[1] Huang C L, Hu H P, Wang Z Y. Balancing risk and trust in trust-based decision making [J]. Computer Engineering & Science, 2007, 29(4):31-35(in Chinese). 黄辰林,胡华平,王志英. 一种面向可信决策的风险信任平衡模型研究 [J]. 计算机工程与科学, 2007, 29(4):31-35.
[2] Liu B D. Uncertainty theory //Studies in Fuzziness and Soft Computing. Berlin, Heidelberg: Springer, 2007,154: 205-234.
[3] Huang C L, Hu H P, Wang Z Y. Extension of subjective logic for time-related trust [J]. Wuhan University Journal of Natural Sciences, 2005, 10(1): 56-60.
[4] Husserl E. Formal and transcendental logic [M]. Hague, Netherlands: Martinus Nijhoff, 1969.
[5] Jsang A. Prospectives for modelling trust in information security //Proceedings of the 2nd Australasian Conference on information Security and Privacy. London, UK: Springer-Verlag, 1997:2-13.
[6] Jsang A. A subjective metric of authentication //Proceedings of the 5th European Symposium on Research in Computer Security. London, UK: Springer-Verlag, 1998:329-344.
[7] Shafer G. Perspectives on the theory and practice of belief functions [J]. International Journal of Approximate Reasoning, 1990, 4(5/6): 323-362.
[8] Huberman B A, Wu F. The dynamics of reputations [J]. Journal of Statistical Mechanics: Theory and Experiment, 2004 (4): 6-22.
[9] Jesi G P. PeerSim: a peer-to-peer simulator . USA: Source Forge. (2009-03-10) . http://peersim.sourceforge.net/.
[10] KamvarS D, Schlosser M T, Molina H G. EigenRep: reputation management in P2P networks //Proceedings of the 12th International World Wide Web Conference. Budapest, Hungary: ACM Press, 2003:123-134.
|