[1] |
BLAZE M , FEIGENBAUM J , LACY J . Decentralized trust management[A]. Security and Privacy 1996[C]. 1996. 164-173.
|
[2] |
GLYNOS D , ARGYROUDIS P , DOULIGERIS C . Collaborative service evaluation with the two hop trust framework[J]. Security and Communication Networks, 2012,5(6): 594-613.
|
[3] |
HAN G , JIANG J , SHU L , et al. Management and applications of trust in wireless sensor networks:a survey[J]. Journal of Computer and System Sciences, 2014,80(3): 602-617.
|
[4] |
王婷, 陈性元, 张斌 , 等. 授权与访问控制中的资源管理技术研究综述[J]. 小型微型计算机系统, 2011,32(4): 619-625. WANG T , CHEN X Y , ZHANG B , et al. Research of resource management in authorization and access control technology[J]. Journal of Chinese Computer Systems, 2011,32(4): 619-625.
|
[5] |
赵斌, 何泾沙 . 基于平衡权重的动态综合信任度量方法[J]. 北京邮电大学学报, 2015,38(2): 113-117. ZHAO B , HE J S . Dynamic global trust evaluation based on balance weight[J]. Journal of Beijing University of Posts and Telecommunications, 2015,38(2): 113-117.
|
[6] |
MASOOD R , SHIBLI M A , GHAZI Y , et al. Cloud authorization:exploring techniques and approach towards effective access control framework[J]. Frontiers of Computer Science, 2015,9(2): 297-321.
|
[7] |
LU J , JOSHI J B D , JIN L , et al. Towards complexity analysis of user authorization query problem in RBAC[J]. Computers & Security, 2015,(48): 116-130.
|
[8] |
糖杰, 梁邦勇, 李涓子 , 等. 语义 Web 中的本体自动映射[J]. 计算机学报, 2006,29(11): 1956-1976. TANG J , LIANG B Y , LI J Z , et al. Automatic ontology mapping in semantic Web[J]. Chinese Journal of Computer, 2006,29(11): 1956-1976.
|
[9] |
宋利康, 崔德刚, 周儒荣 . 企业模型与 ERP 系统间映射技术[J]. 航空学报, 2007,28(6): 1513-1520. SONG L K , CUI D G , ZHOU R R . Mapping technology between enterprise model and ERP system[J]. Acta Aeronauticaet Astronau Tica Sinica, 2007,28(6): 1513-1520.
|
[10] |
鲍翊平, 张维明, 姚莉 . 一种基于本体映射处理推荐信任信息的模型[J]. 计算机科学, 2009,36(6): 185-187,195. BAO Y P , ZHANG W M , YAO L . Model for processing recommendatory trust information based on ontology mapping[J]. Computer Science, 2009,36(6): 185-187,195.
|
[11] |
万明, 刘颖, 张宏科 . 位置与身份分离协议下一种基于信任度模型的新型映射机制[J]. 通信学报, 2011,32(7): 133-145. WAN M , LIU Y , ZHANG H K . New mapping approach based on reputation model under locator/ID separation protocol[J]. Journal on Communications, 2011,32(7): 133-145.
|
[12] |
卿苏德, 廖建新, 朱晓民 , 等. 网络虚拟化环境中虚拟网络的嵌套映射算法[J]. 软件学报, 2012,23(11): 3045-3058. QING S D , LIAO J X , ZHU X M , et al. Virtual network embedding algorithms in the network virtualization environment[J]. Journal of Software, 2012,23(11): 3045-3058.
|
[13] |
BERGER J O . Statistical Decision Theory and Bayesian Analysis[M]. Springer Science & Business Media, 2013.
|