Managing Trust in Social Networks
暂无分享,去创建一个
[1] Sebastian Ryszard Kruk,et al. D-FOAF: Distributed Identity Management with Access Rights Delegation , 2006, ASWC.
[2] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[3] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[4] Yao-Hua Tan,et al. Trust and Deception in Virtual Societies , 2001, Springer Netherlands.
[5] C. Castelfranchi,et al. Social Trust : A Cognitive Approach , 2000 .
[6] P. Bearman,et al. Chains of Affection: The Structure of Adolescent Romantic and Sexual Networks1 , 2004, American Journal of Sociology.
[7] Kirsten Swearingen,et al. Beyond Algorithms: An HCI Perspective on Recommender Systems , 2001 .
[8] Azadeh Iranmehr,et al. Trust Management for Semantic Web , 2009, 2009 Second International Conference on Computer and Electrical Engineering.
[9] Rino Falcone,et al. Principles of trust for MAS: cognitive anatomy, social importance, and quantification , 1998, Proceedings International Conference on Multi Agent Systems (Cat. No.98EX160).
[10] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[11] Li Ding,et al. How the Semantic Web is Being Used: An Analysis of FOAF Documents , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[12] Audun Jøsang,et al. The right type of trust for distributed systems , 1996, NSPW '96.
[13] Laszlo Zsolnai,et al. The rationality of trust20051Russell Hardin. The rationality of trustTrust and Trustworthiness. New York: Russell Sage Foundation 2002.: Trust and Trustworthiness , 2005 .
[14] Brian Davis,et al. Trust Models for Community Aware Identity Management , 2006 .
[15] Yaniv,et al. Advice Taking in Decision Making: Egocentric Discounting and Reputation Formation. , 2000, Organizational behavior and human decision processes.
[16] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[17] Jennifer Golbeck,et al. Computing and Applying Trust in Web-based Social Networks , 2005 .
[18] Kevin Borders,et al. Social networks and context-aware spam , 2008, CSCW.
[19] Lee Trepanier,et al. Trust in Society , 2004 .
[20] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[21] Georg Lausen,et al. Spreading activation models for trust propagation , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.
[22] M. Consalvo,et al. Fono, David, and Raynes-Goldie, Kate. . Hyperfriends and Beyond: Friendship and Social Norms on LiveJournal. , 2006 .
[23] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[24] Yin Pan,et al. A social approach to security: Using social networks to help detect malicious web content , 2010, 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering.
[25] Alexander Aiken,et al. Attack-Resistant Trust Metrics for Public Key Certification , 1998, USENIX Security Symposium.
[26] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[27] Rashmi R. Sinha,et al. Comparing Recommendations Made by Online Systems and Friends , 2001, DELOS.