Gambetta D. Can We Trust Trust [M] In D. Gambetta editor, Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford, 1990: 213-238.[2]Jsang A. Prospectives of modeling trust in information security [A]. In: Proceedings of the 2nd Australasian Conference on Information Security and Privacy [C]. Sydney, Australia, 1997: 219-231.[3]Jsang A. A logic for uncertain probabilities [J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279-311.[4]Blaze M, Feigenbaum J, Keromytis A D. Keynote: Trust management for public-key infrastructures [A]. In: Christianson B, Crispo B, William S, et al.. eds. Cambridge 1998 Security Protocols International Workshop [C]. Cambridge, UK, April 15-17, 1998. Berlin: Springer-Verglag, 1999: 59-63.[5]Beth T, Borcherding M, Klein B. Valuation of trust in open networks [A]. In: Gollmann D. ed. Proceedings of the European Symposium on Research in Security (ESORICS) [C]. Brighton, United Kingdom, November 1994: 3-18.[6]Jsang A. Trust-Based decision making for electronic transactions [EB/OL]. In: Proceedings of the 4th Nordic Workshop on Secure Computer System(NORDSEC99) [C]. Stockholm, Sweden, Stockholm University Report 99-005, 1999.[7]Blaze M, Feigenbaum J, Lacy J. Decentralized trust management [A], In: Dale J, Dinolt G, eds. Proceedings of the Symposium on Security and Privacy [C]. Oakland: IEEE Computer Society Press, 1996: 164-173.[8][8] Pretty good privacy users guide [S]. Distributed with the PGP software. Version 8.0 .2003.[9][9] Housley R. Internet X.509 Public Key Infrastructure, Certificate and CRL Profiles[S]. RFC2459, 1999. [10] Sonja Buchegger, Jean-Yves Le Boudec. The effect of rumor spreading in reputation systems for mobile Ad-hoc networks [A]. In Proceedings of Modeling and Optimization in Mobile, Ad hoc and Wireless Networks (WiOpt) [C], Sophia-Antipolis, France, March 2003: 66-75.[10]Sepandar D. Kamvar, Mario T. Schlosser, Hector Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks [A]. In Proceedings of the Twelfth International World Wide Web Conference [C]. Budapest, Hungary, 2003: 640-651.[11]Sergio Marti, Hector Garcia-Molina. Limited reputation sharing in p2p systems [A]. In Proceedings of the 5th ACM Conference on Electronic Commerce [C]. New York, NY, USA, 2004: 91-101.Tutte W T. Graph Theory [M]. Cambridge University Press, 2004.09: 78-97.[12]L.A .扎德著, 陈国权译. 模糊集合、语言变量及模糊逻辑 [M]. 北京: 科学出版社, 1982: 56-75.[13]谢季坚, 刘承平. 模糊数学方法及其应用[M]. 华中科技大学出版社, 2000: 16-20.[14]Chan Haowen, Perrig A, Song Dawn. Random key predistribution schemes for sensor networks [A]. In Proceedings of the 2003 IEEE Symposium on Security and Privacy [C]. IEEE Computer Society. 2003: 175-183.[15]Bremaud P, Chains M. Gibbs fields, Monte Carlo simulation, and queues [M]. Texts in Applied Mathematics; 31. Springer-Verlag New York, Inc., 1999: 234-266.[16]Watts D J, Strogatz S H. Collective dynamics of small-world networks [J].Nature.1998, 393:440-442[17]Watts D J. Small Worlds: the Dynamics of Networks Between Order and Randomness [M]. Princeton University Press, 2004: 124-147.
|