[1]
|
Y. Atif, “Building Trust in E-Commerce,” IEEE Internet Computing, Vol. 6, No. 1, 2002, pp. 18-24. http://dx.doi.org/10.1109/4236.978365
|
[2]
|
P. Resnick, K. Kuwabara, R. Zeckhauser and E. Friedman, “Reputation Systems,” Communications of the ACM, Vol. 43, No. 12, 2000, pp. 45-48. http://dx.doi.org/10.1145/355112.355122
|
[3]
|
E. Bertino, B. Catania, E. Ferrari and P. Perlasca, “A Logical Framework for Reasoning about Access Control Models,” Proceedings of the 6th ACM symposium on Access Control Models and Technologies, Chantilly, 3-4 May 2001, pp. 41-52. http://dx.doi.org/10.1145/373256.373261
|
[4]
|
S. Jajodia, P. Samarati, M. L. Sapino and V. S. Subrahmanian, “Flexible Support for Multiple Access Control Policies,” ACM Transaction Database System, Vol. 26, No. 2, 2001, pp. 214-260. http://dx.doi.org/10.1145/383891.383894
|
[5]
|
L. Yang and R. Ege, “Integrating Trust Management into Usage Control in P2P Multimedia Delivery,” Proceedings of 20th International Conference on Software Engineering and Knowledge Engineering, Redwood City, 1-3 July 2008, pp. 411-416.
|
[6]
|
R. K. Ege, Y. Li and R. Whittaker, “Extracting Value from P2P Content Delivery,” Proceedings of the 4th International Conference on Systems, Cancun, 1-6 March 2009, pp. 102-108.
|
[7]
|
R. K. Ege, “OghmaSip: Peer-to-Peer Multimedia for Mobile Devices,” The 1st International Conference on Mobile Services, Resources, and Users, Barcelona, 23-29 October 2011, pp. 1-6.
|
[8]
|
R. K. Ege, L. Yang, Q. Kharma and X. Ni, “Three-Layered Mediator Architecture Based on DHT,” Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms, and Networks, Hong Kong, 10-12 May 2004, pp. 317-318.
|
[9]
|
C. Wu and B. C. Li, “R-Stream: Resilient Peer-to-Peer Streaming with Rateless Codes,” Proceedings of the 13th ACM International Conference on Multimedia, Singapore, 6-11 November 2005 pp. 307-310. http://dx.doi.org/10.1145/1101149.1101211
|
[10]
|
P. Gutmann, “The Design of a Cryptographic Security Architecture,” Proceedings of the 8th USENIX Security Symposium, Washington DC, 23-26 August 1999, pp. 153-168.
|
[11]
|
Network Working Group, “Diffie-Hellman Key Agreement Method, Request for Comments: 2631,” RTFM Inc., 1999.
|
[12]
|
Open Handset Alliance, 2010. http://www.openhandsetalliance.com/
|
[13]
|
Sip2Peer, SIP-Based API for Robust Connection and Communication among Peers, 2011. http://code.google.com/p/sip2peer/
|
[14]
|
java.net—The Source for Java Technology Collaboration, The JDK 7 Project, 2010. http://jdk7. java.net/
|
[15]
|
R. Stewart, “Stream Control Transmission Protocol, Request for Comments: 4960,” IETF Network Working Group, 2010. http://tools.ietf.org/html/rfc4960
|
[16]
|
OpenID, 2012. http://www.openid.net
|
[17]
|
OAuth, OAuth Community Site, 2012. http://www.oauth.net/
|