Design of Trust Metrics Based on Dempster-Shafer Theory
暂无分享,去创建一个
[1] Matthew L. Ginsberg,et al. Non-Monotonic Reasoning Using Dempster's Rule , 1984, AAAI.
[2] Stephen T. Kent,et al. Internet Privacy Enhanced Mail , 1993, CACM.
[3] Thomas Beth,et al. Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Ravi Kalakota,et al. Organizing for electronic commerce , 1995 .
[5] William Stallings,et al. Protect your privacy: a guide for PGP users , 1995 .
[6] Hector Garcia-Molina,et al. Making trust explicit in distributed commerce transactions , 1996, Proceedings of 16th International Conference on Distributed Computing Systems.
[7] Michael K. Reiter,et al. Path independence for authentication in large-scale systems , 1997, CCS '97.
[8] Michael K. Reiter,et al. Toward acceptable metrics of authentication , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[9] Jiawen Su,et al. Building trust for distributed commerce transactions , 1997, Proceedings of 17th International Conference on Distributed Computing Systems.
[10] Jr.Robert B. Austenfeld. Electronic Commerce : An Overview , 1998 .
[11] Daniel W. Manchala,et al. Trust metrics, models and protocols for electronic commerce transactions , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).
[12] Frederick J. Riggins,et al. Toward a unified view of electronic commerce , 1998, CACM.
[13] L. Zadeh. Fuzzy sets as a basis for a theory of possibility , 1999 .
[14] Sara Jones,et al. Trust requirements in e-business , 2000, CACM.