Analysis of Feedbacks and Ratings on Trust Merit for Peer-to-Peer Systems
暂无分享,去创建一个
[1] Ling Liu,et al. A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.
[2] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[3] Julita Vassileva,et al. Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[4] Julita Vassileva,et al. Bayesian network-based trust model , 2003, Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003).
[5] Jianguo Chen,et al. A Solution for Whitewashing in P2P Systems Based on Observation Preorder , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[6] Munindar P. Singh. Trustworthy Service Composition: Challenges and Research Questions , 2002, Trust, Reputation, and Security.
[7] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[8] Mudhakar Srivatsa,et al. TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.
[9] Ross A. Malaga. Web-Based Reputation Management Systems: Problems and Suggested Solutions , 2001, Electron. Commer. Res..
[10] Jean-Yves Le Boudec,et al. Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.
[11] Michael J. Butler,et al. The Use of Formal Methods in the Analysis of Trust (Position Paper) , 2004, iTrust.
[12] Jordi Sabater-Mir,et al. Trust in Agent Societies, 11th International Workshop, TRUST 2008, Estoril, Portugal, May 12-13, 2008. Revised Selected and Invited Papers , 2008, AAMAS-TRUST.
[13] Giorgos Zacharia,et al. Trust management through reputation mechanisms , 2000, Appl. Artif. Intell..
[14] A. Jøsang,et al. Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .
[15] Yolanda Gil,et al. A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..
[16] Weisong Shi,et al. Enforcing Cooperative Resource Sharing in Untrusted P2P Computing Environments , 2005, Mob. Networks Appl..
[17] Munindar P. Singh,et al. Developing trust in large-scale peer-to-peer systems , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.
[18] Weisong Shi,et al. Analysis of ratings on trust inference in open environments , 2008, Perform. Evaluation.