what-when-how
In Depth Tutorials and Information
10. Riegelsberger, J., Sasse, M. A., and McCarthy, J. he mechanics of trust: A framework
for research and design.
InternationalJournalofHumanComputerStudies,
2004. 62(3),
pp. 381-422.
11. Anderson, R.
SecurityEngineering:AGuidetoBuildingDependableDistributedSystems
,
2001. John Wiley & Sons, New York.
12. Riegelsberger, J., Sasse, M. A., and McCarthy, J. he mechanics of trust: A framework
for research and design.
InternationalJournalofHumanComputerStudies
2004. 62(3),
pp. 381-422.
13. Winsborough, W. and Li, N. Towards practical automated trust negotiation. In
IEEE3rd
InternationalWorkshoponPoliciesforDistributedSystemsandNetworks
, 2002. pp. 92-103.
14 Fengming Liu and Yongsheng Ding. Social network-based trust computing in P2P
environments intelligent control and automation, 2008.
7thWorldCongressonWCICA
2008
. June 25-27, 2008, pp. 2130-2135.
15. James Caverlee, Ling Liu, and Steve Webb. SocialTrust: Tamper-resilient trust estab-
lishment in online communities, June 2008.
JCDL'08:Proceedingsofthe8thACM/
IEEE-CSJointConferenceonDigitalLibraries
.
16. Xuan Wang and Lei Wang. P2P recommendation trust model.
Intelligent Systems
DesignandApplications
, 2008.
EighthInternationalConferenceonISDA'08
. Volume 2,
November 26-28, 2008, pp. 591-595.
17. Taherian, M., Amini, M., and Jalili, R. Trust inference in web-based social networks
using resistive networks.
Internet and Web Applications and Services, 2008
.
hird
InternationalConferenceonICIW'08
. June 8-13, 2008, pp. 233-238.
18. Maheswaran, M., Hon Cheong Tang, and Ghunaim, A. Towards a gravity-based trust
model for social networking systems.
DistributedComputingSystemsWorkshops
, 2007.
27thInternationalConferenceonICDCSW'07
. June 22-29, 2007, pp. 24-24.
19. Javed I. Khan and Sajid S. Shaikh. A phenotype reputation estimation function and
its study of resilience to social attacks.
JournalofNetworkandComputerApplications
,
2009. Published by Elsevier Ltd. Vol 32, Issue 4, July 2009, Pages: 913-924.
20. Dabek, F., Cox, R., Kaashoek, F., and Morris, R. Vivaldi. A decentralized network
coordinate system,
Proc.oftheACMSIGCOMM'04Conference
, December 2004.
21. Ng, T. S. E. and Zhang, H. Predicting internet network distance with coordinate-based
approaches,
IEEEInfocom
, June 2002.
22. Cohen, B. Incentives build robustness in bittorrent. In
ProceedingsoftheWorkshopon
EconomicsofPeer-To-PeerSystems
, 2003.
23. Colombo, G., Whitaker, R.M., and Allen, S.M. Cooperation in social networks of trust.
Self-AdaptiveandSelf-OrganizingSystemsWorkshops,2008
.
SecondIEEEInternational
ConferenceonSASOW2008
. October 20-24, 2008, pp. 78-83.
24. Feldman, M. and Chuang, J. Overcoming free-riding behavior in peer-to-peer systems.
ACMSIGecomExchanges
, 5: 41-50, 2005.
25. Kolaczek, G. Trust modeling in virtual communities using social network metrics.
Intelligent System and Knowledge Engineering
, 2008.
3rd International Conference on
ISKE2008
. Volume 1, November 17-19, 2008, pp. 1421-1426.
26. DeFigueiredo, Dd. B. and Barr, E.T. TrustDavis: A non-exploitable.online reputation
system.
E-commerce technology, 2005
.
Seventh IEEE International Conference on CEC
2005
. July 19-22, 2005, pp. 274-283.
27. Mitra, A. and Maheswaran, M. Trusted gossip: A rumor resistant dissemination mechanism
for peer-to-peer information sharing.
AdvancedInformationNetworkingandApplications
,
2007.
21stInternationalConferenceonAINA'07
. May 21-23, 2007, pp. 702-707.