참고문헌
- D.H. McKnight and N.L. Chervany, The Meanings of Trust, Scientific report, University of Minnesota, 1996.
- R.C. Mayer, J.H. Davis, and F.D. Schoorman, "An integrative model of organizational trust," Academy of Management Review, Vol. 20, No. 3, pp. 709-734, 1996. https://doi.org/10.5465/AMR.1995.9508080335
- W. Bamberger, "Interpersonal Trust - Attempt of a Definition. Scientific report," Technische Universitat Munchen. Retrieved on Aug. 16, 2011.
- A.B. Seligman, "On the limits of Confidence and Role Expectations," American Journal of Economics and Sociology, Volume 57, Issue 4, pp. 391-404, October 1998. https://doi.org/10.1111/j.1536-7150.1998.tb03372.x
- A. McCullagh, "Trust, Contract and Economic Cooperateion," Cambridge Journal of Economics, Vol. 23, pp 301-315, 1998.
- A. Kine and J. Choobineh, "Trust in Electronic Commerce; Definition and Theoretical Considerations," in W. Blanning and D. King(eds.), Proceeding s of the 31 Annual Hawaii Conference on System Sciences, Volume IV, IEEE Computer Society, 1998.
- M. Kosfeld, M. Heinrichs, P.J. Zak, U. Fischbacher, and E. Fehr, "Oxytocin increases trust in humans," Nature435, pp. 673-676, 2005. https://doi.org/10.1038/nature03701
- R. Hardin, (eds.), Trust and trustworthiness. Russell Sage Foundation, 2002.
- B. Shneiderman, "Designing trust into online experiences," Communications of the ACM, Volume 43, Nr.12. pp. 57-59, 2000.
- M. Taddeo, "Defining trust and e-trust," in: A. Mesquita, Sociological and Philosophical Aspects of human interaction with technology, Information Science Reference, pp. 23-25, 2011.
- D. Helbing, "A mathematical model for the behavior of individuals in a social field," J. Math. Sociol., Vol. 19, Nr. 3, pp. 189-219, 1994. https://doi.org/10.1080/0022250X.1994.9990143
- G. Mollering, "The nature of trust: From geog simmel to a theory of expectation, interpretation and suspension", Sociol., Vol. 35, pp. 403-420, 2002.
- L.D. Molm, N. Takahashi, and G. Peterson, "Risk and trust in social exchange: An experimental test of a classical proposition," Amer. J. Sociol., Vol. 5, Nr. 105, pp. 1396-1427, 2000
- F. Huang, "Building social trust: A human-capital approach," J. Institut. Theor. Econ., Vol. 163, Nr. 4, pp. 552-573, 2007. https://doi.org/10.1628/093245607783242981
- M. Maheswaran, H.C. Tang, and A. Ghunaim, "Towards a gravity-based trust model for social networking systems," in International Conference on Distributed Computing Systems Workshops. IEEE Computer Society, Los Alamitos, CA, Sep. 24, 2007.
- D. Hughes, G. Coulson, and J. Walkerdine, "Free riding on gnutella revisited: The bell tolls?" IEEE Distrib. Syst. Online 6, Nr. 1, 2005.
- J. Yao, S. Chen, S. Nepal, D. Levy, and J. Zic, "Truststore: Making amazon s3 trustworthy with services composition," in the 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (CCGRID'10). IEEE Computer Society, Los Alamitos, CA, pp. 600-605, 2010.
- D. Moreland, S. Nepal, H. Hwang, and J. Zic, "A snapshot of trusted personal devices applicable to transaction processing," Personal Ubiq. Comput, Vol.14, Nr. 4, pp. 347-361, 2010. https://doi.org/10.1007/s00779-009-0235-6
- A. Seshadri, A. Perrig, L. Van Doorn, and P.K. Khosla, "SWATT: Software-based attestation for embedded devices," in the IEEE Symposium on Security and Privacy, pp. 272-282, 2004.
- L. Chen & J. Li, "Revocation of direct anonymous attestation," in the 2nd International Conference on Trusted Systems (INTRUST'10), pp.128-147, 2010.
- L. Mui, Computational models of trust and reputation: Agents, evolutionary games, and social networks, Ph.D. thesis, http://groups.csail.mit.edu/medg/people/lmui/docs/phddissertation.pdf., 2003.
- W. Sherchan, S. Nepal, and C. Paris, "A Survey of Trust in Social Networks," ACM Computing Surveys, Vol. 45, Nr. 4, Article 47, Aug. 2013.
- P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, "Reputation systems," Comm. ACM, Vol. 43, Nr. 12, pp. 45-48, 2000.
