1 |
Tomas I , Michael P , Arvind K , et al. A privacy-preserving P2P data sharing with one swarm. ACM SIGCOMM Computer Communication Review, 2010, 40(4):111~122
|
2 |
eBay. ,2013
|
3 |
Spora. ,2013
|
4 |
Kamvar S D , Schlosser M T , Garcia-Molina H . The eigentrust algorithm for reputation management in p2p networks. Proceedings of the 12th International Conference on World Wide Web, Budapest, Hungary, 2003: 640~651
|
5 |
Zhou R F , Hwang K . Powertrust: arobust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(4):460~473
|
6 |
Li X , Ling L . Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transaction on Knowledge Data Engineering, 2004, 16(7):843~857
|
7 |
J?sang A , Haller J . Dirichlet reputation systems. Proceedings of International Conference on Availability, Reliability and Security, Vienna, Austria, 2007: 112~119
|
8 |
Armbrust M , Fox A , Griffith R . A view of cloud computing. Communications of the ACM, 2010, 53(4):50~58
|
9 |
罗军舟, 金嘉晖, 宋爱波 . 云计算:体系架构与关键技术. 通信学报, 2011,32(7): 3~17 Luo J Z , Jin J H , Song A B . Cloud computing: architecture and key technologies. Journal of Communications, 2011,32(7): 3~17
|
10 |
Basmadjian R , De Meer H , Lent R , et al. Cloud computing and its interest in saving energy: the use case of a private cloud. Journal of Cloud Computing, 2012, 1(1):1~25
|
11 |
J?sang A , Hayward R , Pope S . Trust network analysis with subjective logic. Proceedings of the 29th Australasian Computer Science Conference, Hobart, Australian, 2006:85~94
|
12 |
Denko M K , Sun T , Woungang I . Trust management in ubiquitous computing: a bayesian approach. Computer Communications, 2011, 34(3): 398~406
|
13 |
Quercia D , Hailes S , Capra L . B-trust: bayesian trust framework for pervasive computing. Proceedings of 4th International Conference, iTrust, Pisa, Italy, 2006: 289~312
|
14 |
Teacy W T , Patel J , Jennings N R , et al. Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model. Proceedings of the 4th International Conference on Autonomous Agents and Multiagent Systems, Ultrecht,Netherlands, 2005: 997~1004
|
15 |
Whitby A , J?sang A , Indulska J . Filtering out unfair ratings in bayesian reputation systems. Journal of Management Research, 2005, 4(2): 48~64
|
16 |
Sun Y L , Han Z , Yu W , et al. A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. Proceedings of the 25th IEEE International Conference on Computer Communications, Barcelona, Spain, 2006: 1~13
|