[1] Blaze M, Feigenbaum J, Lacy J. Decentralized trust management//Proceedings of the 17th Symposium on Security and Privacy. Oakland: IEEE Computer Society Press, 1996: 164-173. [2] Li Ninghui, Mitchell J C, Winsborough W H. Design of a role-based trust management framework//Los Alamitos, California: IEEE Computer Society Press, 2002(2003-04-20) . http://crypto.stanford.edu/~ninghui/papers/rt-oakland02.pdf. [3] Almenarez F, Marin A, Diaz D, et al. Developing a model for trust management in pervasive devices//Proceedings of the 3rd IEEE int'l Workshop on Pervasive Computing and Communication Security. Washington: IEEE Computer Society Press, 2006: 267-272. [4] Melaye D, Demazeau Y. Bayesian dynamic trust model//LNCS3690.Berlin:Springer-Verlag, 2005: 480-489. [5] Sandhu R, Park J. The UCONABC usage control model[J]. Transaction on Information and System Security, 2004, 7(1): 128-174. [6] Ruohomaa S, Kutvonen L. Trust management survey//LNCS 3477. Berlin: Springer-Verlag, 2005: 77-92. [7] 石志国, 贺也平, 张宏. 一种对等计算安全性的时间自衰减信任管理算法. 计算机研究与发展, 2007, 44(1): 1-10. Shi Zhiguo, He Yeping, Zhang Hong. A time self-decay trust management algorithm for P2P computing securit[J]. Journal of Computer Research and Development, 2007, 44(1): 1-10. [8] 田春岐, 邹仕洪, 王文东, 等. 构造分布式P2P环境下抗攻击信任管理模型[J]. 北京邮电大学学报, 2007, 30(3): 62-65. Tian Chunqi, Zou Shihong, Wang Wendong, et al. Building an attack resistant trust management model for distributed P2P systems[J]. Journal of Beijing University of Posts and Telecommunications, 2007, 30(3): 62-65. |