An Interactive Trust Model for Application Market of the Internet of Things
暂无分享,去创建一个
Cong Wang | Zhibo Pang | Kai Kang | Lida Xu | Liya Ma | Lida Xu | Zhibo Pang | Cong Wang | Li-Yu Ma | Kai Kang
[1] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[2] Landon P. Cox. Usefulness Is Not Trustworthiness , 2011, IEEE Internet Computing.
[3] Xi Vincent Wang,et al. DIMP: an interoperable solution for software integration and product data exchange , 2012, Enterp. Inf. Syst..
[4] Li D. Xu. Information architecture for supply chain quality management , 2011 .
[5] Lida Xu,et al. A Novel Architecture for Requirement-Oriented Participation Decision in Service Workflows , 2014, IEEE Transactions on Industrial Informatics.
[6] Ninghui Li,et al. Using probabilistic generative models for ranking risks of Android apps , 2012, CCS.
[7] Wu He,et al. Developing Vehicular Data Cloud Services in the IoT Environment , 2014, IEEE Transactions on Industrial Informatics.
[8] Xiaozhu Chen,et al. Enterprise systems in financial sector – an application in precious metal trading forecasting , 2013, Enterp. Inf. Syst..
[9] Jinpeng Huai,et al. Dynamic Evolution Mechanism for Trustworthy Software Based on Service Composition: Dynamic Evolution Mechanism for Trustworthy Software Based on Service Composition , 2010 .
[10] Yong Chen,et al. A System Framework of Security Management in Enterprise Systems , 2013 .
[11] Zhongsheng Hua,et al. A DS-AHP approach for multi-attribute decision making problem with incomplete information , 2008, Expert Syst. Appl..
[12] Li D. Xu,et al. Introduction: Systems Science in Industrial Sectors , 2013 .
[13] Han Qiang,et al. Data Mining Based Measurement Method for Software Trustworthiness , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.
[14] Lirong Zheng,et al. Ecosystem analysis in the design of open platform-based in-home healthcare terminals towards the internet-of-things , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).
[15] Larisa Bulysheva,et al. Enterprise systems in Russia: 1992–2012 , 2013, Enterp. Inf. Syst..
[16] Adriano Valenzano,et al. Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.
[17] Valtteri Niemi,et al. Exploring Trust of Mobile Applications Based on User Behaviors , 2009, INTRUST.
[18] Lida Xu,et al. IoT-Based Smart Rehabilitation System , 2014, IEEE Transactions on Industrial Informatics.
[19] Charlie Miller,et al. Mobile Attacks and Defense , 2011, IEEE Security & Privacy.
[20] Lida Xu,et al. Compliance Checking for Requirement-Oriented Service Workflow Interoperations , 2014, IEEE Transactions on Industrial Informatics.
[21] Wu He,et al. Integration of Distributed Enterprise Applications: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[22] Wei Xu,et al. A framework for service enterprise workflow simulation with multi-agents cooperation , 2013, Enterp. Inf. Syst..
[23] Huilong Duan,et al. Data configurations in railway signalling engineering - an application of enterprise systems techniques , 2013, Enterp. Inf. Syst..
[24] Byung-Gon Chun,et al. Vision: automated security validation of mobile apps at app markets , 2011, MCS '11.
[25] Jihong Liu,et al. An efficient and flexible web services-based multidisciplinary design optimisation framework for complex engineering systems , 2012, Enterp. Inf. Syst..
[26] Juan Vicente Capella,et al. Smartphone-Based Industrial Informatics Projects and Laboratories , 2013, IEEE Transactions on Industrial Informatics.
[27] Rukshan Athauda,et al. Determining Trustworthiness and Quality of Mobile Applications , 2012, MOBILWARE.
[28] Jaehong Park,et al. Towards usage control models: beyond traditional access control , 2002, SACMAT '02.
[29] Kai Pan,et al. Public and expert collaborative evaluation model and algorithm for enterprise knowledge , 2013, Enterp. Inf. Syst..
[30] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[31] Lida Xu,et al. Internet of Things for Enterprise Systems of Modern Manufacturing , 2014, IEEE Transactions on Industrial Informatics.
[32] Robert H. Deng,et al. TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications , 2011, Personal and Ubiquitous Computing.
[33] Jean-Henry Morin,et al. Toward Internet of Things Application Markets , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[34] Adrian Holzer,et al. Mobile application market: A developer's perspective , 2011, Telematics Informatics.
[35] Peter J. Bentley,et al. App Epidemics: Modelling the Effects of Publicity in a Mobile App Ecosystem , 2012, ALIFE.
[36] L. Li. Technology designed to combat fakes in the global supply chain , 2013 .
[37] Margaret Butler,et al. Android: Changing the Mobile Landscape , 2011, IEEE Pervasive Computing.
[38] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[39] Lida Xu,et al. A New Approach for Compliance Checking in Service Workflows , 2014, IEEE Transactions on Industrial Informatics.
[40] Vyas Sekar,et al. Measuring user confidence in smartphone security and privacy , 2012, SOUPS.
[41] Hao Yu,et al. Advantages of Radial Basis Function Networks for Dynamic System Design , 2011, IEEE Transactions on Industrial Electronics.
[42] Trent Jaeger,et al. Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.
[43] Bogdan M. Wilamowski,et al. Implementing a fuzzy system on a field programmable gate array , 2001, IJCNN'01. International Joint Conference on Neural Networks. Proceedings (Cat. No.01CH37222).
[44] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[45] Zeng Jin. Dynamic Evolution Mechanism for Trustworthy Software Based on Service Composition , 2010 .
[46] Lida Xu,et al. An Integrated Approach to Snowmelt Flood Forecasting in Water Resource Management , 2014, IEEE Transactions on Industrial Informatics.
[47] Okyay Kaynak,et al. Oil well diagnosis by sensing terminal characteristics of the induction motor , 2000, IEEE Trans. Ind. Electron..
[48] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[49] Qiang Chen,et al. Design of a terminal solution for integration of in-home health care devices and services towards the Internet-of-Things , 2015, Enterp. Inf. Syst..
[50] SandhuRavi,et al. The UCONABC usage control model , 2004 .
[51] Zhang Huanguo,et al. A behavior-based remote trust attestation model , 2008, Wuhan University Journal of Natural Sciences.
[52] Florian Michahelles,et al. Explicit and Implicit Ratings for Mobile Applications , 2010, GI Jahrestagung.