Secure Trust Management in Distributed Computing Systems
暂无分享,去创建一个
[1] Mark Weiser. The computer for the 21st century , 1991 .
[2] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[3] Steffen Staab,et al. The Pudding of Trust , 2004, IEEE Intell. Syst..
[4] Tae Kyung Kim,et al. A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .
[5] Carlton R. Davis. A localized trust management scheme for ad hoc networks , 2004 .
[6] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[7] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[8] Morris Sloman,et al. Specifying and Analysing Trust for Internet Applications , 2002, I3E.
[9] David R. Karger,et al. Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.
[10] Nahid Shahmehri,et al. Dynamic trust metrics for peer-to-peer systems , 2005, 16th International Workshop on Database and Expert Systems Applications (DEXA'05).
[11] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[12] Ninghui Li,et al. DATALOG with Constraints: A Foundation for Trust Management Languages , 2003, PADL.
[13] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[14] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[15] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[16] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.