[1] BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[C]//Proceedings of the 17th Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 1996:164-173. [2] JØSANG A. A subjective metric of authentication[C]//Proceedings of the 5th European Symposium on Research in Computer Security. Berlin: Springer, 1998:329-444. [3] JAMEEL H, HUNG L X, KALIM U, et al. A trust model for ubiquitous systems based on vectors of trust values[C]//Proceedings of the 7th IEEE International Symposium on Multimedia. Washington, DC: IEEE Computer Society, 2005:674-679. [4] THEODORAKOPOULOS G, BARAS J S. On trust models and trust evaluation metrics for Ad-Hoc networks[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 318-328. [5] TONG X, ZHANG W, LONG Y. Transitivity of Agent subjective trust[J]. Journal of Software, 2012, 23(11): 2862-2870.(童向荣,张伟,龙宇.Agent 主观信任的传递性[J].软件学报,2012,23(11):2862-2870.) [6] LONG Y, TONG X. Property of trust-based recommender systems[J]. Journal of Computer Applications, 2014,34(1):222-226.(龙宇,童向荣.结合信任的推荐系统的性质[J].计算机应用,2014,34(1):222-226.) [7] JØSANG A, POPE S. Semantic constraints for trust transitivity[C]//Proceedings of the 2nd Asia-Pacific Conference on Conceptual Modeling. Brisbane: Australian Computer Society, 2005,43:59-68. [8] CHEN Y, ZHANG M, ZHU H, et al. Average transitive trustworthy degrees for trustworthy networks[C]//Proceedings of the 4th International Conference on Rough Sets and Knowledge Technology. Berlin: Springer, 2009: 682-689. [9] MASSA P, AVESANI P. Trust-aware recommender systems[C]//Proceedings of the 2007 ACM Conference on Recommender Systems. New York: ACM, 2007:17-24. [10] TONG X, HUANG H, ZHANG W. Prediction and abnormal behavior detection of Agent dynamic interaction trust[J]. Journal of Computer Research and Development, 2009,46(8):1364-1370.(童向荣, 黄厚宽, 张伟. Agent 动态交互信任预测与行为异常检测模型.计算机研究与发展, 2009, 46(8):1364-1370.) [11] JIANG L, ZHANG K, XU J, et al. Research on trust transitivity and aggregation in evidential trust model[J]. Journal on Communications, 2011,32(8):91-100.(蒋黎明,张琨,徐建,等.证据信任模型中的信任传递与聚合研究[J].通信学报,2011,32(8):91-100.) [12] TIAN J, LU Y, LI N. Trust chain management model based on recommendation[J]. Journal on Communications, 2011,32(10):1-9.(田俊峰,鲁玉臻,李宁.基于推荐的信任链管理模型[J].通信学报,2011,32(10):1-9.) [13] ZHANG L, WANG R, WANG H. Trust transitivity algorithm based on multiple influencing factors for grid environment[J]. Journal on Communications, 2011,32(7):161-168.(张琳,王汝传,王海艳.基于多影响因素的网格信任传播算法[J].通信学报,2011,32(7):161-168.) [14] LI F, SHEN L, SI Y, et al. Dynamic adaptive trust evaluation model based on interaction-aware[J]. Journal on Communications, 2012,33(10):60-70.(李峰,申利民,司亚利,等.基于交互感知的动态自适应的信任评估模型[J].通信学报,2012,33(10):60-70.) [15] QIN Y, WU X, GAO J. Research on selective trust-path search and aggregation in distributed environment[J]. Journal on Communications, 2012,33(Z1):148-156.(秦艳琳,吴晓平,高键鑫.分布式环境下信任路径选择性搜索及聚合研究[J].通信学报,2012,33(Z1):148-156.) |