Page 99 - Trust in ICT 2017
P. 99
Trust in ICT 1
[73] SAP, 2014. [Online]. Available: http://forge.fi-ware.eu/plugins/mediawiki/wiki/fiware/index.php/
FIWARE.OpenSpecification.Security.USDL-.
[74] P. e. a. Anantharam, “Trust model for semantic sensor and social networks: A preliminary report,”
in Aerospace and Electronics Conference (NAECON), , 2010.
[75] E. e. a. Chang, “International Journal of Intelligent systems,” Trust ontologies for e-service
environments, pp. 519-545, 2007.
[76] V. X. Tran, “WS-QoSOnto: a QoS ontology for web services." Services,” Service-Oriented System
Engineering, 2008.
[77] A. G. S. G. Marko Vujasinovic, Trust-based Discovery for Web of Things Markets, Berlin, Germany,
2014.
[78] S. G. A. a. J. D. Galizia, “A trust based methodology for web service selection,” in International
Conference on Semantic Computing, IEEE, 2007.
[79] B. P. J. H. Jennifer Golbeck, “Trust Networks on the Semantic Web,” in In Proceedings of
Cooperative Intelligent Agents, 2003, pp. 238-249.
[80] A. S. David Brondsema, “Trust Networks Using PGP and RDF,” in Workshop on the Models of Trust
for the Web, 2006.
[81] C. Burnett, “Trust Assessment and Decision-Making in Dynamic Multi-Agent Systems,” University of
Aberdeen. Doctor of Philosophy, 2011.
[82] N. Griffiths, “A fuzzy approach to reasoning with trust, distrust and insufficient trust,” Lecture Notes
in Computer Science, 2006.
[83] R. C. A. t. T. a. N. d. K. Kathrin Dentler, “Comparison of reasoners for large ontologies in the OWL 2
EL profile,” Semantic Web, 2011.
[84] S. H. Z. Yan, “Trust Modeling and Management - from Social Trust to Digital Trust,” Computer
Security, Privacy and Politics: Current Issues, Challenges and Solutions IGI Global, p. 2008, 290-323.
[85] R. I. A. Josang and C. Boyd, “A Survey of Trust and Reputation Systems for Online Service Provision,”
Decision Support Systems, pp. 644-681, 2007.
[86] L. Zadeh, “ Fuzzy Logic, Neural Networks, and Soft Computing,” Communications of the ACM, 1994.
[87] A. H. a. N. Georganas, “A Comparison of Mamdani and Sugeno Fuzzy Inference Systems for
Evaluating the Quality of Experience of Hapto-Audio-Visual Applications,” IEEE International
Workshop on Haptic Audio Visual Environments and Games (HAVE), 2008.
[88] E. J.-L. a. J. Siskos, “Assessing a Set of Additive Utility Functions for Multi-criteria Decision-Making,
the UTA Method,” European Journal of Operational Research, pp. 151-164, 1982.
[89] H. J. B. J. d. H. L. S. L. a. Y.-J. S. Riaz Ahmed Shaikh, “Group-based trust management scheme for
clustered wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems,, p.
1698–1712, ,2009.
[90] I.-R. C. M. C. a. J.-H. C. Fenye Bao, “Hierarchical trust management for wireless sensor networks and
its applications to trust-based routing and intrusion detection,” IEEE Transactions on Network and
Service Management,, p. 169–183, 2012.
[91] R. R. I. A. a. C. F.-G. “. Javier Lopez, “Trust management systems for wireless sensor networks: Best
practices,” Computer Communications, p. 2010, 1086–1093.
91