JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2015, Vol. 50 ›› Issue (05): 18-22.doi: 10.6040/j.issn.1671-9352.0.2014.130
Previous Articles Next Articles
ZHU Rui
CLC Number:
[1] WU Jyh-Jeng, CHEN Ying-Hueih, CHUNG Yu-Shuo. Trust factors influencing virtual community members: a study of transaction communities[J]. Journal of Business Research, 2010, 63(1):1025-1032. [2] LU Yaobin, ZHAO Ling, WANG Bin. From virtual community members to C2C e-commerce buyers: trust in virtual communities and its effect on consumers' purchase intention[J]. Electronic Commerce Research and Applications, 2010(9):346-360. [3] TURBAN E, KING D, VIEHLAND D, et al. Electronic commerce: a managerial perspective[M]. New Jersey: Pearson Education Inc, 2006:46-78. [4] MCKNIGHT D H, CHERVANY N L. What trust means in E-commerce customer relationships: an interdisciplinary conceptual typology[J]. International Journal of Electronic Commerce, 2002, 6(2):35-59. [5] MCKNIGHT D H, CHOUDHURY V, KACMAR C.The impact of initial consumer trust on intentions to transact with a web site: a trust building model[J]. Journal of Strategic Information Systems, 2002: 297-323. [6] HAGEL J I, ARMSTRONG A G. Net gain: expanding markets through virtual communities[M]. Cambridge: Harvard Business School Press, 1997: 154-172. [7] SMITH M. Tools for navigating large social cyberspace[J]. Commun, 2002, 45(4):51-55. [8] LI Xiaoqing. Buddy finding in the mobile environment[J].Technovation, 2005, 25(9):1017-1023. [9] BANSAL S, BAKER M. Observation-based cooperation enforcement in Ad hoc networks[R]. Palo Alto: Stanford University, 2003. [10] 李沁芳. 电子商务用户信任影响因素建模及实证研究[D]. 上海:同济大学, 2007. LI Qinfang. Modeling and empirical research on the impact of trust factors in e-commerce[D]. Shanghai: Tongji University, 2007. [11] MAURER U. Modeling a public-key infrastructure[J]. Lecture Notes in Computer Science, 1996, 1146:325-350. [12] REITER M K, STUBBLEBINE S G. Resilient authentication using path independence[J]. IEEE Transactions on Computer, 1998, 47(12):1351-1362. [13] JØSANG A. An algebra for assessing trust in certification chains[C]//Proceedings of the Network and Distributed System Security Symposiu. San Diego: DBLP, 1999:265-279. [14] LEVIEN R, AIKEN A. Attack-resistant trust metrics for publickey certification[C]//Proceedings of the 7th USENIX Security Symposiu.[S.l.]:[s.n.], 1998: 229-242. [15] KAMVAR S D, SCHLOSSER M T, GARCIA-MOLINA H. The eigentrust algorithm for reputation management in P2P networks[C]//Proceedings of the 12th International World Wide Web Conference. New York:ACM Press, 2003: 640-651. [16] GUHA R, KUMAR R, RAGHAVAN P. Propagation of trust and distrust[C]//Proceedings of the 13th Annual International World Wide Web Conferenc. New York: ACM Press, 2004: 403-412. [17] BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[C]//Proceedings of IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 1996: 164-173. [18] CLARKE D, ELIEN J-E, ELLISON C, et al. Certificate chain discovery in SPKI/SDSI[J]. Journal of Computer Security, 2001, 9(4):285-322. [19] ABDUL-RAHMAN A, HAILES S. A distributed trust model [C]//Proceedings of Meeting on New Security Paradigms. New York: ACM Press, 1998: 48-60. [20] HERZBERG A, MASS Y, MICHAELI J, et al. Access control meets public key infrastructure: or assigning roles to strangers[C]//Proceedings of IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 2000: 2-14. [21] MANCHALA D W. Trust metrics, models and protocols for electronic commerce transactions[C]//Proceedings of the 18th IEEE International Conference on Distributed Computing Systems. Los Vaqueros: IEEE Computer Society, 1998: 312-321. [22] RESNICK P, ZECKHAUSER R. Trust among strangers in Internet transactions: empirical analysis of eBay's reputation system[C]//Advances in Applied Microeconomics: the Economics of the Internet and E-Commerce 11. Amsterdam: Elsevier Science, 2000: 127-157. [23] JØSANG A, ISMAIL R, BOYD C. A survey of trust and reputation systems for online service provision[J]. Decision Support Systems, 2005, 43(2):618-644. [24] ZIMMERMANN P R. The official PGP user's guide[M]. Cambridge: MIT Press, 1995: 152-188. [25] YU B, SINGH M P, SYCARA K. Developing trust inlarge-scale peer-to-peer systems[C]//Proceedings of the 1st IEEE Symposium on Multi-Agent Security and Survivability. Los Vaqueros: IEEE Computer Society, 2004: 1-10. [26] BUCHEGGER S, BOUDEC J L. Performance analysis of the confidant protocol[C]//Proceedings of the 3rd ACM International Symposium on Mobile ad Hoc Networking & Computing. New York: ACM Press, 2002: 226-236. [27] MICHIARDI P, MOLÜA R. