[1] |
[EB/OL]..
|
[2] |
蔡希尧 . 信息系统的发展与创新[M]. 西安:西安电子科技大学出版社, 2011.
|
|
CAI X Y . Development and innovations of information systems[M]. Xi’an: Xidian University PressPress, 2011.
|
[3] |
YAO L , WANG L , KONG X W ,et al. An inter-domain authentication scheme for pervasive computing environment[J]. Computers and Mathematics with Applications, 2010,59(2): 811-821.
|
[4] |
SINGH N , CHHABRA G , SINGH K P ,et al. A secure authentication scheme in multi-operator domain (SAMD) for wireless mesh network[C]// The International Conference on Data Engineering and Communication Technology. 2016: 343-357.
|
[5] |
KHEDR W I , ABDALLA M I , ELSHEIKH A A.Enhanced inter-access service network handover authentication scheme for IEEE 802 . 16m network[J]. IET Information Security, 2015,9(6): 334-343.
|
[6] |
YAN J , LU Y , LIU Y ,et al. Research on beidou-based inter-domain identity authentication for mobile object[C]// 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA). 2014: 923-926.
|
[7] |
Web service federation language (WS-Federation) version1.0[EB/OL]. .
|
[8] |
Liberty alliance project. Liberty architecture overview v1.1[EB/OL]. .
|
[9] |
OASIS. Security assertion markup language v2.0[S]. 2005.
|
[10] |
RFC 1510. The kerberos network authentication service(V5)[S].
|
[11] |
MELLO D E R , WANGHAM M S , SILVA DF J . Model for authentication credentials translation in service oriented architecture[J]. Transactions on Computational Sciences Journal, 2009,5430: 68-86.
|
[12] |
CAHILL V , GRAY E , SEIGNEUR J M ,et al. Using trust for secure collaboration in uncertain environment[J]. Pervasive Computing,IEEE, 2003,2(1): 52-61.
|
[13] |
KAMVAR S , SCHLOSSER M,GARCIA-MOLINA H . The eigentrust algorithm for reputation management in P2P networks[C]// The 12th International Conference on World Wide Web. 2003: 640-651.
|
[14] |
BETH T , BORCHERDING M , KLEIN B . Valuation of trust in open networks[C]// The European Symposium on Research in Security (ESORICS). 1994: 3-18.
|
[15] |
SONG S , HWANG K , MACWAN M . Fuzzy trust integration for security enforcement in grid computing[J]. Network and Parallel Computing, 2004,3222: 9-21.
|
[16] |
ZADEH L A . 模糊集合、语言变量及模糊逻辑[M]. 北京: 科学出版社, 1982: 23-33.
|
|
ZADEH L A . Linguistic variable and fuzzy logic[M]. Beijing: Science PressPress, 1982: 23-33.
|
[17] |
ALFAREZ A R , HALLES S . A distributed trust model[C]// New Security Paradigms Workshop Langdale. 1997.
|
[18] |
汪培庄, 李洪兴 . 模糊系统理论与模糊计算机[M]. 北京: 科学出版社, 1996: 219-243.
|
|
WANG P Z , LI H X . Fuzzy system theory and fuzzy computer[M]. Beijing: Science PressPress, 1996: 219-243.
|