[1] Blaze M, Feigenbaum J, Lacy J. Decentralized trust management[C]//Proceedings of the 1996 IEEE Symposium on Security and Privacy[S. l.]:IEEE, 1996:164-173.
[2] Glynos D, Argyroudis P, Douligeris C. Collaborative service evaluation with the Two Hop trust framework[J]. Security and Communication Networks, 2012, 5(6):594-613.
[3] Han Guangjie, Jiang Jinfang, Shu Lei, et al. Management and applications of trust in wireless sensor networks:a survey[J]. Journal of Computer and System Sciences, 2014, 80(3):602-617.
[4] 刘武, 段海新, 张洪, 等. TRBAC:基于信任的访问控制模型[J]. 计算机研究与发展, 2011, 48(8):1414-1420. Liu Wu, Duan Haixin, Zhang Hong, et al. TRBAC:Trust based access control model[J]. Journal of Computer Research and Development, 2011, 48(8):1414-1420.
[5] 李小勇, 桂小林. 动态信任预测的认知模型[J]. 软件学报, 2010, 1:163-176. Li Xiaoyong, Gui Xiaolin. Cognitive model of dynamic trust forecasting[J]. Journal of Software, 2010(1):163-176.
[6] 赵斌, 何泾沙, 黄娜, 等. 基于平衡权重的动态综合信任度量方法[J]. 北京邮电大学学报, 2015, 38(2):113-117. Zhao Bin, He Jingsha, Huang Na, et al. Dynamic global trust evaluation based on balance weight[J]. Journal of Beijing University of Posts and Telecommunications, 2015, 38(2):113-117.
[7] Masood R, Shibli M A, Ghazi Y, et al. Cloud authorization:exploring techniques and approach towards effective access control framework[J]. Frontiers of Computer Science, 2015, 9(2):297-321.
[8] Lu J, Joshi J B D, Jin L, et al. Towards complexity analysis of user authorization query problem in RBAC[J]. Computers and Security, 2015(48):116-130.
[9] 杨立, 左春, 王裕国. 面向服务的知识发现体系结构研究与实现[J]. 计算机学报, 2005, 28(4):445-457. Yang Li, Zuo Chun, Wang Yuguo. Research and implementation of service oriented architecture for knowledge discovery[J]. Chinese Journal of Computers, 2005, 28(4):445-457.
[10] Pawlak Z. Rough sets[J]. International Journal of Computer and Information Sciences, 1982, 11(5):341-356. |