"}]},{"given":"Philippe","family":"Jaillon","sequence":"additional","affiliation":[{"name":"Mines Saint-\u00c9tienne, Institut Henri Fayol, France. E-mail:\u00a0jaillon@emse.fr"}]}],"member":"179","reference":[{"key":"10.3233\/WEB-170361_ref1","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1038\/scientificamerican1155-31","article-title":"Opinions and social pressure","volume":"193","author":"Asch","year":"1955","journal-title":"Scientific American"},{"key":"10.3233\/WEB-170361_ref2","unstructured":"E.\u00a0Bertino, E.\u00a0Ferrari and A.\u00a0Squicciarini, X-tnl: An xml-based language for trust negotiations, in: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY \u201903, Washington, DC, USA, 2003, p.\u00a081, IEEE Computer Society. ISBN 0-7695-1933-4. URL http:\/\/dl.acm.org\/citation.cfm?id=826036.826848."},{"issue":"7","key":"10.3233\/WEB-170361_ref3","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1109\/TKDE.2004.1318565","article-title":"Trust-x: A peer-to-peer framework for trust establishment","volume":"16","author":"Bertino","year":"2004","journal-title":"IEEE Trans. on Knowl. and Data Eng."},{"key":"10.3233\/WEB-170361_ref4","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1111\/j.1559-1816.1999.tb00134.x","article-title":"The Milgram paradigm after 35 years: Some things we now know about obedience to Authority1","volume":"29","author":"Blass","year":"1999","journal-title":"Journal of applied social psychology"},{"key":"10.3233\/WEB-170361_ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49135-X_9"},{"key":"10.3233\/WEB-170361_ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"issue":"11","key":"10.3233\/WEB-170361_ref7","doi-asserted-by":"publisher","first-page":"1507","DOI":"10.1109\/TKDE.2010.83","article-title":"A\u00a0rule-based trust negotiation system","volume":"22","author":"Bonatti","year":"2010","journal-title":"IEEE Trans. on Knowl. and Data Eng."},{"key":"10.3233\/WEB-170361_ref8","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352620"},{"key":"10.3233\/WEB-170361_ref9","doi-asserted-by":"crossref","unstructured":"P.A.\u00a0Bonatti, L.\u00a0Juri, D.\u00a0Olmedilla and L.\u00a0Sauro, Policy-driven negotiations and explanations: Exploiting logic-programming for trust management, privacy & security, in: Logic Programming 2008, pp.\u00a0779\u2013784. URL http:\/\/link.springer.com\/chapter\/10.1007\/978-3-540-89982-2_76.","DOI":"10.1007\/978-3-540-89982-2_76"},{"issue":"3","key":"10.3233\/WEB-170361_ref10","doi-asserted-by":"publisher","first-page":"241","DOI":"10.3233\/JCS-2002-10303","article-title":"Regulating service access and information release on the web","volume":"10","author":"Bonatti","year":"2002","journal-title":"Journal of Computer Security"},{"key":"10.3233\/WEB-170361_ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2003.1248730"},{"key":"10.3233\/WEB-170361_ref13","doi-asserted-by":"publisher","DOI":"10.1145\/545056.545083"},{"issue":"3","key":"10.3233\/WEB-170361_ref14","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1037\/h0046408","article-title":"A study of normative and informational social influences upon individual judgment","volume":"51","author":"Deutsch","year":"1955","journal-title":"The Journal of Abnormal and Social Psychology"},{"key":"10.3233\/WEB-170361_ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-3614-5_3"},{"key":"10.3233\/WEB-170361_ref16","doi-asserted-by":"crossref","unstructured":"T.\u00a0Grandison and M.\u00a0Sloman, Trust management tools for Internet applications, in: Proceedings of the 1st International Conference on Trust Management, ITrust\u201903, Berlin, Heidelberg, 2003, pp.\u00a091\u2013107, Springer-Verlag. ISBN 3-540-40224-1. URL http:\/\/dl.acm.org\/citation.cfm?id=1759008.1759015.","DOI":"10.1007\/3-540-44875-6_7"},{"key":"10.3233\/WEB-170361_ref18","unstructured":"S.\u00a0Gupta and H.W.\u00a0Kim, Virtual community: Concepts, implications, and future research directions, in: Proceedings of the 10th American Conference on Information System, 2004, pp.\u00a02679\u20132687."},{"key":"10.3233\/WEB-170361_ref19","doi-asserted-by":"crossref","unstructured":"E.E.\u00a0Harris, Kants refutation of the ontological proof, Philosophy 52, 90 (1977). ISSN 00318191.","DOI":"10.1017\/S0031819100021562"},{"key":"10.3233\/WEB-170361_ref21","doi-asserted-by":"crossref","unstructured":"J.F.