Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources
暂无分享,去创建一个
[1] J. Lewis,et al. Trust as a Social Reality , 1985 .
[2] K. Blomqvist. The many faces of trust , 1997 .
[3] Blair H. Sheppard,et al. The Grammars of Trust: A Model and General Implications , 1998 .
[4] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[5] K. Suzanne Barber,et al. Using policies for information valuation to justify beliefs , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[6] Christian Bizer,et al. Quality-Driven Information Filtering- In the Context of Web-Based Information Systems , 2007 .
[7] Yolanda Gil,et al. Towards content trust of web resources , 2007, J. Web Semant..
[8] Matthias Sutter,et al. Trust and trustworthiness across different age groups , 2007, Games Econ. Behav..
[9] Wang Chiew Tan. Provenance in Databases: Past, Current, and Future , 2007, IEEE Data Eng. Bull..
[10] Yolanda Gil,et al. A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..
[11] Elisa Bertino,et al. An Approach to Evaluate Data Trustworthiness Based on Data Provenance , 2008, Secure Data Management.
[12] Kenneth R. Fleischmann,et al. Trust in digital information , 2008 .
[13] Olaf Hartig. Provenance Information in the Web of Data , 2009, LDOW.
[14] Shouhuai Xu,et al. TIUPAM: A Framework for Trustworthiness-Centric Information Sharing , 2009, IFIPTM.
[15] Elisa Bertino,et al. Trust Management III, Third IFIP WG 11.11 International Conference, IFIPTM 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings , 2009, IFIPTM.
[16] Olaf Hartig,et al. Using Web Data Provenance for Quality Assessment , 2009, SWPM.
[17] Collin Jackson,et al. Web 2.0 Security and Privacy , 2011, Encyclopedia of Cryptography and Security.
[18] Christian Bizer. Quality-Driven Information Filtering , 2012 .