[1] Blaze M, Feigenbaum J, Strauss M. Compliance checking in the policyMaker trust management system //Proceedings of the Financial Cryptography’98 Lecture Notes in Computer Science 1465. Berlin: Springer-Verlag, 1998: 254-274.
[2] Blaze M, Feigenbaum J, Strauss M. Compliance checking in the policymaker trust management system //Franklin M, ed. Proc of the 2nd Financial Crypto Conf. New York: IEEE Press, 1998: 205-216.
[3] Blaze M, Feigenbaum J, Ioannidis J, et al. The KeyNote trust management version 2 .(1999-09) . IETF RFC 2704,1999.http://www.ietf.org/rfc/rfc2704.txt.
[4] Oppliger R, Pemul G, Strauss C. Using attribute certificates to implement role-based authorization and access controls //Proc of the 4th Fachtagung Sicherheit in Informations Systemen (SIS 2000). 2000:169-184.
[5] Ellison C, Frantz B, Lampson B, et al. SPKI certificate theory .(1999-09) . IETF RFC 2693,1999. http://www.ietf.org/rfc/rfc2693.txt.
[6] Li N H, Winsborough W H, Mitchell J C. Distributed credential chain discovery in trust management [J]. Journal of Computer Security, 2003,11:35-86.
[7] Sandhu R, Coyne E, Feinstein H. Role-based access control model [J]. IEEE Computer, 1996, 29(2): 38-47.
[8] Quillinan T B, Clayton B C, Simon N. Foley GridAdmin: decentralising grid administration using trust management //Proc of the 3rd Intl Symposium on Parall and Distributed Computing(ISPDC). Piscataway, NJ:IEEE Press,2004.
[9] Mao Z Q, Li N H, William H. Winsborough: distributed credential chain discovery in trust management with parameterized roles and constraints (short paper) //ICICS. 2006: 159-173.
[10] Liao Z S, Jin H. Automated trust negotiation and its development trend [J]. Journal of Software, 2006,17(9):1933-1948 (in Chinese). 廖振松,金海. 自动信任协商及其发展趋势 [J]. 软件学报,2006,17(9):1933-1948.
[11] Winsborough W H, Jacobs J. Automated trust negotiation in attribute-based access control //IEEE Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX).2003.
[12] Zhu H F,Feng B,Deng R H. Computing of trust in distributed networks .(2003) . http://eprint.iacr.org/2003/056.pdf.
[13] Selcuk A, Uzun E, Pariente M R. A reputation-based trust management system for P2P networks //4th IEEE/ACM International Symposium on Cluster Computing and the Grid. 2004.
[14] Li N, Feigenbaum N, Grosof Joan Feigenbaum. A logicbased knowledge representation for authorization with delegation //Proc of the 12th Computer Security Foundations Workshop. 1999.
[15] Singh A, Liu L. TrustMe: anonymuous management of trust relationships in decen tralized P2P systems //Proceedings of the Third IEEE International Conference on Peer-to-Peer Computing.2003.
[16] Gao Y,Cheng T Y,Wang S.The study of p2p trust management model and certificate revocation approach [J]. Chinese Journal of Computers, 2006,29(8):1282-1289(in Chinese). 高迎,程涛远,王珊. 对等网信任管理模型及安全凭证回收方法的研究 [J]. 计算机学报,2006,29(8):1282-1289.
[17] Marsh S. Formalizing trust as a computational concert . University of Strirling, 1994.
[18] Chen R,Yeager W. Poblano a distributed trust model for peer- to-peer networks . (2001-11-02) .Sun Microsystems,2000.http://www.jxta.org/docs/trust.pdf.
[19] Li J T,Jing Y N,Xiao X C. A trust model based on similarity-weighted recommendation for P2P environments [J]. Journal of Software, 2007,18(1):157-167(in Chinese) 李景涛, 荆一楠, 肖晓春. 基于相似加权推荐的P2P 环境下的信任模型 [J]. 软件学报,2007,18(1):157-167.
[20] Sandhu R, Coyne E, Feinstein H. Role-based access control model [J]. IEEE Computer, 1996, 29(2):38-47.
[21] Sabater J,Sierra C.Review on computational trust and reputation models [J].Artificial Intelligence Review,2005,24:33-60.
[22] Stoica I, Morris R, Karger D, et al. Chord: A scalable peer-to-peer lookup service for internet applications //Proceedings of the ACM SIGCOMM’01. San Diego, CA, 2001.
[23] Xu F, Lü J. Research and development of trust management in Web security [J]. Journal of Software,2002,13(11):2057-2064 (in Chinese). 徐锋,吕建. Web安全中的信任管理研究与进展 [J]. 软件学报,2002,13(11):2057-2064.
|