what-when-how
In Depth Tutorials and Information
10. Riegelsberger, J., Sasse, M. A., and McCarthy, J. he mechanics of trust: A framework
for research and design. InternationalJournalofHumanComputerStudies, 2004. 62(3),
pp. 381-422.
11. Anderson, R. SecurityEngineering:AGuidetoBuildingDependableDistributedSystems ,
2001. John Wiley & Sons, New York.
12. Riegelsberger, J., Sasse, M. A., and McCarthy, J. he mechanics of trust: A framework
for research and design. InternationalJournalofHumanComputerStudies 2004. 62(3),
pp. 381-422.
13. Winsborough, W. and Li, N. Towards practical automated trust negotiation. In IEEE3rd
InternationalWorkshoponPoliciesforDistributedSystemsandNetworks , 2002. pp. 92-103.
14 Fengming Liu and Yongsheng Ding. Social network-based trust computing in P2P
environments intelligent control and automation, 2008. 7thWorldCongressonWCICA
2008 . June 25-27, 2008, pp. 2130-2135.
15. James Caverlee, Ling Liu, and Steve Webb. SocialTrust: Tamper-resilient trust estab-
lishment in online communities, June 2008. JCDL'08:Proceedingsofthe8thACM/
IEEE-CSJointConferenceonDigitalLibraries .
16. Xuan Wang and Lei Wang. P2P recommendation trust model. Intelligent Systems
DesignandApplications , 2008. EighthInternationalConferenceonISDA'08 . Volume 2,
November 26-28, 2008, pp. 591-595.
17. Taherian, M., Amini, M., and Jalili, R. Trust inference in web-based social networks
using resistive networks. Internet and Web Applications and Services, 2008 . hird
InternationalConferenceonICIW'08 . June 8-13, 2008, pp. 233-238.
18. Maheswaran, M., Hon Cheong Tang, and Ghunaim, A. Towards a gravity-based trust
model for social networking systems. DistributedComputingSystemsWorkshops , 2007.
27thInternationalConferenceonICDCSW'07 . June 22-29, 2007, pp. 24-24.
19. Javed I. Khan and Sajid S. Shaikh. A phenotype reputation estimation function and
its study of resilience to social attacks. JournalofNetworkandComputerApplications ,
2009. Published by Elsevier Ltd. Vol 32, Issue 4, July 2009, Pages: 913-924.
20. Dabek, F., Cox, R., Kaashoek, F., and Morris, R. Vivaldi. A decentralized network
coordinate system, Proc.oftheACMSIGCOMM'04Conference , December 2004.
21. Ng, T. S. E. and Zhang, H. Predicting internet network distance with coordinate-based
approaches, IEEEInfocom , June 2002.
22. Cohen, B. Incentives build robustness in bittorrent. In ProceedingsoftheWorkshopon
EconomicsofPeer-To-PeerSystems , 2003.
23. Colombo, G., Whitaker, R.M., and Allen, S.M. Cooperation in social networks of trust.
Self-AdaptiveandSelf-OrganizingSystemsWorkshops,2008 . SecondIEEEInternational
ConferenceonSASOW2008 . October 20-24, 2008, pp. 78-83.
24. Feldman, M. and Chuang, J. Overcoming free-riding behavior in peer-to-peer systems.
ACMSIGecomExchanges , 5: 41-50, 2005.
25. Kolaczek, G. Trust modeling in virtual communities using social network metrics.
Intelligent System and Knowledge Engineering , 2008. 3rd International Conference on
ISKE2008 . Volume 1, November 17-19, 2008, pp. 1421-1426.
26. DeFigueiredo, Dd. B. and Barr, E.T. TrustDavis: A non-exploitable.online reputation
system. E-commerce technology, 2005 . Seventh IEEE International Conference on CEC
2005 . July 19-22, 2005, pp. 274-283.
27. Mitra, A. and Maheswaran, M. Trusted gossip: A rumor resistant dissemination mechanism
for peer-to-peer information sharing. AdvancedInformationNetworkingandApplications ,
2007. 21stInternationalConferenceonAINA'07 . May 21-23, 2007, pp. 702-707.
Search WWH ::




Custom Search