1 |
S. D. Kamvar and M. T. Schlosser, "The eigenTrust algorithm for rep utation management in P2P networks," in Proc. 12th WWW, Budapest, Bulgaria,May 2003, pp. 640-651
|
2 |
R. Zhou and K. Hwang, "PowerTrust: A robust and scalable reputation system for trusted P2P computing," IEEE Trans. Parallel Distrib. Syst. , vol. 18, May 2007
|
3 |
C. Q. Tian, S. H. Zou, W.-D. WANG, and S.-D. Cheng, "A new trust model
based on recommendation evidence for P2P networks," in Proc. Chinese J. Comput. , Zurich, Switzerland, vol. 31, 2008, pp. 271-281
|
4 |
Y. Wang and K. J. Lin, "Reputation-oriented trustworthy computing in ecommerce environments, "IEEE Intemet Comput., pp. 55-59, 2008
|
5 |
A. Bieszczad, B. Pagurek, and T. White, "Mobile agents for network management,' IEEE Commun. Surveys, vol. 1, Sept. 1998
|
6 |
C. English, S. Terzis, and W. Wagealla, "Engineering trust based collaborations in a global computing environment," in Proc. 2th iTRUST/IEEE iTrust, Oxford, UK, 2004, pp. 135-145
|
7 |
X. Wu, J. S. Hε and F. Xu, "An enhanced trust model based on reputation
for P2P networks," in Proc. SUTC/IEEE, Taichung, Taiwan, June 2008, pp.67-73
|
8 |
M. Feldman, K. Lai, and I. Stoica, "Robust incentive techniques for peer
to-peer networks," in Proc. 5th ECC/ACM ECC, New York, USA, Oct
2004, pp. 102-111
|
9 |
I. Ajzen, "The theory of planed bεhavior, "Organizational Behavior and Human Decision Processes, vol. 50, pp. 197-211, 1991
|
10 |
L. Xiong and L. Liu, "PeerTrust: Supporting reputation-based trust for peer-to-pεer electronic communities," IEEE Trans. Knowl. Data Eng., vol. 16, pp. 843-857, 2004
|
11 |
2004. Cambridge dictionaries online. [Online]. Available: http://diction ary.cambridge.org
|
12 |
J. V. Neumann and O. Morgenstern, Theory of Games and Economic Behavior, Princeton, Princeton Univ, 1947
|
13 |
D. Donato, M. Paniccia, M. Selis, C. Castillo, G. Cortese, and S Leonardi, "New metrics for reputation management in P2P networks," in Proc. 3rd Workshop on Adversarial Infonnation Retrieval on the Web, Canada, May 2007, pp.65-72
|
14 |
D. Figueirdo. J. Shapiro. and D. Towsley. "Incentives to promote avail ability in peer-to-peer anonymity systems;' in Proc. 13th ICNP. 2005. pp. 110-121
|
15 |
Z. Yan and P. Zhang, "Trust collaboration in P2P systems based on trusted computing platforms," WSEAS Trans. Mag. , vol. 3, pp. 275-282, Feb 2006
|
16 |
K. R. Gardner, Games for Business ad Economics, John Wiley and Sons, 1995
|
17 |
M. Deutsch, "Trust and suspicion," Confict Resolution. Mag., vol. 2, pp.265-279, 1958
DOI
ScienceOn
|
18 |
R. Anderson and T. Moore, "The economics of information security," im
Science 314, Oct. 2000, pp. 610-613
|
19 |
2005. Merriam-webster online. [Online]. http://www.webster.com
|