1. Lu X C, Wang H M, Wang J, et al. Internet-based virtual computing environment: Beyond the data center as a computer. Future Generation Computer Systems, 2013, 29(1): 309-322
2. Zhao H Y, Li X L. H-trust: A group trust management system for peer-to-peer desktop grid. Journal of Computer Science and Technology, 2009, 24(5): 833-843
3. Saroiu S, Gummadi P K, Gribble S D. Measuring and analyzing the characteristics of Napster and Gnutella hosts. Multimedia Systems Journal, 2003, 8(5): 170-184
4. Shen C X, Zhang H G, Wang H M, et al. Research on trusted computing and its development. Science China: Information Sciences, 2010, 53(3): 405-433
5. Wang X F, Liu L, Su J S. RLM:A general model for trust representation and aggregation. IEEE Transactions on Services Computing, 2012, 5(1): 131-143
6. Li L, Zheng X L, Chen D R, et al. Trust based service selection in service oriented environment. International Journal of Web Services Research, 2012, 9(3): 23-42
7. Yan Z, Zhang P, Deng R H. TruBeRepec: A trust-behavior-based reputation and recommender system for mobile applications. Personal and Ubiquitous Computing, 2012, 16(5): 485-506
8. Wang H M, Tang Y B, Yi G, et al. Trustworthiness of Internet-based software. Science in China Series E: Information Sciences, 2006, 49(6): 759-773
9. Huang L C, Wu Z H. A PKI-based scalable security infrastructure for scalable grid. Proceedings of the 2nd International Workshop of Grid and Cooperative Computing (GCC’03), Dec 7-10, 2003, Shanghai, China. LNCS 3033. Berlin, Germany: Springer-Verlag, 2003:1051-1054
10. Yan Z, Prehofer C. Autonomic trust management for a component-based software system. IEEE Transactions on Dependable and Secure Computing, 2011, 8(6): 810-823
11. Abdul-Rahman A. The PGP trust model. The Journal of Electronic Commerce, 1997, 10(3): 27-31
12. Zimmermann P R. The official PGP user’s guide. Cambridge, MA,USA: MIT Press, 1995
13. Kamvar S D, Schlosser M T. EigenRep: Reputation management in P2P networks. Proceedings of the 12th International World Wide Web Conference (WWW’03), May 20-24, 2003, Budapest, Hungary. New York, NY, USA: ACM, 2003: 123-134
14. Dou W, Wang H M, Jia Y, et al. A recommendation-based peer-to-peer trust model. Journal of Software, 2004, 15(4): 571-583(in Chinese)
15. Huang J W, Nicol D M. A formal-semantics-based calculus of trust. IEEE Internet Computing, 2010, 14(5): 38-46
16. Wang Y, Li L. Two-dimensional trust rating aggregations in service-oriented applications. IEEE Transactions on Services Computing, 2011, 4(4): 257-271
17. Li L, Wang Y. The study of trust vector based trust rating aggregation in service-oriented environments. World Wide Web-Internet and Web Information System, 2012, 15(5/6): 547-579
18. Dempster A P. Upper and lower probabilities induced by a multi-valued mapping. Annals of Mathematical Statistics, 1967, 38(2): 325-339
19. Shafer G. A mathematical theory of evidence. Princeton, NJ,USA: Princeton University Press, 1976
20. Xu X L, Wang R C. The collaboration alliance mechanism of P2P based on mobile multi-agent technology. Journal of Electronics and Information Technology, 2007, 29(2): 345-349(in Chinese)
21. Lan Z L, Zheng Z M, Li Y W. Toward automated anomaly identification in large-scale systems. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(2):174-187
22. Zhang M D, Zheng X F, Lu S W, et al. Research on trust degree of authentication. Computer Science, 2011, 38(11): 43-47(in Chinese)
23. Jiang W J, Zhang L M, Wang P. Dynamic scheduling model of computing resource based on MAS cooperation mechanism. Science in China Series F: Information Sciences, 2009, 52(8): 1302-1320
24. Shen H Y, Zhao L Y, Li Z, et al. A DHT-aided chunk-driven overlay for scalable and efficient peer-to-peer live streaming. Proceedings of the 39th International Conference on Parallel Processing (ICPP’10), Sep 13-16, 2010, San Diego, CA, USA. Piscataway, NJ, USA: IEEE, 2010: 248-257
25. Zoels S, Despotovic Z, Kellerer W. Load balancing in a hierarchical DHT-based P2P system. Proceedings of the 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom’07), Nov 12-15, 2007, New York, NY, USA. Piscataway, NJ,USA: IEEE, 2008: 353-361
26. Lua E K, Crowcroft J, Pias M, et al. A survey and comparison of peer-to-peer overlay network schemes. Communications Surveys and Tutorials, 2005, 7(2): 72-93 |