[1] |
孙新, 李庆洲, 赵璞 ,等. 对等网络中一种优化的副本分布方法[J]. 计算机学报, 2014,37(6): 1424-1434.
|
|
SUN X , LI Q Z , ZHAO P ,et al. An optimized replica distribution method for peer-to-peer network[J]. Chinese Journal of Computers, 2014,37(6): 1424-1434.
|
[2] |
闫佳, 应凌云, 刘海峰 ,等. 结构化对等网测量方法研究[J]. 软件学报, 2014,25(6): 1301-1315.
|
|
YAN J , YING L Y , LIU H F ,et al. Research on network measurement of structured P2P network[J]. Journal of Software, 2014,25(6): 1301-1315.
|
[3] |
曾明霏, 余顺争 . 使用虚拟参与人和博弈论的P2P网络信用系统模型[J]. 小型微型计算机系统, 2014,35(6): 1309-1314.
|
|
ZENG M F , YU S Z . A reputation system for peer-to-peer networks using game theory and virtual player[J]. Journal of Chinese Computer system, 2014,35(6): 1309-1314.
|
[4] |
曹晓梅, 胡文捷 . 基于动态角色属性的MP2P信任模型[J]. 计算机科学, 2015,42(8): 106-111.
|
|
CAO X M , HU W J . Dynamic role property based trust model for MP2P networks[J]. Computer Science, 2015,42(8): 106-111.
|
[5] |
李勇军, 代亚非 . P2P 文件共享系统中的一种基于商品市场模型的访问控制机制[J]. 计算机学报, 2012,35(8): 1675-1682.
|
|
LI Y J , DAI Y F . A kind of access control mechanism based on commodity market in P2P file sharing system[J]. Chinese Journal of Computers, 2012,35(8): 1675-1682.
|
[6] |
李凤华, 王彦超, 殷丽华 ,等. 面向网络空间的访问控制模型[J]. 通信学报, 2016,37(5): 9-20.
|
|
LI F H , WANG Y C , YIN L H ,et al. Novel cyberspace-oriented ac-cess control mode[J]. Journal on Communications, 2016,37(5): 9-20.
|
[7] |
LIU W , REN P , SUN D H ,et al. TrustP2PNet:P2P social network with admission control model based on trust[J]. Aasri Procedia, 2013,5(3): 281-286.
|
[8] |
WANG X , . A study of P2P access control strategy based on trust and security grade[C]// CSSS Proceedings. 2011.
|
[9] |
LANG B . A computational trust model for access control in P2P[J]. Science China Information Sciences, 2010,53(5): 896-910.
|
[10] |
范艳芳, 蔡英 . 支持协作的强制访问控制模型[J]. 计算机研究与发展, 2015,52(10): 2411-2421.
|
|
FAN Y F , CAI Y . Cohabitation supported mandatory access control mode[J]. Journal of Computer Research and Development, 2015,52(10): 2411-2421.
|
[11] |
郭树行, 张禹 . 基于动态情景网关的系统协同访问控制模型[J]. 通信学报, 2013,34(z1): 142-145.
|
|
GUO S X , ZHANG Y . Dynamic situation gateway based system cooperation access gate model[J]. Journal on Communications, 2013,34(z1): 142-145.
|
[12] |
田俊峰, 杜瑞忠, 蔡红云 ,等. 可信计算与信任管理[M]. 北京: 科学出版社, 2014.
|
|
TIAN J F , DU R Z , CAI H Y ,et al. Trusted computing and trust management[M]. Beijing: Science PressPress, 2014.
|
[13] |
李开, 章华娟, 卢正鼎 . P2P 网络中基于信任的风险计算方法[J]. 计算机科学, 2010,37(10): 102-105.
|
|
LI K , ZHANG H J , LU Z D . Risk assessment approach based on trust in P2P network[J]. Computer Science, 2010,37(10): 102-105.
|
[14] |
惠榛, 李昊, 张敏 ,等. 面向医疗大数据的风险自适应的访问控制模型[J]. 通信学报, 2015,36(12): 190-199.
|
|
HUI Z , LI H , ZHANG M ,et al. Risk-ablative access control model for big data in healthcare[J]. Journal on Communications, 2015,36(12): 190-199.
|
[15] |
TIAN J F , LI C , HE X M . Trust model based on the multinomial subjective logic and risk mechanism for P2P network of file sharing[J]. Journal of Electronics, 2011,28(1): 108-117.
|
[16] |
张润莲, 武小年, 周胜源 ,等. 一种基于实体行为风险评估的信任模型[J]. 计算机学报, 2015,36(12): 190-199.
|
|
ZHANG R L , WU X N , ZHOU S Y ,et al. A trust model based on behaviors risk education[J]. Chinese Journal of Computers, 2015,36(12): 190-199.
|
[17] |
KWAKERNAAK H . An algorithm for rating multipleaspect alterna-tives using fuzzy sets[J]. Automatica, 1979,15(5): 615-616.
|
[18] |
姜江, 李漩, 邢立宁 ,等. 基于模糊证据推理的系统风险分析与评价[J]. 系统工程理论与实践, 2013,33(2): 529-538.
|
|
JIANG J , LI X , XING L N ,et al. System risk analysis and evaluation approach based on fuzzy evidential reasoning[J]. System Engineering-Theory & Practice, 2013,33(2): 529-538.
|
[19] |
严斌宇, 刘方圆, 董敏坚 . 一种基于风险评价的无线传感器网络信任模型[J]. 中南大学学报(自然科学版), 2011,42(6): 1657-1661.
|
|
YAN B Y , LIU F Y , DONG M J . Trust model based on risk evaluation in wireless sensor networks[J]. Journal of Central South University(Science and Technology), 2011,42(6): 1657-1661.
|
[20] |
陈华喜, 郭有强, 姚保峰 . 一种耦合赋权的网络安全评价模型[J]. 计算机工程, 2011,37(22): 99-103.
|
|
CHEN H X , GUO Y Q , YAO B F ,et al. Network security assessment model of coupling empowerment[J]. Computer Engineering, 2011,37(22): 99-103.
|
[21] |
赵勇, 刘吉强, 韩臻 . 基于任务的访问控制模型研究[J]. 计算机工程, 2008,34(5): 28-30.
|
|
ZHAO Y , LIU J Q , HAN Z . Research on access control model based on task[J]. Computer Engineering, 2008,34(5): 28-30.
|
[22] |
邓集波, 洪帆 . 基于任务的访问控制模型[J]. 软件学报, 2003,14(1): 76-81.
|
|
DENG J B , HONG F . Task-based access control model[J]. Journal of Software, 2003,14(1): 76-81.
|
[23] |
谢季坚, 刘承平 . 模糊数学方法及其应用[M]. 武汉: 华中科技大学出版社, 2000.
|
|
XIE J J , LIU C P . Fuzzy mathematics method and its application[M]. Wuhan: Huazhong University of Science & Technology PressPress, 2000.
|