{"id":"https://openalex.org/W1566677082","doi":"https://doi.org/10.1109/perser.2005.1506381","title":"Managing trust in distributed environments","display_name":"Managing trust in distributed environments","publication_year":2005,"publication_date":"2005-09-12","ids":{"openalex":"https://openalex.org/W1566677082","doi":"https://doi.org/10.1109/perser.2005.1506381","mag":"1566677082"},"language":"en","primary_location":{"id":"doi:10.1109/perser.2005.1506381","is_oa":false,"landing_page_url":"https://doi.org/10.1109/perser.2005.1506381","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001443156","display_name":"Karl Aberer","orcid":"https://orcid.org/0000-0003-3005-7342"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]},{"id":"https://openalex.org/I29607241","display_name":"\u00c9cole Normale Sup\u00e9rieure - PSL","ror":"https://ror.org/05a0dhs15","country_code":"FR","type":"funder","lineage":["https://openalex.org/I2746051580","https://openalex.org/I29607241"]}],"countries":["CH","FR"],"is_corresponding":true,"raw_author_name":"K. Aberer","raw_affiliation_strings":["Distributed Information Systems Laboratory, Institute for Core Computing Science, School for Computer and Communication Science, EPF Lausanne, Lausanne, Switzerland","Distributed Inf. Syst. Lab, Ecole Polytech Fed. de Lausanne, Switzerland"],"affiliations":[{"raw_affiliation_string":"Distributed Information Systems Laboratory, Institute for Core Computing Science, School for Computer and Communication Science, EPF Lausanne, Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864"]},{"raw_affiliation_string":"Distributed Inf. Syst. Lab, Ecole Polytech Fed. de Lausanne, Switzerland","institution_ids":["https://openalex.org/I29607241"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5001443156"],"corresponding_institution_ids":["https://openalex.org/I29607241","https://openalex.org/I5124864"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.13780652,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"4","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9562000036239624,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9562000036239624,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8026527166366577},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.7638781070709229},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.7586260437965393},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.666459858417511},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.6017261147499084},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.52774578332901},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4978320598602295},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.46983855962753296},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3898826837539673},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33064764738082886},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27378201484680176}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8026527166366577},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.7638781070709229},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.7586260437965393},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.666459858417511},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.6017261147499084},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.52774578332901},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4978320598602295},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.46983855962753296},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3898826837539673},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33064764738082886},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27378201484680176},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/perser.2005.1506381","is_oa":false,"landing_page_url":"https://doi.org/10.1109/perser.2005.1506381","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICPS '05. Proceedings. International Conference on Pervasive Services, 2005.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2102271161","https://openalex.org/W2017432143","https://openalex.org/W1973694374","https://openalex.org/W4313425421","https://openalex.org/W2983574358","https://openalex.org/W2370475531","https://openalex.org/W4385924768","https://openalex.org/W4256551238","https://openalex.org/W2361883455","https://openalex.org/W2952832228"],"abstract_inverted_index":{"Summary":[0],"form":[1],"only":[2],"given.":[3],"In":[4,104],"pervasive":[5],"computing":[6,50],"the":[7,45,61,69,72,80,86,93],"involved":[8],"agents":[9,198],"and":[10,19,30,101,109,129,135,163],"services":[11,36],"must":[12,75,90],"organize":[13],"themselves":[14],"dynamically":[15],"both":[16],"in":[17,22,185],"cooperative":[18],"non-cooperative":[20],"environments":[21],"order":[23],"to":[24,38,43,116,171,178,181],"enable":[25,44,164],"sharing":[26],"of":[27,34,47,60,96,169,189],"distributed":[28],"resources":[29],"knowledge":[31],"discovery.":[32],"Provisioning":[33],"trusted":[35],"appears":[37],"be":[39,179],"an":[40],"important":[41],"factor":[42],"success":[46],"this":[48,105,118],"new":[49],"paradigm.":[51],"Reputation-based":[52],"trust":[53,73,97],"management":[54],"models":[55,74,147],"are":[56,148,176],"becoming":[57],"a":[58,65,99,165,186],"focus":[59],"research":[62],"community":[63],"as":[64,83,98,193],"viable":[66],"solution.":[67],"On":[68],"one":[70],"hand,":[71,88],"satisfy":[76],"constraints":[77],"imposed":[78],"by":[79],"environment,":[81],"such":[82],"scalability,":[84],"on":[85,140],"other":[87],"they":[89],"comply":[91],"with":[92],"unique":[94],"properties":[95],"social":[100,124,161,174],"economic":[102,197],"phenomenon.":[103],"paper":[106],"we":[107],"classify":[108],"compare":[110],"approaches":[111],"that":[112],"have":[113],"been":[114],"proposed":[115],"fulfil":[117],"task.":[119],"The":[120],"identified":[121],"classes":[122],"are:":[123],"networks,":[125],"probabilistic":[126,136,143],"estimation":[127,137],"techniques":[128,138,154],"game-theoretic":[130,146],"reputation":[131,170],"systems.":[132],"Social":[133],"networks":[134,162,175],"operate":[139],"so":[141],"called":[142],"behavior,":[144],"while":[145,173],"suitable":[149],"for":[150,195],"rational":[151,196],"behavior.":[152,208],"Probabilistic":[153],"normally":[155],"imply":[156],"smaller":[157],"implementation":[158],"overheads":[159],"than":[160],"more":[166],"intuitive":[167],"transition":[168],"trust,":[172],"believed":[177],"able":[180],"better":[182],"detect":[183],"misbehavior":[184],"broader":[187],"range":[188],"settings.":[190],"Game-theoretic":[191],"models,":[192],"appropriate":[194],"maximizing":[199],"their":[200],"utilities,":[201],"can":[202],"under":[203],"specific":[204],"circumstances":[205],"enforce":[206],"trustworthy":[207]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
