Page 96 - Trust in ICT 2017
P. 96
1 Trust in ICT
[15] J. H. J. Golbeck, “Accuracy of metrics for inferring trust and reputation,” in Proceedings of the 14th
International Conference on Knowledge Engineering and Knowledge Management, 2004.
[16] J. H. J. Golbeck, “Inferring reputation on the semantic web,” in Proceedings of the 13th
InternationalWorldWideWeb Conference, 2004.
[17] P. R. e. al, “Reputation Systems,” Communications of the ACM, pp. 45-48, 2000.
[18] J. F. J. I. a. A. K. M. Blaze, “The KeyNote Trust Management System,” University of Pennsylvania,
1999.
[19] A. S. Aarti Singh, “Introducing Trust Establishment Protocol In Contract Net Protocol,” in
International Conference on Advances in Computer Engineering, Bangalore, Karnataka, India, 2010.
[20] R. Neisse, “Trust and Privacy Management Support for Context-aware Service Platforms,” University
of Twente, 2012.
[21] C. M. L. C. Liam McNamara, “Trust and mobility aware service provision for pervasive computing,”
First International Workshop on Requirements and Solutions for Pervasive Software Infrastructures,
2006/5.
[22] C. P. Mouratidis H, “Practitioner’s challenges in designing trust into online systems,” Journal of
theoretical and Applied Electronic Commerce Research, vol. 5, pp. 65-77, 2010.
[23] F. M. ,. M. N. Z. Paolo Giorgini, “Requirements engineering for trust management:model,
methodology, and reasoning,” International Journal of Information Security, 2006.
[24] K. M. H. T. R. A. C. A. S. Jose E. Fadul, “A Trust-Management Toolkit for Smart-Grid Protection
Systems,” IEEE TRANSACTIONS ON POWER DELIVERY,, vol. 29, no. 4, pp. 1768-1779,.
[25] J. Z. T. T. U. F. M. R. C. John Finnson, A Framework for Modeling Trustworthiness of Users in Mobile
Vehicular Ad-hoc Networks, vol. 7379, Berlin: Springer, 2012, pp. 76-87.
[26] P.-T. C. a. C.-S. Laih, “A challenge-based trust establishment protocol for peer-to-peer networks,”
SECURITY AND COMMUNICATION NETWORKS, p. 71–78, 2011.
[27] A. L. A. S. Laurent Gomez, “Trustworthiness Assessment of Wireless Sensor Data for Business
Applications,” in International Conference on Advanced Information Networking and Applications,
Bradford, 2009.
[28] W. Zhang, S. Das and Y. Liu, “A Trust Based Framework for Secure Data Aggregation in Wireless
Sensor Networks,” in IEEE SECON 2006 proceedings., Reston, VA, 2006.
[29] M. F. J. a. L. Blaze, “Decentralized Trust Management,” in IEEE Conference on Security and Privacy,
1996.
[30] S. B. Y. Y. N. X. Jingpei Wang, “Distributed Trust Management Mechanism for the Internet of
Things,” in International Conference on Computer Science and Electronics Engineering, 2013.
[31] S. C. M. Bahtiyar, “Extracting trust information from security system of a service,” Journal of
Network and Computer Applications, pp. 480-490, 2012.
[32] Z. F. Y. X. Li X, “A multi-dimensional trust evaluation model for large-scale P2P computing,” ournal
of Parallel and Distributed Computing, pp. 837-847, 2011.
[33] Y. L. H. Z. Y. Sun, “A trust evaluation framework in distributed network: Vulnerability analysis and
defense against attacks,” in IEEE Infocom, 2006.
88