[1]
|
M. Blaze, J. Feigenbaum, J. Ioannidis, et al., “The role of trust management in distributed systems security,” Secure Internet Programming: Issues for Mobile and Distributed Objects, Berlin: Springer-Verlag, pp. 185-210, 1999.
|
[2]
|
R. Khare and A. Rifkin, “Trust management on World Wide Web,” World Wide Web Journal (S1085-2298), Vol. 2, No. 3, pp. 77-112, 1997.
|
[3]
|
B. Yu and M. P. Singh, “An evidential model of distributed reputation management,” International Conference on Autonomous Agents, Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1, pp. 294-301, 2002.
|
[4]
|
S. B. Sitkin, D. M. Rousseau, R. S. Burt, and Camerer, “Trust in and between organizations,” Academy of Management Review, Vol. 20, No. 3, pp. 387-620, 1998.
|
[5]
|
T. Wen and C. Zhong, “Research of subjective trust management model based on the fuzzy set theory,” Journal of Software, Vol. 14, No. 8, pp. 1401-1408, 2003.
|
[6]
|
T. Wen, H. Jianbin, and C. Zhong, “Research on a fuzzy logic-based subjective trust management model,” Computer Research and Development, Vol. 42, No. 10 pp. 1654-1659, 2005.
|
[7]
|
M. Burrows, M. Abadi, and R. M. Needham, “A logic of authentication,” The Royal Society of London, DEC Systems Research Center, Technical Report, pp. 39, 1989.
|
[8]
|
M. Blaze, J. Ioannidis, and A. D. Keromytis, “Experience with the keynote trust management system: Applications and future directions,” iTrust, New York: Springer, pp. 284-300, 2003.
|
[9]
|
M. Blaze, J. Feigenbaum, and A. D. Keromytis, “KeyNote: trust management for public-key infrastructures,” B. Christianson, B. Crispo, S. William, et al., eds, Cambridge 1998 Security Protocols Intl. Workshop, 1998.
|
[10]
|
T. Beth, M. Borcherding, and B. Klein, “Valuation of trust in open networks,” Proceedings 1 European Symposium on Research in Security (ESORICS), Berlin: Springer-Verlag, pp. 3-18, 1994.
|
[11]
|
R. Yahalom, B. Klein, and T. H. Beth, “Trust relationships in secure systems-A distributed authentication perspective. Proceedings 1993 IEEE Symposium on Research in Security and Privacy 1. Los Alamitos: IEEE Computer Society Press, pp. 150-164, 1993.
|
[12]
|
S. K. Liu and X. T. Liu, “A new method of elevation of confidence level of large-scale perplexing simulation system,” Journal of System Simulation, Vol. 13, No. 5, pp. 666-669, 2001.
|
[13]
|
[13] A Josang, “A logic for uncertain probabilities,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (S0218-4885), Vol. 9, No. 3, pp. 279-311, 2001.
|
[14]
|
Y. Wei, J. S Li, and P. L. Hong, “Distributed peer-to-peer trust model and computer simulation,” Journal of System Simulation, Vol. 18, No. 4, pp. 938-942, 2006.
|
[15]
|
X. Y. Meng, “Research and implement on trust model and trust evaluation system based on cloud model [MS. Thesis],” BeiHang University, 2007.
|
[16]
|
X. Y. Meng, Zhang Guang-Wei, et al., “Research on subjective trust management model based on cloud model,” Journal of System Simulation, Vol. 19, No. 14, pp. 3310-3317, 2007.
|
[17]
|
G. W. Zhang, D. Y. Li, et al., “A collaborative filtering recommendation algorithm based on cloud model,” Journal of Software, Vol. 18, No. 10, pp. 2403-2411, 2007.
|
[18]
|
G. W. Zhang, J. C. Kang, et al., “Context based collaborative filtering recommendation algorithm,” Journal of System Simulation, Vol. 18, No. 2, pp. 595-601, 2006.
|
[19]
|
H. Zan, C. Hsinchun, and Z. Daniel, “Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering,” ACM Transactions on Information Systems, Vol. 22, No. 1, pp. 116-142, 2004.
|
[20]
|
B. Thiesson, C. Meek, D. M. Chickering, and D. Heckerman, “Learning mixture of DAG models1 microsoft research,” Technical Report, MSR2TR297230, 1997.
|
[21]
|
B. Sarwar, G. Karypis, J. Konstan and J. Riedl, “Analysis of recommendation algorithms for E-commerce,” In: Proceedings of the 2nd ACM Conference on Electronic Commerce,” New York: ACM Press, pp. 158-167, 2001 http://www.research. ibm.com/iac/ec00/.
|
[22]
|
C. C. Aggarwal, J. Wolf, K. L. Wu and P. S. Yu, 揌orting hatches an egg: A new graph-theoretic approach to collaborative filtering,?In: Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM Press, pp. 201−212, 1999.
|
[23]
|
D. Y. Li, C. Y Liu et al., “Artificial intelligence with uncertainty,” Journal of Software, Vol. 15, No. 9, pp. 1583-1594, 2004.
|
[24]
|
D. Y. Li and Y. Du, “Artificial intelligence with uncertainty,” Chapman & Hall/CRC Taylor & Francis Group, 2008.
|
[25]
|
D. Y. Li and C. Y. Liu, “The universality of normal cloud model,” Engineering Science, Vol. 6, No. 8, pp. 28-34, 2004.
|
[26]
|
G. Zacharia and P. Maes, “Trust management through reputation mechanisms,” Applied Artificial lntelligence, Vol. 14, pp. 881-907, 2000.
|
[27]
|
E. M. Maximillen and M. P. Singh, “Conceptual model of web services reputation,” ACM SIGMOD, Special section on semantic web and data management, Vol. 31, No. 4, pp. 36-41, 2002.
|
[28]
|
L. Z. Zeng, B. Benatallah, M. Dumas, J. Kalagnanam, and Q. Z. Sheng, “Web engineering: Quality driven web service composition,” ACM Press Proceedings of the twelfth international conference on World Wide Web, May 2003.
|
[29]
|
S. Majithia, A. S. Ali, O. F. Rana, and D. W. Walker, “Reputation-Based Semantic Service Discovery,” Enabling Technologies: Infrastructure for Collaborative Enterprises, 2004, WET ICE 2004, 13th IEEE International Workshops on, pp. 297-302, 2004.
|
[30]
|
L. Z. Zeng, B. Benatallah, et al., “QoS-Aware middleware for web services composition,” IEEE Transactions on Software Engineering, Vol. 30, No. 5, pp. 311-327, 2004.
|