[1] LUHMANN N. Trust: a simplified mechanism of social complexity[M] . QU T, LI Q, Translated. Shanghai: Shanghai People's Publishing House, 2005:73.(LUHMANN N.信任:一个社会复杂性的简化机制[M] .瞿铁鹏, 李强,译.上海:上海人民出版社,2005:73.) [2] FANG Y, LI F, WU P, et al. Multicast routing protocol for wireless mesh networks[J]. Journal of Software,2010,21(6):1308-1325.(方艺霖,李方敏,吴鹏,等.无线Mesh网络组播路由协议[J].软件学报,2010,21(6):1308-1325.) [3] SALEM N B, HUBAUX J P. Securing wireless mesh networks[J]. IEEE Wireless Communications, 2006,13(2):50-55. [4] HAN Y, XU J, FANG B, et al. Structural supportiveness theory on social network[J]. Chinese Journal of Computers,2014,37(4):905-914.(韩毅,许进,方滨兴,等.社交网络的结构支撑理论[J].计算机学报,2014,37(4):905-914.) [5] QU Y. Trust model research based on risk evaluation[D]. Nanjing: Nanjing Normal University,2011:40-44.(曲永花.基于风险评估的信任模型研究[D]. 南京: 南京师范大学,2011:40-44.) [6] BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[C]// Proceedings of the 17th Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 1996:164-173. [7] BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open network[C]// Proceedings of the European Symposium on Research in Security. Brighton: Springer-Verlag, 1994:3-18. [8] JOSANG A, BRADLEY D, KNAPSKOG S J. Belief-based risk analysis[C]// Proceedings of the 2nd Workshop on Australasian Security,Data Mining and Web Intelligence,and Software Internationalisation. Darlinghurst: Australasian Computer Society, 2004:63-68. [9] SABATER J,SIERRA C. REGRET: reputation in gregarious societies[C]// Proceedings of the 15th International Conference on Autonomous Agents.New York: ACM,2001:194-195. [10] AL-OUFI S,KIM H-N, SADDIK A E. A group trust metric for identifying people of trust in online social networks[J]. Expert Systems with Applications,2012,39(18): 13173-13181. [11] ZHAN J,FANG X.A novel trust computing system for social networks[C]// Proceedings of the 2011 IEEE Third International Conference on Privacy,Security,Risk,and Trust,and 2011 IEEE Third International Conference on Social Computing. Piscataway: IEEE, 2011: 1284-1289. [12] ZHANG X. Trust-based information propagation model in online social networks[J]. Journal of Computer Applications,2014,34(2):411-416.(张晓伟.在线社交网络下基于信任度的消息传播模型[J].计算机应用,2014,34(2):411-416.) [13] WU X, LI Y, LI L. Influence analysis of online social networks[J]. Chinese Journal of Computers, 2014,37(4):735-752.(吴信东,李毅,李磊.在线社交网络影响力分析[J].计算机学报,2014,37(4):735-752.) [14] GAN Z,DING Q,LI K, et al. Reputation-based multi-dimensional trust algorithm[J]. Journal of Software,2011,22(10): 2401-2411.(甘早斌,丁倩,李开,等.基于声誉的多维度信任计算算法[J].软件学报,2011,22(10): 2401-2411.) [15] TAN Z, WANG X, CHENG W, et al. A distributed trust model for peer-to-peer networks based on multi-dimension-history vector[J]. Chinese Journal of Computers,2010,33(9):1725-1735.(谭振华,王兴伟,程维,等.基于多维历史向量的P2P分布式信任评价模型[J].计算机学报,2010,33(9):1725-1735.) |