[1] |
KAMAL K , BHARADWAJ , MOHAMMAD YAHYA H , AL-SHAMRI . Fuzzy computational models for trust and reputation systems[J]. Electronic Commerce Research and Applications, 2009,8:37-47.
|
[2] |
XIA H , JIA Z P , EDWIN H M S . Research of trust model based on fuzzy theory in mobile ad hoc networks[J]. IET Inf Secur, 2014,8: 88-103.
|
[3] |
MIESO K D , SUN T , ISAAC W . Trust management in ubiquitous computing:a Bayesian approach[J]. Computer Communications, 2011,34: 398-406.
|
[4] |
CARMEN F G , ISAAC A , JAVIER L . Building trust from context similarity measures[J]. Computer Standards &Interfaces, 2014,36: 792-800.
|
[5] |
王江涛, 陈志刚, 邓晓衡 . 普适计算中一种上下文感知的自适应可信模型[J]. 通信学报, 2012,33(11): 41-56. WANG J T , CHEN Z G , DENG X H . Context-aware and self-adaptive trust model for pervasive computing[J]. Journal on Communications, 2012,33(11): 41-56.
|
[6] |
秦艳琳, 吴晓平, 高键鑫 . 分布式环境下信任路径选择性搜索及聚合研究[J]. 通信学报, 2012,33(Z1): 148-156. QIN Y L , WU X P , GAO J X . Research on selective trust-path search and aggregation in distributed environment[J]. Journal on Communi-cations, 2012,33(Z1): 148-156.
|
[7] |
李致远, 王汝传 . P2P 电子商务环境下的动态安全信任管理模型[J]. 通信学报, 2011,32(3): 50-59. LI Z Y , WANG R C . Dynamic secure trust management model for P2P e-commerce environments[J]. Journal on Communications, 2011,32(3): 50-59.
|
[8] |
顾鑫, 徐正全, 刘进 . 基于云理论的可信研究及展望[J]. 通信学报, 2011,32(7): 176-181. GU X , XU Z Q , LIU J . Review of cloud based trust model[J]. Journal on Communications, 2011,32(7): 176-181.
|
[9] |
LI X Y , DU J P . Adaptive and attribute-based trust model for servicelevel agreement guarantee in cloud computing[J]. IET Inf Secur, 2013,7: 39-50.
|
[10] |
KAWSER W N , TONNY S K , AMJAD H , et al. A fuzzy and prob-abilistic logic based representational model of certain trust model[A]. International Conference on Informatics,Electronics &Vi-sion[C]. 2012.1000-1005.
|
[11] |
LIU G F , WANG Y , MEHMET A O , et al. .Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks[J]. Transactions on Services Computing, 2013,6(2): 152-167.
|
[12] |
MARK H , SYED W J , PETER P V M , et al. Design and validation of a relative trust model[J]. Knowledge-Based Systems, 2014,57:81-94.
|
[13] |
张琳, 王汝传, 王海艳 . 基于多影响因素的网格信任传播算法[J]. 通信学报, 2011,32(7): 161-168. ZHANG L , WANG R C , WANG H Y . Trust transitivity algorithm based on multiple influencing factors for grid environment[J]. Journal on Communications, 2011,32(7): 161-168.
|
[14] |
田俊峰, 鲁玉臻, 李宁 . 基于推荐的信任链管理模型[J]. 通信学报, 2011,32(10): 1-9. TIAN J F , LU Y Z , LI N . Trust chain management model based on recommendation[J]. Journal on Communications, 2011,32(10): 1-9.
|
[15] |
蒋黎明, 张琨, 徐建 , 等. 证据信任模型中的信任传递与聚合研究[J]. 通信学报, 2011,32(8): 92-100. JIANG L M , ZHANG K , XU J , et al. Research on trust transitivity and aggregation in evidential trust model[J]. Journal on Communications, 2011,32(8): 92-100.
|
[16] |
MAGDALINI E , MALAMATI D L , IRAKLIS V . A trust-aware sys-tem for personalized user recommendations in social networks[J]. IEEE Transactions on Systems,Man,and Cybernetics:System, 2014,44(4): 409-421.
|