[1] Beth T, Borcherding M, Klein B. Evaluation of Trust in Open Network[C]//Proc. of the European Symposium on Research in Security. Brighton, UK: Springer-Verlag, 1994: 3-8.
[2] Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Manage- ment[C]//Proc. of IEEE Conference on Security and Privacy. Oakland, USA: IEEE Press, 1996: 164-173.
[3] Rahman A, Hailes S. A Distributed Trust Model[C]//Proc. of 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press, 1997: 48-60.
[4] Maurer U. Modeling a Public-key Infrastructure[C]//Proc. of 1996 Conference on Computer Security. Berlin, Germany: Springer- Verlag, 1996: 325-350.
[5] 吴晶晶. PKI关键理论与应用技术研究[D]. 合肥: 中国科学技术大学, 2008.
[6] 王 进, 孙怀江. 一种用于信任管理的新主观逻辑[J]. 计算机研究与发展, 2010, 47(1): 140-146.
[7] 杨风暴, 王肖霞. D-S证据理论的冲突证据合成方法[M]. 北京: 国防工业出版社, 2010.
[8] J?sang A. A Logic for Uncertain Probabilities[J]. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 2001, 9(3): 279-311.
[9] J?sang A, Hayward R, Pope S. Trust Network Analysis with Subjective Logic[C]//Proc. of the 29th Australasian Computer Science Conference. Hobart, Australia: [s. n.], 2006.
[10] 付江柳, 高承实, 戴 青, 等. 基于主观逻辑的信任搜索算 法[J]. 计算机工程, 2008, 34(3): 178-180. |