[1] Griffin J L, Jaeger T, Perez R, et al. Trusted virtual domains: toward secure distributed services[C]//Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability (HotDep'05). 2005, Yokohama, Japan, 2005: 12-17.[2] Feng Fujun, Lin Chuang, Peng Dongsheng, et al. A trust and context based access control model for distributed systems[C]// 10th IEEE International Conference on High Performance Computing and Communications (HPCC'08). Washington DC: IEEE, 2008: 629-634.[3] Blaze M, Feigenbaum J, Lacy J. Decentralized trust management[C]//IEEE Symposium on Security and Privacy. Oakland, CA, 1996: 164-173.[4] Han Guangjie, Jiang Jinfang, Shu Lei, et al. Management and applications of trust in wireless sensor networks: a survey[J]. Journal of Computer and System Sciences, 2014, 80(3): 602-617.[5] Glynos D, Argyroudis P, Douligeris C. Collaborative service evaluation with the TwoHop trust framework[J]. Security and Communication Networks, 2012, 5(6): 594-613.[6] Seredynski M, Aggoune R, Szczypiorski K, et al. Performance evaluation of trust-based collaborative sanctioning in MANETs[C]//12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Melbourne: IEEE, 2013: 81-88.[7] 张仕斌, 许春香. 基于云模型的信任评估方法研究[J]. 计算机学报, 2013, 36(2): 422-431. Zhang Shibin, Xu Chunxiang. Study on the trust evaluation approach based on cloud model[J]. Chinese Journal of Computers, 2013, 36(2): 422-431.[8] Li Changsong, Wang Shilong, Kang Ling. Trust evaluation model of cloud manufacturing service platform[J]. The International Journal of Advanced Manufacturing Technology, 2014, 75(1-4): 489-501.[9] Yang Xianmin, Qiu Qin, Yu Shengquan, et al. Designing a trust evaluation model for open-knowledge communities[J]. British Journal of Educational Technology, 2014, 45(5): 880-901.[10] 高键鑫, 吴晓平, 吴旭升. 采用信任度量的MANET网络分簇模型[J]. 北京邮电大学学报, 2014, 37(4): 125-130. Gao Jianxin, Wu Xiaoping, Wu Xusheng. A MANET clustering model based on trust measurement[J]. Journal of Beijing University of Posts and Telecommunications, 2014, 37(4): 125-130.[11] 胡勋, 孟祥武, 张玉洁, 等. 一种融合项目特征和移动用户信任关系的推荐算法[J]. 软件学报, 2014, 25(8): 1817-1830. Hu Xun, Meng Xiangwu, Zhang Yujie, et al. Recommendation algorithm combing item features and trust relationship of mobile users[J]. Journal of Software, 2014, 24(8): 1817-1830.[12] 赵斌, 何泾沙, 张伊璇. 开放式网络信任计算中多影响因子的分析[J]. 山东大学学报(理学版), 2014, 49(9): 103-108. Zhao Bin, He Jingsha, Zhang Yixuan. Analysis of multi-factor in trust evaluation of open network[J]. Journal of Shangdong University(Natural Science), 2014, 49(9): 103-108. |