[1]牛少彰.李剑.信息安全概论 [M].2版.北京:北京邮电大学出版社,2007:34.[2]唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].软件学,2003,14(8):1401-1408.[3]李佳伦,谷利泽,杨义先.一种新的P2P 网络的信任管理模型 [J].北京邮电大学学报,2009,32(2):71-74.[4]陆峰,郑康锋,钮心忻,等.构建风险敏感的对等网安全信任模型[J].北京邮电大学学报,2010,33(1):33-37.[5]JOSANG A,ROSS H,SIMON P.Trust network analysis with subjective logic [C]// Proceedings of the 29th Australasian Computer Science Conference.New York:ACM Press,2006:85-94.[6]RAMAYYA K,MICHAEL D,ZHULEI T,et al.The impact of free-riding on peer-to-peer networks [C]// HICSS'04:Proceedings of the 37th Annual Hawaii International Conference on System Sciences.Piscataway,NJ:IEEE Press,2004:1-10.[7]DU RUI-ZHONG,TIAN JUN-FENG,WANG ZI-XIAN,et al.A trust model of P2P network based on reputation and risk [C]// WCSE'09:Proceedings of WRI World Congress on Software Engineering.Piscataway,NJ:IEEE Press,2009:382-386.[8]张光华,张玉清.P2P网络信任管理研究综述[J].计算机科学,2010,37(9):6-12.[9]JOSANG A.A logic for uncertain probabilities [J].International Journal of Uncertainty,Fuzziness and Knowledge-based Systems,2001,9(3):279.[10]李俊青,李元振.基于贝叶斯网络的时间感知的P2P信任管理模型[J].计算机工程与设计,2008,29(23):5971-5975.[11]吕上,郭玉翠,左赛哲.P2P网络中考虑交易时间间隔的信任管理模型[J].软件,2011,32(5):41-44.[12]CHANG E,THOMSON P,DILLON T S,et al.The fuzzy and dynamic nature of trust [C]// INDIN 2005:Proceedings of 3rd International Conference on Industrial Infomatics.Piscataway,NJ:IEEE Press,2005:161-174.[13]SONG S,HWANG K,ZHOU R.Trusted P2P transactions with fuzzy reputation [J].IEEE Internet Computing,2005,9(6):24-34. |