References
1. G. A. Akerlof. The Market for ‘Lemons’: Quality Uncertainty and the Market Mechanism.
Quartely Journal of Economics, 84(3):488–500, 1970.
2. R. Au, M. Looi, and P. Ashley. Automated Cross-Organisational Trust Establishment on
Extranets. In ITVE ’01: Proceedings of the Workshop on Information Technology for Virtual
Enterprises, pages 3–11, Washington, DC, USA, 2001. IEEE Computer Society.
3. Y. Bakos. The Emerging Role of Electronic Marketplaces on the Internet. Communincations
of the ACM, 41(8):35–42, 1998.
4. C. Beam and A. Segev. Automated Negotiations: A Survey of the State of the Art.
Wirtschaftsinformatik, 39(3):263–268, 1997.
5. M. Bichler. A Roadmap to Auction-based Negotiation Protocols for Electronic Commerce.
In HICSS ’00: Proceedings of the 33rd Hawaii International Conference on System Sciences,
volume 6, Washington, DC, USA, 2000. IEEE Computer Society.
6. G. Caronni. Walking the Web of Trust. In WETICE ’00: Proceedings of the 9th IEEE
International Workshops on Enabling Technologies, pages 153–158, Washington, DC, USA,
2000. IEEE Computer Society.
7. A. Cheng and E. Friedman. Sybilproof Reputation Mechanisms. In P2PECON ’05: Pro-
ceeding of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems,
pages 128–132, New York, NY, U SA, 2005. ACM Press.
8. The MultiNeg Consortium. http:www.fbw.h-da.de/multineg, 2007.
9. C. Dellarocas. Immunizing Online Reputation Reporting Systems Against Unfair Ratings
and Discriminatory Behavior. In EC ’00: Proceedings of the 2nd ACM Conference on Elec-
tronic commerce, pages 150–157, New York, NY, USA, 2000. ACM Press.
10. E. Friedman and P. Resnickl. The Social Cost of Cheap Pseudonyms. Journal of Economics
& Management Strategy, 10(2):173–199, 2001.
11. A. Jøsang, R. Hayward, and S. Pope. Trust Network Analysis with Subjective Logic. In
ACSC ’06: Proceedings of the 29th Australasian Computer Science Conference, pages 85–
94, Darlinghurst, Australia, Australia, 2006. Australian Computer Society, Inc.
12. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The Eigentrust Algorithm for Repu-
tation Management in P2P Networks. In WWW ’03: Proceedings of the 12th international
conference on World Wide Web, pages 640–651, New York, NY, USA, 2003. ACM Press.
13. U. M. Maurer. Modelling a Public-Key Infrastructure. In E. Bertino, H. Kurth, G. Martella,
and E. Montolivo, editors, Computer Security - ESORICS 96, 4th European Symposium on
Research in Computer Security, volume 1146 of Lecture Notes in Computer Science, pages
325–350. Springer, 1996.
14. M. Rebstock and M. Lipp. Webservices zur Integration interaktiver elektronischer Verhand-
lungen in elektronische Marktpl
¨
atze. Wirtschaftsinformatik, 45(3):293–306, 2003.
15. P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman. Reputation systems. Communi-
cations of the ACM, 43(12):45–48, 2000.
16. A. Schlosser, M. Voss, and L. Br
¨
uckner. On the Simulation of Global Reputation Systems.
Journal of Artificial Societies and Social Simulation, 9(1), 2005.
17. R. Wilson. Reputations in Games an Markets. Game Theoretic Models of Bargaining, 1985.
18. W. Zhang, L. Liu, and Y. Zhu. A Computational Trust Model for C2C Auctions. In Ser-
vices Systems and Services Management, Proceedings of ICSSSM ’05. 2005 International
Conference, 2005.
19. P. R. Zimmermann. The official PGP User’s Guide. MIT Press, Cambridge, MA, USA,
1995.
62