[1] |
Zhao B, He J, Huang N, et al.Designs and simulations of multi-factor in trust evaluation. International Journal of Database Theory and Application, 2015, 8(1): 235-244
|
[2] |
赵斌, 何泾沙, 黄娜, 等. 基于平衡权重的动态综合信任度量方法. 北京邮电大学学报, 2015, 38(2): 113-117
|
[3] |
Blaze M, Feigenbaum J, Lacy J.Decentralized trust management // IEEE Symposium on Security and Privacy. Oakland, CA, 1996: 164-173
|
[4] |
Blaze M, Feigenbaum J, Keromytis A D.KeyNote: trust management for public-key infrastructures // Security Protocols. Berlin, 1998: 59-63
|
[5] |
Li N, Mitchell J C, Winsborough W H.Design of a role-based trust-management framework // Proc IEEE Symposium on Security & Privacy. Berkeley, 2002: 114-130
|
[6] |
Phoomvuthisarn S.Trust and role based access control for secure interoperation (“TracSI”) // International Symposium on Communications and Information Technologies (ISCIT’07). Sydney, 2007: 1458-1463
|
[7] |
Tang Z, Li R, Lu Z, et al.A Request-driven role mapping framework for secure interoperation in multi-domain environments // Computer Systems Science and Engineering. Liaoning, 2007: 83-90
|
[8] |
Zhang Y, He J, Zhao B, et al.Towards more pro-active access control in computer systems and networks. Computers & Security, 2015, 49: 132-146
|
[9] |
刘宴兵, 龚雪红, 冯艳芬. 基于物联网节点行为检测的信任评估方法. 通信学报, 2014, 35(5): 8-15
|
[10] |
张仕斌, 许春香. 基于云模型的信任评估方法研究. 计算机学报, 2013, 36(2): 422-431
|
[11] |
Dimmock N, Belokosztolszki A, Eyers D, et al.Using trust and risk in role-based access control policies // Proceedings of the Ninth ACM Sympo-sium on Access Control Models and Technologies. New York, 2004: 156-162
|
[12] |
Sarrouh N.Formal modeling of trust-based access control in dynamic coalitions. 2013 IEEE 37th International Computer Software and Applications Conference Workshops, IEEE Computer Society, 2013, 1990(18): 224-229
|
[13] |
Trivellato D, Zannone N, Etalle S. GEM: a distributed goal evaluation algorithm for trust management. Theory & Practice of Logic Progra-mming, 2012, 14(5): 293-337
|
[14] |
Smari W W, Clemente P, Lalande J F.An extended attribute based access control model with trust and privacy: application to a collaborative crisis manage-ment system. Future Generation Computer Systems, 2014, 31(1): 147-168
|
[15] |
Li M, Sun X, Wang H, et al.Multi-level delega-tions with trust management in access control systems. Journal of Intelligent Information Systems, 2012, 39(3): 611-626
|
[16] |
李小勇, 桂小林. 动态信任预测的认知模型. 软件学报, 2010, 21(1): 163-176
|
[17] |
Ma S, He J, Shuai X.An access control method based on scenario trust. International Journal of Computational Intelligence Systems, 2012, 5(5): 942-952
|
[18] |
刘利钊, 魏鹏, 王颖, 等. 对基于可信计算的网格行为信任模型的量化评估方法研究. 武汉大学学报: 信息科学版, 2010, 35(5): 587-590
|
[19] |
苏锦钿, 郭荷清, 高英. 基于信任网的推荐机制. 华南理工大学学报, 2008, 36(4): 98-103
|
[20] |
周国强, 曾庆凯. 一种角色分离的信任评估模型. 软件学报, 2012, 23(12): 3187-3197
|
[21] |
颜晶晶. 基于信任评估的信息形式化推荐方法. 计算机工程, 2012, 38(7): 42-45
|
[22] |
Luo X, Yang Y, Ge Z, et al.Fuzzy grey relational analysis of design factors influencing on maintaina-bility indices. Journal of Process Mechanical Engineering, 2015, 229(1): 78-84
|
[23] |
Dyer R F, Forman E H. Group decision support with the Analytic Hierarchy Process. Decision Support Sys-tems, 1992, 8(2): 99-124
|