Page 96 - Trust in ICT 2017
P. 96

1                                                    Trust in ICT


             [15]   J. H. J. Golbeck, “Accuracy of metrics for inferring trust and reputation,” in Proceedings of the 14th
                   International Conference on Knowledge Engineering and Knowledge Management, 2004.

             [16]   J. H. J. Golbeck, “Inferring reputation on the semantic web,” in Proceedings of the 13th
                   InternationalWorldWideWeb Conference, 2004.

             [17]   P. R. e. al, “Reputation Systems,” Communications of the ACM, pp. 45-48, 2000.

             [18]   J. F. J. I. a. A. K. M. Blaze, “The KeyNote Trust Management System,” University of Pennsylvania,
                   1999.
             [19]   A. S. Aarti Singh, “Introducing Trust Establishment Protocol In Contract Net Protocol,” in
                   International Conference on Advances in Computer Engineering, Bangalore, Karnataka, India, 2010.

             [20]   R. Neisse, “Trust and Privacy Management Support for Context-aware Service Platforms,” University
                   of Twente, 2012.

             [21]   C. M. L. C. Liam McNamara, “Trust and mobility aware service provision for pervasive computing,”
                   First International Workshop on Requirements and Solutions for Pervasive Software Infrastructures,
                   2006/5.

             [22]   C. P. Mouratidis H, “Practitioner’s challenges in designing trust into online systems,” Journal of
                   theoretical and Applied Electronic Commerce Research, vol. 5, pp. 65-77, 2010.

             [23]   F. M. ,. M. N. Z. Paolo Giorgini, “Requirements engineering for trust management:model,
                   methodology, and reasoning,” International Journal of Information Security, 2006.

             [24]   K. M. H. T. R. A. C. A. S. Jose E. Fadul, “A Trust-Management Toolkit for Smart-Grid Protection
                   Systems,” IEEE TRANSACTIONS ON POWER DELIVERY,, vol. 29, no. 4, pp. 1768-1779,.

             [25]   J. Z. T. T. U. F. M. R. C. John Finnson, A Framework for Modeling Trustworthiness of Users in Mobile
                   Vehicular Ad-hoc Networks, vol. 7379, Berlin: Springer, 2012, pp. 76-87.

             [26]   P.-T. C. a. C.-S. Laih, “A challenge-based trust establishment protocol for peer-to-peer networks,”
                   SECURITY AND COMMUNICATION NETWORKS, p. 71–78, 2011.

             [27]   A. L. A. S. Laurent Gomez, “Trustworthiness Assessment of Wireless Sensor Data for Business
                   Applications,” in International Conference on Advanced Information Networking and Applications,
                   Bradford, 2009.
             [28]   W. Zhang, S. Das and Y. Liu, “A Trust Based Framework for Secure Data Aggregation in Wireless
                   Sensor Networks,” in IEEE SECON 2006 proceedings., Reston, VA, 2006.

             [29]   M. F. J. a. L. Blaze, “Decentralized Trust Management,” in IEEE Conference on Security and Privacy,
                   1996.

             [30]   S. B. Y. Y. N. X. Jingpei Wang, “Distributed Trust Management Mechanism for the Internet of
                   Things,” in International Conference on Computer Science and Electronics Engineering, 2013.

             [31]   S. C. M. Bahtiyar, “Extracting trust information from security system of a service,” Journal of
                   Network and Computer Applications, pp. 480-490, 2012.

             [32]   Z. F. Y. X. Li X, “A multi-dimensional trust evaluation model for large-scale P2P computing,” ournal
                   of Parallel and Distributed Computing, pp. 837-847, 2011.

             [33]   Y. L. H. Z. Y. Sun, “A trust evaluation framework in distributed network: Vulnerability analysis and
                   defense against attacks,” in IEEE Infocom, 2006.






            88
   91   92   93   94   95   96   97   98   99   100   101