共 26 条
[1]
Blaze M., Feigenbaum J., Ioannidis J., Keromytis A.D., The role of trust management in distributed systems security, Proc. of the Secure Internet Programming: Issues for Mobile and Distributed Objects, pp. 185-210, (1999)
[2]
Khare R., Rifkin A., Trust management on World Wide Web, World Wide Web Journal (S1085-2298), 2, 3, pp. 77-112, (1997)
[3]
Tang W., Chen Z., Research of subjective trust management model based on the fuzzy set theory, Journal of Software, 14, 8, pp. 1401-1408, (2003)
[4]
Tang W., Hu J.B., Chen Z., Research on a fuzzy logic-based subjective trust management model, Computer Research and Development, 42, 10, pp. 1654-1659, (2005)
[5]
Burrows M., Abadi M., Needham R.M., A logic of authentication, (1989)
[6]
Blaze M., Ioannidis J., Keromytis A.D., Experience with the KeyNote Trust Management System: Applications and Future Directions, pp. 284-300, (2003)
[7]
Blaze M., Feigenbaum J., Keromytis A.D., KeyNote: Trust management for public-key infrastructures, Proc. of the Cambridge'98 Security Protocols Int'l Workshop, pp. 59-63, (1998)
[8]
Beth T., Borcherding M., Klein B., Valuation of trust in open networks, Proc. of the European Symp. on Research in Security (ESORICS), pp. 3-18, (1994)
[9]
Yahalom R., Klein B., Beth T., Trust relationships in secure systems-A distributed authentication perspective, Proc. of the 1993 IEEE Symp. on Research in Security and Privacy, pp. 150-164, (1993)
[10]
Liu S.K., Liu X.T., A new method of elevation of confidence level of large-scale perplexing simulation system, Journal of System Simulation, 13, 5, pp. 666-669, (2001)