[1] RASMUSSON L, JANSSON S. Simulated social control for secure Internet commerce[C]∥New Security Paradigms. Lake Arrowhead, United States: ACM, 1996:18-25.
[2] JOSANG A, ISMAIL R, BOYD C. A survey of trust and reputation systems for online service provision[J]. Decision Support Systems,2007, 43(2): 618-644.
[3] TEACY W T, PATEL J, JENNINGS N R, et al. TRAVOS: trust and reputation in the context of inaccurate information sources[J]. Autonomous Agents and MultiAgent Systems, 2006, 12(2): 183-198.
[4] JOSANG A, HALLER J. Dirichlet reputation systems[C]∥Proceedings of the 2th International Conference on Availability, Reliability and Security.Vienna, Austria: IEEE Computer Society, 2007:112-119.
[5] JOSANG A, HAYWARD R, POPE S. Trust network analysis with subjective logic[C]∥Proceedings of the 29th Australasian Computer Science Conference.Hobart, Australia: Australian Computer Society,2006:85-94.
[6] JOSANG A, BHUIYAN T, XU Y, et al. Combining trust and reputation management for webbased services[C]∥Trust, Privacy and Security in Digital Business. Turin, Italy: SpringerVerlag, 2008:90-99.
[7] LIANG Z, SHI W. PET: a personalized trust model with reputation and risk evaluation for P2P resource sharing[C]∥Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences. Big Island, Hawaii, USA: IEEE Computer Society, 2005:201-202.
[8] 胡斌, 梁锡坤, 高济. 基于模糊逻辑的Agent社会信用评价模型[J]. 浙江大学学报:工学版,2008, 42(5): 725-730.
HU Bin, LIANG Xikun, GAO Ji. Fuzzylogic based credit evaluation model for agent society[J]. Journal of Zhejiang University : Engineering Science, 2008, 42(5): 725-730.
[9] DELLAROCAS C. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior[C]∥Electronic Commerce. Minneapolis, Minnesota, United States: ACM, 2000:150-157.
[10] FENG Q, YANG Y, SUN Y L, et al. Modeling attack behaviors in rating systems[C]∥Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems Workshops. Beijing,China:IEEE Computer Society, 2008: 241-248.
[11] LAM S K, RIEDL J. Shilling recommender systems for fun and profit[C]∥Proceedings of 13th International Conference on World Wide Web. New York, NY, USA: ACM, 2004:393-402.
[12] YANG Y, FENG Q, SUN Y L, et al. RepTrap : a novel attack on feedbackbased reputation systems[C]∥Security and Privacy in Communication Netowrks. Istanbul, Turkey: ACM, 2008:1-11.
[13] BHATTACHARJEE R, GOEL A. Avoiding ballot stuffing in eBaylike reputation systems[C]∥Economics of PeertoPeer Systems. Philadelphia, Pennsylvania, USA: ACM, 2005:133-137.
[14] ZHANG J, COHEN R. An incentive mechanism for eliciting fair ratings of sellers in emarketplaces[C]∥Autonomous Agents and Multiagent Systems. Honolulu, Hawaii: ACM, 2007:1-3.
[15] DELLAROCAS C. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems[C]∥Information Systems. Brisbane, Australia: Association for Information Systems, 2000:520-525.
[16] SU X, ZENG H, CHEN Z. Finding group shilling in recommendation system[C]∥World Wide Web. Chiba, Japan: ACM, 2005:960-961.
[17] 田春岐, 邹仕洪, 王文东,等. 一种基于推荐证据的有效抗攻击P2P网络信任模型[J]. 计算机学报, 2008, 31(2): 270-281.
TIAN Chunqi, ZOU Shihong, WANG Wendong, et al. A new trust model based on recommendation evidence for P2P networks[J]. Chinese Journal of Computers, 2008, 31(2): 270-281.
[18] MACNAUGHTON S P, WILLIAMS W T, DALE M B, et al. Dissimilarity analysis: a new technique of hierarchical subdivision[J]. Nature, 1964, 202(493): 1034-1035. |