Byzantine resistant reputation-based trust management
暂无分享,去创建一个
[1] Hsinchun Chen,et al. Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering , 2004, TOIS.
[2] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[3] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[4] Lior Rokach,et al. Introduction to Recommender Systems Handbook , 2011, Recommender Systems Handbook.
[5] Lingdi Ping,et al. Trust Model to Enhance Security and Interoperability of Cloud Environment , 2009, CloudCom.
[6] Shanshan Song,et al. Fuzzy Trust Integration for Security Enforcement in Grid Computing , 2004, NPC.
[7] S. Thamarai Selvi,et al. Trust management system for grid and cloud resources , 2009, 2009 First International Conference on Advanced Computing.
[8] Xuezeng Pan,et al. Use trust management module to achieve effective security mechanisms in cloud environment , 2010, 2010 International Conference on Electronics and Information Engineering.
[9] Vijay Varadharajan,et al. Enhancing grid security with trust management , 2004, IEEE International Conference onServices Computing, 2004. (SCC 2004). Proceedings. 2004.
[10] Gheorghe Cosmin Silaghi,et al. Reputation-based trust management systems and their applicability to grids , 2007 .
[11] Tao Yu,et al. A reputation and trust management broker framework for Web applications , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.
[12] Huajun Chen,et al. A Social Network-Based Trust Model for the Semantic Web , 2006, ATC.
[13] Jose L. Muñoz,et al. A game theoretic trust model for on-line distributed evolution of cooperation inMANETs , 2011, J. Netw. Comput. Appl..
[14] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[15] Tae Kyung Kim,et al. A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .
[16] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[17] Hossam Afifi,et al. Enforcing Trust-Based Intrusion Detection in Cloud Computing Using Algebraic Methods , 2012, 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[18] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[19] Leonard Barolli,et al. Survey of Trust Management on Various Networks , 2011, 2011 International Conference on Complex, Intelligent, and Software Intensive Systems.
[20] Nael B. Abu-Ghazaleh,et al. Location verification and trust management for resilient geographic routing , 2007, J. Parallel Distributed Comput..
[21] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[22] Antonio Puliafito,et al. Volunteer Computing and Desktop Cloud: The Cloud@Home Paradigm , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.
[23] Zhong Chen,et al. CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks , 2007, ATC.
[24] Muthucumaru Maheswaran,et al. Towards Trust-Aware Resource Management in Grid Computing Systems , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).
[25] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[26] Abhishek Chandra,et al. Nebulas: Using Distributed Voluntary Resources to Build Clouds , 2009, HotCloud.