{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:37:34Z","timestamp":1730205454371,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/cec-eee.2007.100","type":"proceedings-article","created":{"date-parts":[[2007,8,8]],"date-time":"2007-08-08T19:12:37Z","timestamp":1186600357000},"page":"270-277","source":"Crossref","is-referenced-by-count":2,"title":["Towards an Objective Assessment of Centrality Measures in Reputation Systems"],"prefix":"10.1109","author":[{"given":"Christian","family":"von der Weth","sequence":"first","affiliation":[]},{"given":"Klemens","family":"Bohm","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Algorithms for representing network centrality, groups and density & clustered graph representation","author":"gaertler","year":"2004","journal-title":"Tech Rep D"},{"journal-title":"Web Spam Taxonomy","year":"2005","author":"gy\u00f6ngyi","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.288088"},{"key":"ref13","article-title":"The beta reputation system","author":"ismail","year":"2002","journal-title":"15th Bled EC"},{"journal-title":"The Eigentrust Algorithm for Reputation Management in P2P Networks","year":"2003","author":"kamvar","key":"ref14"},{"journal-title":"Rank Correlation Methods","year":"1990","author":"kendall","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"ref17","article-title":"Deeper inside pagerank","author":"langville","year":"2005","journal-title":"Internet Mathematics"},{"journal-title":"A survey of eigenvector methods for web information retrieval","year":"2005","author":"langville","key":"ref18"},{"key":"ref19","article-title":"Attack-resistant trust metrics for public key certification","author":"levien","year":"0","journal-title":"Security '98"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1052934.1052942"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(97)00007-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1052934.1052938"},{"key":"ref6","article-title":"Spearman's footrule as a measure of disarray","volume":"b 39","author":"diaconis","year":"0","journal-title":"JSTOR'77"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2004.1268664"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1013367.1013537"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2003.1232056"},{"key":"ref7","article-title":"The sybil attack","author":"douceur","year":"0","journal-title":"IPTPS '01"},{"journal-title":"A Survey on PageRank computing","year":"2005","author":"berkhin","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480102412856"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/502585.502638"},{"journal-title":"Foundations of Social Research","year":"1976","author":"lin","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3115\/1219044.1219064"},{"journal-title":"Trust Management for the Semantic Web","year":"0","author":"matthew","key":"ref21"},{"key":"ref24","article-title":"Efficient and decentralized pagerank approximation in a peer-to-peer web search network","author":"parreira","year":"0","journal-title":"VLDB 2006"},{"key":"ref23","article-title":"The pager-ank citation ranking: Bringing order to the web","author":"page","year":"1998","journal-title":"Technical Report"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134738"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"}],"event":{"name":"The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007)","start":{"date-parts":[[2007,7,23]]},"location":"Tokyo, Japan","end":{"date-parts":[[2007,7,26]]}},"container-title":["The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4285175\/4285176\/04285224.pdf?arnumber=4285224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T20:56:56Z","timestamp":1489697816000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4285224\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cec-eee.2007.100","relation":{},"subject":[],"published":{"date-parts":[[2007,7]]}}}