Survey of Trust Management on Various Networks
暂无分享,去创建一个
[1] Li Ding,et al. Trust based knowledge outsourcing for semantic Web agents , 2003, Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003).
[2] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[3] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[4] Malcolm J. Beynon,et al. The Dempster-Shafer Theory , 2009, Encyclopedia of Artificial Intelligence.
[5] Yong Chen,et al. Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..
[6] Jean-Yves Le Boudec,et al. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[7] Ernesto Damiani,et al. Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems: Special Topic Section on Soft Approaches to Information Retrieval and Information Access on the Web , 2006 .
[8] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[9] Akbar Ghaffarpour Rahbar,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[10] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[11] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[12] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[13] Ersin Uzun,et al. A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..
[14] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.
[15] Ling Liu,et al. TrustMe: anonymous management of trust relationships in decentralized P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[16] Bhavani M. Thuraisingham,et al. A semantic web based framework for social network access control , 2009, SACMAT '09.
[17] Jordi Sabater-Mir,et al. Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.
[18] Jennifer Golbeck,et al. Inferring Reputation on the Semantic Web , 2004, WWW 2004.
[19] Rino Falcone,et al. Principles of trust for MAS: cognitive anatomy, social importance, and quantification , 1998, Proceedings International Conference on Multi Agent Systems (Cat. No.98EX160).
[20] Ali Aydın,et al. Reputation-Based Trust Management for P2P Networks , 2004 .
[21] Audun Jøsang. Probabilistic Logic under Uncertainty , 2007, CATS.
[22] Yong Zhang,et al. A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks , 2009, 2009 Third International Conference on Network and System Security.
[23] Audun Jøsang,et al. Optimal Trust Network Analysis with Subjective Logic , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.
[24] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[25] Batya Friedman,et al. Trust online , 2000, CACM.
[26] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[27] Valérie Issarny,et al. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.
[28] Kai Hwang,et al. Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.
[29] Nora Cuppens-Boulahia,et al. A Robust Reputation Scheme for Group Management in Mobile Ad Hoc Networks , 2008 .
[30] Ramanathan V. Guha,et al. Propagation of trust and distrust , 2004, WWW '04.
[31] James C. Browne,et al. Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks , 2006, WiSe '06.
[32] Françoise Sailhan,et al. Group management for mobile Ad Hoc networks: design, implementation and experiment , 2005, MDM '05.
[33] Georg Lausen,et al. Propagation Models for Trust and Distrust in Social Networks , 2005, Inf. Syst. Frontiers.
[34] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[35] Jonathan Weisberg,et al. Dempster-Shafer Theory , 2010 .
[36] Jing Wang,et al. Trust Model Based on Similarity Measure of Vectors in P2P Networks , 2005, GCC.
[37] Azzedine Boukerche,et al. Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.
[38] Ernesto Damiani,et al. Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems , 2006, J. Assoc. Inf. Sci. Technol..
[39] Michael Rovatsos,et al. Using trust for detecting deceitful agents in artificial societies , 2000, Appl. Artif. Intell..
[40] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[41] Bruce Christianson,et al. Why Isn't Trust Transitive? , 1996, Security Protocols Workshop.
[42] Matthew Richardson,et al. Trust Management for the Semantic Web , 2003, SEMWEB.
[43] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[44] Ioanis Nikolaidis,et al. Certain limitations of reputation--based schemes in mobile environments , 2005, MSWiM '05.
[45] James A. Hendler,et al. Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-Based Social Networks , 2004, EKAW.
[46] Yolanda Gil,et al. A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..
[47] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[48] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[49] James A. Hendler,et al. The Semantic Web" in Scientific American , 2001 .
[50] Manoj Misra,et al. Trust based security in MANET routing protocols: a survey , 2010, A2CWiC '10.
[51] James A. Hendler,et al. The Semantic Web 10 , 2011 .
[52] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[53] Chrysanthos Dellarocas. Efficiency and Robustness of Binary Feedback Mechanisms in Trading Environments with Moral Hazard , 2003 .
[54] P. Papadimitratos. Secure ad hoc networking , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..
[55] Lea Kutvonen,et al. Trust Management Survey , 2005, iTrust.
[56] Audun Jøsang,et al. Exploring Different Types of Trust Propagation , 2006, iTrust.
[57] Munindar P. Singh,et al. An evidential model of distributed reputation management , 2002, AAMAS '02.
[58] Vana Kalogeraki,et al. Decentralized trust management for ad-hoc peer-to-peer networks , 2006, MPAC '06.
[59] Audun Jøsang,et al. Simplification and analysis of transitive trust networks , 2006, Web Intell. Agent Syst..
[60] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[61] R. Likert. “Technique for the Measurement of Attitudes, A” , 2022, The SAGE Encyclopedia of Research Design.
[62] Azzedine Boukerche,et al. A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks , 2008, PE-WASUN '08.
[63] Paolo Avesani,et al. Controversial Users Demand Local Trust Metrics: An Experimental Study on Epinions.com Community , 2005, AAAI.
[64] Julita Vassileva,et al. Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[65] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[66] Timothy W. Finin,et al. Developing Secure Agent Systems Using Delegation Based Trust Management , 2002, AAMAS 2002.
[67] Marianne Winslett,et al. Negotiating Trust on the Web , 2002, IEEE Internet Comput..