JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 103-108.doi: 10.6040/j.issn.1671-9352.2.2014.365
Previous Articles Next Articles
ZHAO Bin1,2, HE Jing-sha1,3, ZHANG Yi-xuan1, ZHAI Peng2, LIU Gong-zheng1, ZHOU Shi-yi3
CLC Number:
[1] GRIFFIN J, JAEGER T, PEREZ R. Trusted virtual domains: toward secure distributed services[C]//Proceedings of the 1st Workshop on Hot Topics in Systems Dependability. Yokohama: IEEE Press, 2005: 1-6. [2] FENG Fujun, CHUANG Lin, PENG Dongsheng, et al. A trust and context based access control model for distributed systems[C]//Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications(HPCC'08).Washington: IEEE Computer Society, 2008: 629-634. [3] HAN Guangjie, JIANG Jinfang, SHU Lei, et al. Management and applications of trust in wireless sensor networks: a survey[J]. Journal of Computer and System Sciences, 2014, 80(3): 602-617. [4] BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[C]//Proceedings of the IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 1996: 164-173. [5] KAMVAR S D, SCHLOSSER M T, GARCIA-MOLINA H. The EigenTrust algorithm for reputation management in P2P networks[C]//Proceedings of the 12th International World Wide Web Conference(WWW'03).New York: ACM Press, 2003: 640-651. [6] ZHOU Runfang, HWANG K. Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(4): 460-473. [7] SABATER J, SIERRA C. REGRET:a reputation model for gregarious societies[C]//Proceedings of the 4th International Workshop on Deception.Bologna:[s.n.], 2001: 61-69. [8] SONG Shanshan, HWANG K, ZHOU Runfang, et al. Trusted P2P transactions with fuzzy reputation aggregation[J]. IEEE Internet Computing, 2005, 9(6): 24-34. [9] 陈佩剑,杨岳湘,唐川.基于信任度量机制的分布式入侵检测系统[J].山东大学学报:理学版,2011, 46(9):77-80. CHEN Peijian, YANG Yuexiang, TANG Chuan. Honesty-rate measuring based distributed intrusion detection system[J]. Journal of Shandong University: Natural Science, 2011, 46(9): 77-80. [10] 陈珊珊.P2P网络中基于权重因素的信任模型[J].计算机应用,2013, 33(6):1612-1614. CHEN Shanshan. Trust model based on weight factor in P2P network[J]. Journal of Computer Applications, 2013, 33(6): 1612-1614. [11] 梁洪泉,吴巍.基于动态贝叶斯网络的可信度量模型研究[J].通信学报,2013, 34(9):70-78. LIANG Hongquan, WU Wei. Research of trust evaluation model based on dynamic Bayesian network[J]. Journal on Communications, 2013, 34(9): 70-78. [12] MA Shunan, HE Jingsha, SHUAI Xunbo. An access control method based on scenario trust[J]. International Journal of Computational Intelligence Systems, 2012, 5(5): 942-952. [13] SCHLOSSER M T, CONDIE T E, KAMVAR S D. Simulating a file sharing P2P network[C]//Proceedings of the 1st Workshop on Semantics in P2P and Grid Computing Budapest. Hungary: [s.n.], 2003: 69-80. |
[1] | ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan. The method of determining decision attribute weight based on information entropy and membership [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 86-90. |
[2] | LUO hai-yan, LÜ Ping, LIU Lin-zhong, YANG Xun. Enterprises trust comprehensive evaluation based on fussy rough AHP in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(08): 111-117. |
|