[1] GKANTSIDIS C, MIHAIL M, SABERI A. Random walks in peer-to-peer networks: Algorithms and evaluation[J]. Performance Evaluation, 2006, 63(3):241-263.[2] MASSOULIL, le MERRER E, KERMARREC A M, et al. Peer counting and sampling in overlay networks: random walk methods[C]// Proceedings of the 25th Annual ACM Symposium on Principles of Distributed Computing. New York:ACM, 2006 :123-132.[3] SABATER J, SIERRA C. Reputation and social network analysis in multi-Agent systems[C]// Proceedings of the 1st International Joint Conference on Autonomous Agents and Multiagent Systems. New York :ACM, 2002:1-8.[4] KAMVAR S, SCHLOSSER M, GARCIA-MOLINA H. The eigentrust algorithm for reputation management in P2P networks[C]// Proceedings of the 12th International Conference on World Wide Web. New York :ACM, 2003:640-651.[5] XIONG L, LIU L. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities[J]. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7):843-857.[6] ZHOU R, HWANG K. PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(4):460-473.[7] ZHOU R, HWANG K, CAI M. GossipTrust for fast reputation aggregation in peer-to-peer networks[J]. IEEE Transactions on Knowledge and Data Engineering, 2008, 20(9):1282-1295.[8] LIANG Z Q, SHI W S. PET: A personal trust model with reputation and risk evaluation for P2P resource sharing[C]// Proceedings of the 38th Annual Hawaii International Conference on System Sciences. Washington, DC:IEEE Computer Society, 2005:201.[9] 常俊胜, 王怀民, 尹刚. DyTrust:一种P2P系统中基于时间帧的动态信任模型[J]. 计算机学报, 2006, 29(8):1301-1307.[10] AZZEDIN F, RIDHA A. Feedback behavior and its role in trust assessment for peer-to-peer systems[J]. Telecommunication Systems, 2010(44):253-266.[11] CHU X, CHEN X, ZHAO K, et al. Reputation and trust management in heterogeneous peer-to-peer networks[J]. Telecommunication Systems, 2010,44(3/4):191-203.[12] MARMOL F, PEREZ G. Security threats scenarios in trust and reputation models for distributed systems[J]. Computers & Security, 2009, 28(7):545-556.[13] ANDROUTSELLIS-THEOTOKIS S, SPINELLIS D, LOURIDAS P, et al. A market-based approach to managing the risk of peer-to-peer transactions[J]. Computer Networks, 2010, 54(5):675-688.[14] WANG Y, NAKAO A. Poisonedwater: An improved approach for accurate reputation ranking in P2P networks[J]. Future Generation Computer Systems, 2010, 26(8):1317-1326. |