\u00a0Hubner, J.S.\u00a0Sichman and O.\u00a0Boissier, MOISE+: Towards a structural , functional , and deontic model for MAS organization, in: Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems, ACM Press, 2002, pp.\u00a01\u20132. ISBN 1581134800.","DOI":"10.1145\/544852.544858"},{"key":"10.3233\/WEB-170361_ref22","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.technovation.2010.10.002","article-title":"Open innovation: State of the art and future perspectives","volume":"31","author":"Huizingh","year":"2011","journal-title":"Technovation"},{"issue":"2","key":"10.3233\/WEB-170361_ref23","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10458-005-6825-4","article-title":"An integrated trust and reputation model for open multi-agent systems","volume":"13","author":"Huynh","year":"2006","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"10.3233\/WEB-170361_ref24","unstructured":"A.\u00a0J\u00f8sang and R.\u00a0Ismail, The beta reputation system, in: Proceedings of the 15th Bled Electronic Commerce Conference, Vol.\u00a0160, 2002, pp.\u00a0324\u2013337. doi:10.1.1.60.5461."},{"key":"10.3233\/WEB-170361_ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39718-2_26"},{"key":"10.3233\/WEB-170361_ref26","unstructured":"A.A.\u00a0Kalam, S.\u00a0Benferhat, A.\u00a0Mi\u00e8ge, R.\u00a0El Baida, F.\u00a0Cuppens, C.\u00a0Saurel, P.\u00a0Balbiani, Y.\u00a0Deswarte and G.\u00a0Trouessin, Organization based access control, in: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY \u201903, Washington, DC, USA, 2003, p.\u00a0120, IEEE Computer Society. ISBN 0-7695-1933-4. URL http:\/\/dl.acm.org\/citation.cfm?id=826036.826869."},{"key":"10.3233\/WEB-170361_ref27","unstructured":"I.\u00a0Kant, Kritik der praktischen Vernunft, Vol.\u00a056. Gutenberg Project, 1788. ISBN 3518076566."},{"key":"10.3233\/WEB-170361_ref28","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1037\/0003-066X.36.4.343","article-title":"The psychology of social impact","volume":"36","author":"Latan\u00e9","year":"1981","journal-title":"American Psychologist"},{"key":"10.3233\/WEB-170361_ref29","unstructured":"N.\u00a0Luhmann, Familiarity, confidence, trust: Problems and alternatives, in: Trust: Making and Breaking Cooperative Relations, Basil Blackwell, 1990, pp.\u00a015\u201335."},{"key":"10.3233\/WEB-170361_ref30","unstructured":"J.T.\u00a0Mahoney, A.S.\u00a0Huff and J.O.\u00a0Huff, Toward a new social contract theory in organizatioon science, Journal of Management Inquiry (1994). URL http:\/\/jmi.sagepub.com\/content\/3\/2\/153.short."},{"key":"10.3233\/WEB-170361_ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.1998.679731"},{"issue":"1","key":"10.3233\/WEB-170361_ref33","doi-asserted-by":"publisher","first-page":"24","DOI":"10.2307\/256727","article-title":"Affect- and cognition-based trust as foundations for interpersonal cooperation in organizations","volume":"38","author":"Mcallister","year":"1995","journal-title":"The Academy of Management Journal"},{"key":"10.3233\/WEB-170361_ref34","first-page":"87","article-title":"The second face of trust: Reflections on the dark side of interpersonal trust in organizations","volume":"6","author":"Mcallister","year":"1997","journal-title":"Research on Negotiation in Organizations"},{"key":"10.3233\/WEB-170361_ref35","unstructured":"B.\u00a0Misztal, Trust in Modern Societies: The Search for the Bases of Social Order, Wiley, 1996."},{"key":"10.3233\/WEB-170361_ref36","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-1031(80)90070-0","article-title":"Studies in social influence","volume":"16","author":"Moscovici","year":"1969","journal-title":"Journal of Experimental Social Psychology"},{"key":"10.3233\/WEB-170361_ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30073-1_9"},{"issue":"1","key":"10.3233\/WEB-170361_ref38","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1037\/0033-295X.93.1.23","article-title":"Differential contributions of majority and minority influence","volume":"93","author":"Nemeth","year":"1986","journal-title":"Psychological review"},{"key":"10.3233\/WEB-170361_ref39","unstructured":"L.\u00a0Pearlman, V.\u00a0Welch, I.