{"id":"https://openalex.org/W2231765633","doi":"https://doi.org/10.1007/978-0-387-73655-6_3","title":"Trust without Truth","display_name":"Trust without Truth","publication_year":2007,"publication_date":"2007-11-23","ids":{"openalex":"https://openalex.org/W2231765633","doi":"https://doi.org/10.1007/978-0-387-73655-6_3","mag":"2231765633"},"language":"en","primary_location":{"id":"doi:10.1007/978-0-387-73655-6_3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-73655-6_3","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-73655-6_3.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-73655-6_3.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085624197","display_name":"Michel Deriaz","orcid":"https://orcid.org/0009-0009-3048-9891"},"institutions":[{"id":"https://openalex.org/I114457229","display_name":"University of Geneva","ror":"https://ror.org/01swzsf04","country_code":"CH","type":"education","lineage":["https://openalex.org/I114457229"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Michel Deriaz","raw_affiliation_strings":["University of Geneva, Switzerland"],"affiliations":[{"raw_affiliation_string":"University of Geneva, Switzerland","institution_ids":["https://openalex.org/I114457229"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5085624197"],"corresponding_institution_ids":["https://openalex.org/I114457229"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.12188542,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"31","last_page":"45"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.8229914903640747},{"id":"https://openalex.org/keywords/publication","display_name":"Publication","score":0.7342261672019958},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7196613550186157},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.5613606572151184},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.4786052405834198},{"id":"https://openalex.org/keywords/express-trust","display_name":"Express trust","score":0.47372785210609436},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4200955927371979},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4149423837661743},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.17802020907402039},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.162109375},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.1531665027141571},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.1268278956413269}],"concepts":[{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.8229914903640747},{"id":"https://openalex.org/C41458344","wikidata":"https://www.wikidata.org/wiki/Q732577","display_name":"Publication","level":2,"score":0.7342261672019958},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7196613550186157},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.5613606572151184},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.4786052405834198},{"id":"https://openalex.org/C76144217","wikidata":"https://www.wikidata.org/wiki/Q5421695","display_name":"Express trust","level":2,"score":0.47372785210609436},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4200955927371979},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4149423837661743},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.17802020907402039},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.162109375},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.1531665027141571},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.1268278956413269},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-0-387-73655-6_3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-73655-6_3","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-73655-6_3.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"},{"id":"pmh:oai:unige.ch:aou:unige:156231","is_oa":true,"landing_page_url":"https://archive-ouverte.unige.ch/unige:156231","pdf_url":null,"source":{"id":"https://openalex.org/S4306402259","display_name":"Archive ouverte UNIGE (University of Geneva)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114457229","host_organization_name":"University of Geneva","host_organization_lineage":["https://openalex.org/I114457229"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Mobile trust / Konstantas, Dimitri (ed.) (2007)\\n           p. 1-15","raw_type":"info:eu-repo/semantics/bookPart"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.177.4723","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.177.4723","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://asg.unige.ch/publications/TR07/01TrustWithoutTruth.pdf","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1007/978-0-387-73655-6_3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-0-387-73655-6_3","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-0-387-73655-6_3.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2231765633.pdf","grobid_xml":"https://content.openalex.org/works/W2231765633.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W118565521","https://openalex.org/W1536774006","https://openalex.org/W1580718936","https://openalex.org/W2021786882","https://openalex.org/W2064513415","https://openalex.org/W2163231058","https://openalex.org/W2171340077","https://openalex.org/W2501966114","https://openalex.org/W6604833187"],"related_works":["https://openalex.org/W3128275854","https://openalex.org/W90316445","https://openalex.org/W3118909103","https://openalex.org/W3126467163","https://openalex.org/W2127044499","https://openalex.org/W1563823494","https://openalex.org/W2053153894","https://openalex.org/W3125205738","https://openalex.org/W3123708469","https://openalex.org/W3123992156"],"abstract_inverted_index":{"Can":[0],"we":[1,77],"trust":[2,9,39,68,99],"without":[3],"any":[4],"reliable":[5],"truth":[6],"information?":[7],"Most":[8],"architectures":[10],"work":[11],"in":[12,127],"a":[13,16,33,54,108],"similar":[14],"way:":[15],"trustor":[17],"makes":[18,25],"some":[19,131],"observations,":[20],"rates":[21],"the":[22,60,67,79,82],"trustee,":[23],"and":[24,41,91,110,124],"recommendations":[26,43],"to":[27,48,65,73,97,117],"his":[28,38],"friends.":[29],"When":[30],"he":[31,36,51],"faces":[32],"new":[34],"case,":[35],"checks":[37],"table":[40],"uses":[42],"given":[44,55],"by":[45],"trustworthy":[46],"friends":[47],"decide":[49],"whether":[50],"will":[52],"undertake":[53],"action.":[56],"But":[57],"what":[58,76],"if":[59],"observations":[61],"that":[62,89],"are":[63,70,95],"used":[64,116],"update":[66],"tables":[69],"wrong?":[71],"How":[72],"deal":[74],"with":[75],"call":[78],"\u201cuncertainty":[80],"of":[81],"truth\u201d?":[83],"This":[84],"paper":[85],"presents":[86],"how":[87],"people":[88],"publish":[90],"remove":[92],"virtual":[93],"tags":[94],"able":[96],"create":[98],"relations":[100],"between":[101],"them.":[102],"A":[103],"simulator":[104],"as":[105,107],"well":[106],"concrete":[109],"widely":[111],"deployed":[112],"application":[113],"have":[114],"been":[115],"validate":[118],"our":[119],"model.":[120],"We":[121],"observed":[122],"good":[123],"encouraging":[125],"results":[126],"general,":[128],"but":[129],"also":[130],"weaknesses,":[132],"brought":[133],"out":[134],"through":[135],"specific":[136],"scenarios":[137]},"counts_by_year":[{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
