[1] Tran H, Hitchens M, Varadharajan V, et al. A trust based access control framework for P2P file-sharing systems//Proceedings of 38th Annual Hawaii International Conference on System Sciences (HICSS'05). Los Alamitos: IEEE Computer Society, 2005: 302c-302c. [2] Xiong Li, Liu Ling. Peer trust: supporting reputation-based trust for peer-to-peer electronic communities[J]. IEEE Trans on Knowledge and Data Engineering, 2004, 16(7): 843-857. [3] Apostolos T, Barry M G. Peer-to-peer networks based on hierarchies of trust//Proceedings of the 5th IEEE International Conference on Peer-to-Peer Computing. Washington: IEEE Computer Society, 2005: 160-161. [4] Kamvar S D, Schlosser M T, Garcia-Molina H. EigenRep: reputation management in P2P networks//Proceedings of the 12th International World Wide Web Conference. New York: ACM Press, 2003: 123-134. [5] Wang Yao, Vassileva J. Agents and peer-to-peer computing[M]. Berlin: Springer, 2004: 23-34. [6] 刘义春. 一个基于信任的P2P访问控制模型[J]. 计算机工程与应用, 2008, 44(1): 145-147. Liu Yichun. Trust-based P2P access control model[J]. Computer Engineering and Applications, 2008, 44(1): 145-147. [7] 文珠穆, 卢正鼎, 唐卓, 等. 基于RBAC的P2P网络环境信任模型研究[J]. 计算机科学, 2008, 35(6): 32-36. Wen Zhumu, Lu Zhengding, Tang Zhuo, et al. Trust model research in the P2P environment based on RBAC[J]. Computer Science, 2008, 35(6): 32-36. [8] 田春岐, 邹仕洪, 王文东, 等. 构造分布式P2P环境下抗攻击信任管理模型[J]. 北京邮电大学学报, 2007, 30(3): 63-65. Tian Chunqi, Zou Shihong, Wang Wendong, et al. Building an attack resistant trust management model for distributed P2P systems[J]. Journal of Beijing University of Posts and Telecommunications, 2007, 30(3): 63-65. [9] 李祖鹏, 黄建华, 唐辉. 基于P2P计算模式的自组织网络路由模型[J]. 软件学报, 2005, 16(5): 916-930. Li Zupeng, Huang Jianhua, Tang Hui. A fine-grained coalition access control policy for jointly-owned resources in collaborative environments[J]. Journal of Software,2005, 16(5): 916-930. |