Page 99 - Trust in ICT 2017
P. 99

Trust in ICT                                                1


             [73]   SAP, 2014. [Online]. Available: http://forge.fi-ware.eu/plugins/mediawiki/wiki/fiware/index.php/
                   FIWARE.OpenSpecification.Security.USDL-.

             [74]   P. e. a. Anantharam, “Trust model for semantic sensor and social networks: A preliminary report,”
                   in Aerospace and Electronics Conference (NAECON), , 2010.

             [75]   E. e. a. Chang, “International Journal of Intelligent systems,” Trust ontologies for e-service
                   environments, pp. 519-545, 2007.

             [76]   V. X. Tran, “WS-QoSOnto: a QoS ontology for web services." Services,” Service-Oriented System
                   Engineering, 2008.

             [77]   A. G. S. G. Marko Vujasinovic, Trust-based Discovery for Web of Things Markets, Berlin, Germany,
                   2014.

             [78]   S. G. A. a. J. D. Galizia, “A trust based methodology for web service selection,” in International
                   Conference on Semantic Computing, IEEE, 2007.

             [79]   B. P. J. H. Jennifer Golbeck, “Trust Networks on the Semantic Web,” in In Proceedings of
                   Cooperative Intelligent Agents, 2003, pp. 238-249.

             [80]   A. S. David Brondsema, “Trust Networks Using PGP and RDF,” in Workshop on the Models of Trust
                   for the Web, 2006.

             [81]   C. Burnett, “Trust Assessment and Decision-Making in Dynamic Multi-Agent Systems,” University of
                   Aberdeen. Doctor of Philosophy, 2011.

             [82]   N. Griffiths, “A fuzzy approach to reasoning with trust, distrust and insufficient trust,” Lecture Notes
                   in Computer Science, 2006.

             [83]   R. C. A. t. T. a. N. d. K. Kathrin Dentler, “Comparison of reasoners for large ontologies in the OWL 2
                   EL profile,” Semantic Web, 2011.

             [84]   S. H. Z. Yan, “Trust Modeling and Management - from Social Trust to Digital Trust,” Computer
                   Security, Privacy and Politics: Current Issues, Challenges and Solutions IGI Global, p. 2008, 290-323.

             [85]   R. I. A. Josang and C. Boyd, “A Survey of Trust and Reputation Systems for Online Service Provision,”
                   Decision Support Systems, pp. 644-681, 2007.

             [86]   L. Zadeh, “ Fuzzy Logic, Neural Networks, and Soft Computing,” Communications of the ACM, 1994.
             [87]   A. H. a. N. Georganas, “A Comparison of Mamdani and Sugeno Fuzzy Inference Systems for
                   Evaluating the Quality of Experience of Hapto-Audio-Visual Applications,” IEEE International
                   Workshop on Haptic Audio Visual Environments and Games (HAVE), 2008.

             [88]   E. J.-L. a. J. Siskos, “Assessing a Set of Additive Utility Functions for Multi-criteria Decision-Making,
                   the UTA Method,” European Journal of Operational Research, pp. 151-164, 1982.

             [89]   H. J. B. J. d. H. L. S. L. a. Y.-J. S. Riaz Ahmed Shaikh, “Group-based trust management scheme for
                   clustered wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems,, p.
                   1698–1712, ,2009.

             [90]   I.-R. C. M. C. a. J.-H. C. Fenye Bao, “Hierarchical trust management for wireless sensor networks and
                   its applications to trust-based routing and intrusion detection,” IEEE Transactions on Network and
                   Service Management,, p. 169–183, 2012.
             [91]   R. R. I. A. a. C. F.-G. “. Javier Lopez, “Trust management systems for wireless sensor networks: Best
                   practices,” Computer Communications, p. 2010, 1086–1093.




                                                                                                           91
   94   95   96   97   98   99   100   101   102   103   104