- S. Ruhomaa, L. Kutvonen, and E. Koutrouli, "Reputation management survey," in the 2nd International Conference on Availability, Reliability and Security (ARES'07), IEEE Computer Society, pp. 103-111, 2007.
- M. Momani & S. Challa, "Survey of trust models in different network domains," Int. J. Ad Hoc Sensor Ubiq. Comput., Vol. 1, Nr. 3, pp. 1-19, 2010. https://doi.org/10.5121/ijasuc.2010.1301
- G. Suryanarayana & Taylor. R., "A survey of trust management and resource discovery technologies in peer-to-peer applications," Tech. rep. UCI-ISR-04-6, Institute for Software Research, University of California, Irvine, 2004.
- P. Beatty, I. Reay, S. Dick, and J. Miller, "Consumer trust in e-commerce web sites: A metastudy," ACM Comput. Surv., Vol. 43, Nr.2, pp. 1-46, 2011.
- T. Grandison & M. Sloman, "A survey of trust in Internet applications," IEEE Comm. Surv. Tutorials 3, Nr. 4, 2000.
- Z. Malik, I. Akbar, and A. Bouguettaya, "Web services reputation assessment using a hidden markov model," in the 7th International Joint Conference on Service-Oriented Computing (ICSOCServiceWave'09), pp.576-591, 2009.
- E. Chang, T.S. Dillon, and F. Hussain, "Trust and Reputation for Service-Oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence," Wiley Periodicals, 2006.
- Y. Wang & J. Vassileva, "A review on trust and reputation for web service selection," in the 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07). IEEE Computer Society, pp. 25-32, 2007.
- A. Josang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decis. Support Syst., Vol. 43, Nr. 2, pp. 618-644, 2007. https://doi.org/10.1016/j.dss.2005.05.019
- J. Golbeck, "Trust on the World Wide Web: A survey," Found. Trends Web Sci. Vol. 1, Nr. 2, pp. 131-197, 2006. https://doi.org/10.1561/1800000006
- W.C. Hang & M.P. Singh, "Trust based recommendation based on graph similarities," http://www.csc.ncsu.edu/faculty/mpsingh/papers/mas/aamas-trust-10-graph.pdf., 2010
- Y. Zuo, W.-C. Hu, and T, O'Keefe, "Trust computing for social networking," in the 6th International Conference on Information Technology: New Generations, IEEE Computer Society, Los Alamitos, CA, pp. 1534-1539, 2009.
- J. Caverlee, L. Liu, and S. Webb, "Socialtrust: Tamper-resilient trust establishment in online communities," in the 8th ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL'08). ACM Press, New York, pp.104-114, 2008.
- H. Liu, E.-P. Lim, H.W. Lauw, M.-T. Le, A. Sun, J. Srivastava, and Y.A. Kim, "Predicting trusts among users of online communities: An epinions case study," in the 9th ACM Conference on Electronic Commerce (EC'08), ACM Press, New York, pp. 310-319, 2008.
- J. O'Donovan, B. Smyth, V. Evrim, and D. Mcleod, "Extracting and visualizing trust relationships from online auction feedback comments," in the 20th International Joint Conference on Artificial Intelligence, Morgan Kaufmann Publishers, San Francisco, pp. 2826-2831, 2007.
- A. Guerriero, S. Kubicki, and G. Halin, "Trust-oriented multi-visualization of cooperation context," in the 2nd International Conference in Visualisation (VIZ'09), IEEE Computer Society, Los Alamitos, CA, pp. 96-101, 2009.
- K.K. Bimrah, H. Mouratidis, and D. Preston, "Modelling trust requirements by means of a visualization language," in the Conference on Requirements Engineering Visualization (REV'08), IEEE Computer Society, Los Alamitos, CA, 26-30, 2008.
- P. Massa & P. Aversani, "Trust-aware recommender systems," in the 1st ACM Conference on Recommender Systems (RecSys'07), ACM Press, New York, 2007.
- G.A. Guerra, D.J. Zizzo, W.H. Dutton, and M. Peltu, "Economics of Trust in the Information Economy: Issues of Identity, Privacy and Security," Oxford Internet Institute, Research Report No.1, April 2003.
- Y. Wang, Y. Hori, and K. Sakurai, "Economic-inspired truthful reputation feedback mechanism in p2p networks," in the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, pp.80-88, 2007.
- M.W. Van Alstyne, G.G. Parker, and P.G. Sangeet, "Pipeline, Platforms, and the New Rules of strategy," HBR.org., April 2016.
- B. Carminati, E. Ferrari, and M. Viviani, "Security and Trust in Online Social Networks," in Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, 2014
- Y. Cheng, J. Park, and R. Sandhu, "Relationship-based access control for online social networks: Beyond user-touser relationships," in 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust and 2012 ASE/IEEE International Conference on Social Computing, 2012.