暂无分享,去创建一个
[1] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[2] Anatol Rapoport,et al. N-person game theory;: Concepts and applications , 1970 .
[3] Claudia Keser,et al. Can We Manage Trust? , 2005, iTrust.
[4] Mark Burgess,et al. A graph-theoretical model of computer security , 2004, International Journal of Information Security.
[5] N. Shadbolt,et al. Developing an integrated trust and reputation model for open multi-agent systems , 2004 .
[6] Jan A. Bergstra,et al. A static theory of promises , 2008, ArXiv.
[7] J. Neumann,et al. The Theory of Games and Economic Behaviour , 1944 .
[8] Arild Waaler,et al. Trustworthiness by Default , 2005, CLIMA.
[9] Alice Bob,et al. The PGP Trust Model , 2005 .
[10] P. Bonacich. Power and Centrality: A Family of Measures , 1987, American Journal of Sociology.
[11] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[12] J. Neumann,et al. Theory of Games and Economic Behavior. , 1945 .
[13] Mark Burgess,et al. Autonomic Pervasive Computing : A Smart Mall Scenario Using Promise Theory , 2006 .
[14] F. Zagare. Game Theory: Concepts and Applications , 1984 .
[15] Siri Fagernes,et al. Pervasive Computer Management: A Model of Network Policy with Local Autonomy , 2006 .
[16] T. Schelling,et al. The Strategy of Conflict. , 1961 .
[17] Ira S. Winkler. The Non-Technical Threat to Computing Systems , 1996, Comput. Syst..
[18] J. Neumann,et al. Theory of games and economic behavior , 1945, 100 Years of Math Milestones.
[19] Audun Jøsang,et al. Technologies for Trust in Electronic Commerce , 2004, Electron. Commer. Res..
[20] Geoffrey Canright,et al. Roles in networks , 2004, Sci. Comput. Program..
[21] M. Vangel. System Reliability Theory: Models and Statistical Methods , 1996 .
[22] Arild Waaler,et al. Relative Trustworthiness , 2005, Formal Aspects in Security and Trust.
[23] Dietrich Fahrenholtz,et al. Towards a Sociological View of Trust in Computer Science , 2001 .
[24] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[25] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[26] G. Grimmett,et al. Probability and random processes , 2002 .
[27] Mark Burgess,et al. An Approach to Understanding Policy Based on Autonomy and Voluntary Cooperation , 2005, DSOM.
[28] A. Hasman,et al. Probabilistic reasoning in intelligent systems: Networks of plausible inference , 1991 .
[29] Audun Jøsang,et al. Semantic Constraints for Trust Transitivity , 2005, APCCM.
[30] Leonard J. LaPadula,et al. A Rule-Set Approach to Formal Modeling of a Trusted Computer System , 1994, Comput. Syst..
[31] David J. Sherwin,et al. System Reliability Theory—Models and Statistical Methods , 1995 .