[1] |
冯登国, 张敏, 张妍 等. 云计算安全研究[J]. 软件学报, 2011,22(1):71-83. FENG D G , ZHANG M , ZHANG Y , et al. Study on cloud computing security[J]. Journal of Software, 2011,22(1):71-83.
|
[2] |
张琳, 王汝传, 张永平 . 一种基于模糊集合的可用于网格环境的信任评估模型[J]. 电子学报, 2008,36(5):862-868. ZHANG L , WANG R C , ZHANG Y P . A trust evaluation model based on fuzzy set for grid environment[J]. Acta Electronica Sinica, 2008,36(5):862-868.
|
[3] |
王守信, 张莉, 李鹤松 . 一种基于云模型的主观信任评价方法[J]. 计算机学报, 2010,21(6):1341-1352. WANG S X , ZHANG L , LI H S . Evaluation approach of subjec-tivetrust based on cloud model[J]. Journal of Software, 2010,21(6):1341-1352.
|
[4] |
MOHAMMAD G U , MOHAMMAD Z , SHEIKH I A . CAT: a context aware trust model for open and dynamic systems[A]. Proceedings of the 23rd Annual ACM Symposium on Applied Computing, SAC'08[C]. Fortaleza, Ceara, Brazil, 2008.2024-2029.
|
[5] |
李峰, 申利民, 司亚利 等. 基于交互感知的动态自适应的信任评估模型[J]. 通信学报, 2012,33(10):60-70. LI F , SHEN L M , SI Y L , et al. Dynamic adaptive trust evaluation modelbased on interaction-aware[J]. Journal on Communications, 2012,33(10):60-70.
|
[6] |
LI X Y , GUI X L . A comprehensive and adaptive trust model for large-scale P2P networks[J]. Journal of Computer Science and Tech-nology, 2009,24 (5):868-882.
|
[7] |
HAQUE M , AHAMED S . Design, analysis, and deployment of omni-present formal trust model (FTM) with trust bootstrapping for perva-sive environments[J]. Journal of Systems and Software, 2009,83 (2):253-270.
|
[8] |
李佳伦, 谷利泽, 杨义先 . 一种具有时间衰减和主观预期的P2P网络信任管理模型[J]. 电子与信息学报, 2009,31(11):2786-2790. LI J L , GU L Z , YANG Y X . A new trust management model for P2P network with time self-decay andsubjective expect[J]. Journal of Elec-tronics & Information Technology, 2009,31(11):2786-2790.
|
[9] |
石志国, 刘冀伟, 王志良 . 基于时间窗反馈机制的动态P2P信任模型[J]. 通信学报, 2010,31(2):120-129. SHI Z G , LIU J W , WANG Z L . Dynamic P2P trust model based on time-window feedback mechanism[J]. Journal on Communications, 2010,31(2):120-129.
|
[10] |
苗光胜, 冯登国, 苏璞睿 . P2P信任模型中基于行为相似度的共谋团体识别模型[J]. 通信学报, 2009,30(8):9-20. MIAO G S , FENG D G , SU P R . Colluding clique detector based onactivity similarity in P2P trust model[J]. Journal on Communica-tions, 2009,30(8):9-20.
|
[11] |
谢晓兰, 刘亮, 赵鹏 . 面向云计算基于双层激励和欺骗检测的信任模型[J]. 电子与信息学报, 2012,34(4):812-817. XIE X L , LIU L , ZHAO P . Trust model based on double incentive and deception detection for cloud computing[J]. Journal of Electronics and Information Technology, 2012,34(4):812-817.
|