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks[M]//JERMANBLAZIC B, KLOBUCAR T. International federation for information processing. Norwell: Kluwer Academic Publishers, 2002: 107-121. [28] THEODORAKOPOULOS G, BARAS J S. Trust evaluation in ad-hoc networks[C]//Proceedigns of the ACM Workshop Wireless Security. New York: ACM Press, 2004: 1-10. [29] GAMBETTA D.Can we trust trust?[M]//GAMBETTA D. Trust: making and breaking cooperative relations. Oxford: Oxford University Press, 2000: 213-237. [30] PAOLO M.Trust-aware recommender systems[C]//Proceedings of ACM Recommender Systems Minneapolis. New York: ACM Press, 2007: 19-20. |
[1] | ZHANG Jian-biao, LI Zhi-gang, LIU Guo-jie, WANG Chao, WANG Wei. Process active dynamic measurement method for Windows environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 46-50. |
[2] | CUI Zhao-yang, SUN Jia-qi, XU Song-yan, JIANG Xin. A secure clustering algorithm of Ad Hoc network for colony UAVs [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 51-59. |
[3] | CHEN Xin, XUE Yun, LU Xin, LI Wan-li, ZHAO Hong-ya, HU Xiao-hui. Text feature extraction method for sentiment analysis based on order-preserving submatrix and frequent sequential pattern mining [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 36-45. |
[4] | SUN Liang, CHEN Xiao-chun, ZHONG Yang, LIN Zhi-peng, REN Tong. Secure startup mechanism of server based on trusted BMC [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 89-94. |
[5] | HUANG Dong, XU Bo, XU Kan, LIN Hong-fei, YANG Zhi-hao. Short text clustering based on word embeddings and EMD [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 66-72. |
[6] | CUI Xiao-yu, ZHAO Bo, FAN Pei-ru, XIAO Yu. A key management mechanism basedon TrustZone architecture [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 92-98. |
[7] | XU Zhong-hao, LI Tian-qi. Analysison statistical characteristic of Chinese stock market based on complex networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 41-48. |
[8] | LI Xiao-ce, PAN Xiao-zhong, MAI Tao-tao. Multi-component property based remote attestation [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 53-58. |
[9] | ZHAI Peng, LI Deng-dao. The fuzzy clustering algorithm based on inclusion index of Gausian membership function [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 102-105. |
[10] | ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan. The method of determining decision attribute weight based on information entropy and membership [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 86-90. |
[11] | LIU Da-fu, SU Yang. Research on evidence-based software trustworthiness metrics model [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(11): 58-65. |
[12] | LIU Ying-ying, LIU Pei-yu, WANG Zhi-hao, LI Qing-qing, ZHU Zhen-fang. A text clustering algorithm based on find of density peaks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(1): 65-70. |
[13] | GAO Xiao-bo, FANG Xian-mei, LI Shi-jun. Trust-aware product recommendation based on factorization machine [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(1): 89-94. |
[14] | FAN Yi-xing, GUO Yan, LI Xi-peng, ZHAO Ling, LIU Yue, YU Xiao-ming, CHENG Xue-qi. A multi-level page clustering method based on page segmentation [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(07): 1-8. |
[15] | JIANG Wei-jin, XU Yu-hui, GUO Hong, XU Yu-sheng. A multi-dimensional evidence dynamic trust computing model based on multi-agent [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(01): 1-11. |
|