Towards content trust of web resources
暂无分享,去创建一个
[1] James A. Hendler,et al. A Framework for Web Science , 2006, Found. Trends Web Sci..
[2] Tim Berners-Lee,et al. Weaving The Web: The Original Design And Ultimate Destiny of the World Wide Web , 1999 .
[3] Hector Garcia-Molina,et al. Combating Web Spam with TrustRank , 2004, VLDB.
[4] Andrzej Skowron,et al. Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence , 2005 .
[5] Jordi Sabater-Mir,et al. Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.
[6] Jennifer Golbeck,et al. Inferring Reputation on the Semantic Web , 2004, WWW 2004.
[7] Deborah L. McGuinness,et al. IWTrust: Improving User Trust in Answers from the Web , 2005, iTrust.
[8] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[9] Fabien L. Gandon,et al. Semantic web technologies to reconcile privacy and context awareness , 2003, Journal of Web Semantics.
[10] Lea Kutvonen,et al. Trust Management Survey , 2005, iTrust.
[11] Wolfgang Nejdl,et al. Personalized Reputation Management in P2P Networks , 2004, ISWC Workshop on Trust, Security, and Reputation on the Semantic Web.
[12] Sergey Brin,et al. The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.
[13] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[14] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[15] Paul Resnick,et al. PICS: Internet access controls without censorship , 1996, CACM.
[16] Yolanda Gil,et al. A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..
[17] Piero A. Bonatti,et al. Driving and monitoring provisional trust negotiation with metapolicies , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).
[18] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[19] Ernesto Damiani,et al. Choosing reputable servents in a P2P network , 2002, WWW.
[20] Timothy W. Finin,et al. A Policy Based Approach to Security for the Semantic Web , 2003, SEMWEB.
[21] Yolanda Gil,et al. Trusting Information Sources One Citizen at a Time , 2002, SEMWEB.
[22] Yolanda Gil,et al. TRELLIS: An Interactive Tool for Capturing Information Analysis and Decision Making , 2002, EKAW.
[23] Marianne Winslett,et al. PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web , 2004, Secure Data Management.
[24] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[25] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[26] Jeffrey M. Bradshaw,et al. KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[27] Paolo Massa,et al. Page-reRank: using trusted links to re-rank authority , 2005, The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05).
[28] S. Braynov,et al. Detecting malicious groups of agents , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.
[29] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[30] Yolanda Gil,et al. Incremental formalization of document annotations through ontology-based paraphrasing , 2004, WWW '04.
[31] Fabien L. Gandon,et al. Context-awareness, privacy and mobile access: a web semantic and multiagent approach , 2004, UbiMob.
[32] Angelos D. Keromytis,et al. A secure active network environment architecture: realization in SwitchWare , 1998, IEEE Netw..
[33] Jon Kleinberg,et al. Authoritative sources in a hyperlinked environment , 1999, SODA '98.