共 34 条
[1]
Acquisti A., EC PRIVACY
[2]
Acquisti A., 2004, P 5 ACM C ELECT COMM, DOI [10.1145/988772.988777, DOI 10.1145/988772.988777]
[3]
Adar E., 2000, 1 MONDAY, V5, P2
[4]
Altman A, 2007, 20TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P1187
[5]
Why information security is hard - An economic perspective
[J].
17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS,
2001,
:358-365
[7]
BERGEMANN D, P 2005 WORKSH EC INF
[8]
BOLTON G, 2007, ENG TRUST STRATEGIC
[9]
Chawla S, 2005, LECT NOTES COMPUT SC, V3378, P363
[10]
A fuzzy trust evaluation based access control in grid environment
[J].
PROCEEDINGS OF THE THIRD CHINAGRID ANNUAL CONFERENCE,
2008,
:190-196