{"id":"https://openalex.org/W2022502267","doi":"https://doi.org/10.1109/p2p.2012.6335795","title":"Disconnection punishment in trust bootstrapping: Benefits of activity stereotypes","display_name":"Disconnection punishment in trust bootstrapping: Benefits of activity stereotypes","publication_year":2012,"publication_date":"2012-09-01","ids":{"openalex":"https://openalex.org/W2022502267","doi":"https://doi.org/10.1109/p2p.2012.6335795","mag":"2022502267"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/p2p.2012.6335795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023440534","display_name":"Marc S\u00e1nchez\u2010Artigas","orcid":"https://orcid.org/0000-0002-9700-7318"},"institutions":[{"id":"https://openalex.org/I55952717","display_name":"Universitat Rovira i Virgili","ror":"https://ror.org/00g5sqv46","country_code":"ES","type":"funder","lineage":["https://openalex.org/I55952717"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Marc Sanchez-Artigas","raw_affiliation_strings":["Dept. of Computer Engineering and Maths, Universitat Rovira i Virgili, Spain"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Engineering and Maths, Universitat Rovira i Virgili, Spain","institution_ids":["https://openalex.org/I55952717"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5023440534"],"corresponding_institution_ids":["https://openalex.org/I55952717"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":64},"biblio":{"volume":null,"issue":null,"first_page":"149","last_page":"154"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.999,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.999,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9956,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9951,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/disconnection","display_name":"Disconnection","score":0.93161917},{"id":"https://openalex.org/keywords/bootstrapping","display_name":"Bootstrapping (finance)","score":0.8948949},{"id":"https://openalex.org/keywords/punishment","display_name":"Punishment (psychology)","score":0.65681475},{"id":"https://openalex.org/keywords/downtime","display_name":"Downtime","score":0.4757942}],"concepts":[{"id":"https://openalex.org/C2780371621","wikidata":"https://www.wikidata.org/wiki/Q3709910","display_name":"Disconnection","level":2,"score":0.93161917},{"id":"https://openalex.org/C207609745","wikidata":"https://www.wikidata.org/wiki/Q4944086","display_name":"Bootstrapping (finance)","level":2,"score":0.8948949},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6757418},{"id":"https://openalex.org/C2779295839","wikidata":"https://www.wikidata.org/wiki/Q3544090","display_name":"Punishment (psychology)","level":2,"score":0.65681475},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.55564785},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49643832},{"id":"https://openalex.org/C180591934","wikidata":"https://www.wikidata.org/wiki/Q1253369","display_name":"Downtime","level":2,"score":0.4757942},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.465915},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.21988243},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.1883173},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18693358},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.18162555},{"id":"https://openalex.org/C149782125","wikidata":"https://www.wikidata.org/wiki/Q160039","display_name":"Econometrics","level":1,"score":0.12596026},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.10755399},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.08458668},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/p2p.2012.6335795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.83,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W2012694869","https://openalex.org/W2043458086","https://openalex.org/W2044337427","https://openalex.org/W2076015191","https://openalex.org/W2114094444","https://openalex.org/W2117274419","https://openalex.org/W2139063802","https://openalex.org/W2148573461","https://openalex.org/W2154282625","https://openalex.org/W2161884417","https://openalex.org/W2164671100"],"related_works":["https://openalex.org/W4213090228","https://openalex.org/W3195581173","https://openalex.org/W2954002293","https://openalex.org/W2164372000","https://openalex.org/W2161582432","https://openalex.org/W2160130371","https://openalex.org/W2109143577","https://openalex.org/W2078264086","https://openalex.org/W2046276983","https://openalex.org/W2022502267"],"abstract_inverted_index":{"Trust-based":[0],"systems":[1],"have":[2,22],"been":[3,23],"proposed":[4],"as":[5,67],"means":[6],"to":[7,101,115],"fight":[8],"against":[9],"malicious":[10],"agents":[11,39,132],"in":[12,26,64],"peer-to-peer":[13],"networks.":[14],"However,":[15],"there":[16,74],"still":[17],"exist":[18],"some":[19],"issues":[20],"that":[21,73,84],"generally":[24],"overlooked":[25],"the":[27,33,65,85,94,103,110,119,127,131,134,141],"literature.":[28],"One":[29],"of":[30,35,87,105,109,130,136],"them":[31],"is":[32,40,59,62,75,90,150],"question":[34,48],"whether":[36],"punishing":[37],"disconnecting":[38],"effective.":[41],"In":[42],"this":[43,47,88],"paper,":[44],"we":[45,71,113],"investigate":[46],"for":[49,81],"these":[50],"initial":[51],"cases":[52],"where":[53],"prior":[54],"direct":[55,146],"and":[56,83,96,147],"reputational":[57,148],"evidence":[58],"unavailable,":[60],"what":[61],"referred":[63],"literature":[66],"trust":[68,120,142],"bootstrapping.":[69],"First,":[70],"demonstrate":[72],"not":[76],"a":[77],"universally":[78],"optimal":[79],"penalty":[80],"disconnection":[82,111],"effectiveness":[86],"punishment":[89],"markedly":[91],"dependent":[92],"on":[93,126],"uptime":[95],"downtime":[97],"session":[98],"lengths.":[99],"Second,":[100],"minimize":[102],"effects":[104],"an":[106],"inadequate":[107],"selection":[108,135],"penalty,":[112],"propose":[114],"incorporate":[116],"predictions":[117,124],"into":[118],"bootstrapping":[121,143],"process.":[122],"These":[123],"based":[125],"current":[128],"activity":[129],"enhance":[133],"potentially":[137],"long-lived":[138],"trustees,":[139],"shortening":[140],"time":[144],"when":[145],"information":[149],"lacking.":[151]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2022502267","counts_by_year":[],"updated_date":"2025-03-30T13:12:02.798184","created_date":"2016-06-24"}