\u00a0Foster, C.\u00a0Kesselman and S.\u00a0Tuecke, A community authorization service for group collaboration, in: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY\u201902), POLICY \u201902, IEEE Computer Society, Washington, DC, USA, 2002, p.\u00a050. ISBN 0-7695-1611-4. URL http:\/\/dl.acm.org\/citation.cfm?id=863632.883495."},{"key":"10.3233\/WEB-170361_ref40","unstructured":"Plato, The Republic. The Gutenberg Project, 1994."},{"issue":"4","key":"10.3233\/WEB-170361_ref41","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1111\/j.1467-6494.1967.tb01454.x","article-title":"A new scale for the measurement of interpersonal trust","volume":"35","author":"Rotter","year":"1967","journal-title":"Journal of Personality"},{"key":"10.3233\/WEB-170361_ref43","unstructured":"S.\u00a0Russell and P.\u00a0Norvig, Artificial Intelligence: A Modern Approach, Prentice Hall, 2010. ISBN 0136042597, 9780136042594."},{"key":"10.3233\/WEB-170361_ref44","doi-asserted-by":"publisher","DOI":"10.1145\/375735.376110"},{"issue":"2","key":"10.3233\/WEB-170361_ref45","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"29","author":"Sandhu","year":"1996","journal-title":"Computer"},{"key":"10.3233\/WEB-170361_ref46","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1111\/j.1468-5914.2011.00472.x","article-title":"The psychology of social norms","volume":"41","author":"Sherif","year":"1936","journal-title":"Journal for the Theory of Social Behaviour"},{"key":"10.3233\/WEB-170361_ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1266977.1266981"},{"issue":"8","key":"10.3233\/WEB-170361_ref48","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1080\/08839514.2010.499502","article-title":"L.I.A.R.: Achieving social control in open and decentralised multi-agent systems","volume":"24","author":"Vercouter","year":"2010","journal-title":"Journal Applied Artificial Intelligence"},{"issue":"8","key":"10.3233\/WEB-170361_ref49","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1080\/08839514.2010.499502","article-title":"L.I.A.R.: Achieving social control in open and decentralized multiagent systems","volume":"24","author":"Vercouter","year":"2010","journal-title":"Applied Artificial Intelligence"},{"issue":"1","key":"10.3233\/WEB-170361_ref50","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1086\/467284","article-title":"Calculativeness, trust, and economic organization","volume":"36","author":"Williamson","year":"1993","journal-title":"Journal of Law and Economics"},{"issue":"3","key":"10.3233\/WEB-170361_ref51","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1145\/1178618.1178623","article-title":"Safety in automated trust negotiation","volume":"9","author":"Winsborough","year":"2006","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"10.3233\/WEB-170361_ref52","doi-asserted-by":"crossref","unstructured":"R.\u00a0Yaich, O.\u00a0Boissier, G.\u00a0Picard and P.\u00a0Jaillon, Adaptiveness and social-compliance in trust management within virtual communities, Web Intelligence and Agent Systems (WIAS), Special Issue: Web Intelligence and Communities 11(4) (2013).","DOI":"10.3233\/WIA-130278"},{"issue":"1","key":"10.3233\/WEB-170361_ref53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/605434.605435","article-title":"Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation","volume":"6","author":"Yu","year":"2003","journal-title":"ACM Transactions on Information and System Security"}],"container-title":["Web Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/WEB-170361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T12:41:57Z","timestamp":1732624917000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospress&doi=10.3233\/WEB-170361"}},"subtitle":[],"editor":[{"given":"Pierre","family":"Maret","sequence":"additional","affiliation":[]},{"given":"Rajendra","family":"Akerkar","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Vercouter","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2017,8,11]]},"references-count":48,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/web-170361","relation":{},"ISSN":["2405-6464","2405-6456"],"issn-type":[{"type":"electronic","value":"2405-6464"},{"type":"print","value":"2405-6456"}],"subject":[],"published":{"date-parts":[[2017,8,11]]}}}