[1]MRMOL G M, PREZ G M. Security threats scenarios in trust and reputation models for distributed systems[J].Computers and Security, 2009,28(7): 545-556.
[2]JSANG A, ISMAIL R, BOYD C. A survey of trust and reputation systems for online service provision[J].Decision Support Systems, 2007,43(2):618-644.
[3]KOVAC D, TRECK D. Qualitative trust modeling in SOA[J].Journal of Systems Architecture, 2009, 55(4): 255-263.
[4]NOORIAN Z, ULIERU M. The state of the art in trust and reputation systems: a framework for comparison[J].Journal of Theoretical and Applied Electronic Commerce Research, 2010, 5(2):97-107.
[5]NGUYEN H T,ZHAO W L,YANG J.A trust and reputation model based on Bayesian network for Web services[C]// 2010 IEEE International Conference on Web Services. Washington, DC: IEEE Computer Society, 2010: 251-258.
[6]WU F,LI H-H, KUO Y-S. Reputation evaluation for choosing a trustworthy counterparty in C2C e-commerce[J].Electronic Commerce Research and Applications, 2011,10(4):428-436.
[7]潘静,徐锋,吕建.面向可信服务选取的基于声誉的推荐者发现方法[J].软件学报,2010, 21(2):388-400.
[8]MAKIK Z, BOUGUETTAYA A. Reputation bootstrapping for trust establishment among Web services[J].IEEE Internet Computing, 2010,13(1):40-47.
[9]吴鹏,吴国新,方群.一种基于概率统计方法的P2P系统信任评模型[J].计算机研究与发展,2008, 45(3):408-416.
[10]HOFFMAN K, ZAGE D, NITA-ROTARU C. A survey of attack and defense techniques for reputation systems [J].ACM Computing Surveys, 2009, 42(1): 1-31.
[11]YOU WEIJIA, LIU LU, XIA MU, et al. Reputation inflation detection in a Chinese C2C market[J].Electronic Commerce Research and Applications, 2011, 10(5):510-519.
[12]BENTE G, BAPTIST O, LEUSCHNER H. To buy or not to buy: Influence of seller photos and reputation on buyer trust and purchase behavior[J].International Journal of Human-Computer Studies, 2012, 70(1):1-13.
[13]李海华,杜小勇,田萱.一种能力属性增强的Web服务信任评估模型[J].计算机学报,2008,31(8):1471-1477.
[14]MAKIK Z, BOUGUETTAYA A. RATEWeb: Reputation assessment for trust establishment among Web services[J].The International Journal on Very Large Data Bases, 2009, 18(4):885-911.
[15]ALJAZZAF Z M, CAPRETZ M A M, PERRY M. Trust bootstrapping services and service providers[C]// Proceedings of 2011 Ninth Annual International Conference on Privacy, Security and Trust. Piscataway: IEEE, 2011:7-15.
[16]SKOPIK F, SCHALL D, DUSTDAR S. Start trusting strangers? Bootstrapping and prediction of trust[C]// WISE '09: Proceedings of 10th International Conference on Web Information Systems Engineering. Berlin: Springer-Verlag, 2009:275-289. |