-
1
-
-
0035455653
-
The anatomy of the grid
-
I Foster, C Kesselman, S Tuecke. The anatomy of the grid[J]. Int'l Journal of High Performance Computing Applications, 2001, 15(3): 1-25
-
(2001)
Int'l Journal of High Performance Computing Applications
, vol.15
, Issue.3
, pp. 1-25
-
-
Foster, I.1
Kesselman, C.2
Tuecke, S.3
-
2
-
-
13444306014
-
On death, taxes, and the convergence of peer-to-peer and grid computing
-
Berkley, CA
-
I Foster, A Iamnitchi. On death, taxes, and the convergence of peer-to-peer and grid computing[C] The 2nd Int'l Workshop on Peer-to-Peer Systems (IPTPS'03), Berkley, CA, 2003
-
(2003)
The 2nd Int'l Workshop on Peer-to-Peer Systems (IPTPS'03)
-
-
Foster, I.1
Iamnitchi, A.2
-
3
-
-
18744373325
-
Service oriented VEGA grid system software design and evaluation
-
Chinese source
-
Zha li, Li Wei, Yu Haiyan, et al. Service oriented VEGA grid system software design and evaluation[J]. Chinese Journal of Computers, 2005, 28(4): 495-504 (in Chinese)
-
(2005)
Chinese Journal of Computers
, vol.28
, Issue.4
, pp. 495-504
-
-
Zha, L.1
Li, W.2
Yu, H.3
-
4
-
-
13644274213
-
A survey of peer-to-peer content distribution technologies
-
A Stephanos, S Diomidis. A survey of peer-to-peer content distribution technologies[J]. ACM Computing Surveys, 2004, 36(4): 335-371
-
(2004)
ACM Computing Surveys
, vol.36
, Issue.4
, pp. 335-371
-
-
Stephanos, A.1
Diomidis, S.2
-
5
-
-
0031143168
-
Merging and extending the PGP and PEM-TEL trust model
-
D W Chadwick, et al. Merging and extending the PGP and PEM-TEL trust model[J]. IEEE Network, 1997, 11(3): 16-24
-
(1997)
IEEE Network
, vol.11
, Issue.3
, pp. 16-24
-
-
Chadwick, D.W.1
-
9
-
-
84949942881
-
The right type of trust for distributed systems
-
New York: ACM Press
-
A Josang. The right type of trust for distributed systems[C]. In: Proc of the 1996 New Security Paradigms Workshop. New York: ACM Press, 1996.119-132
-
(1996)
Proc of the 1996 New Security Paradigms Workshop
, pp. 119-132
-
-
Josang, A.1
-
12
-
-
84958759310
-
A subjective metric of authentication
-
Berlin: Springer-Verlag
-
A Josang. A subjective metric of authentication[C]. In: Proc of the ESORICS'98. Berlin: Springer-Verlag, 1998.329-344
-
(1998)
Proc of the ESORICS'98
, pp. 329-344
-
-
Josang, A.1
-
14
-
-
84944078503
-
A reputation based trust model for peer-to-peer e-commerce communities
-
Hangzhou
-
G Derbas, A Kayssi, H Artail, et al. A reputation based trust model for peer-to-peer e-commerce communities[C]. The IEEE Int'l Conf on E-Commerce, Hangzhou, 2003
-
(2003)
The IEEE Int'l Conf on E-Commerce
-
-
Derbas, G.1
Kayssi, A.2
Artail, H.3
-
15
-
-
10444245810
-
TRUMMAR-A trust model for mobile agent systems based on reputation
-
Los Alamitos, CA: IEEE Computer Society Press
-
Ghada Derbas, Ayman Kayssi, Hassan Artail, et al. TRUMMAR-A trust model for mobile agent systems based on reputation[C]. In: Proc of the IEEE/ACS Int'l Conf on Pervasive Services (ICPS'04), Los Alamitos, CA: IEEE Computer Society Press, 2004.113-120
-
(2004)
Proc of the IEEE/ACS Int'l Conf on Pervasive Services (ICPS'04)
, pp. 113-120
-
-
Derbas, G.1
Kayssi, A.2
Artail, H.3
-
16
-
-
84893184750
-
Bayesian network-based trust model
-
Los Alamitos, CA: IEEE Computer Society Press
-
Yao Wang, Julita Vassileva. Bayesian network-based trust model[C]. In: Proc of the IEEE/WIC Int'l Conf on Web Intelligence. Los Alamitos, CA: IEEE Computer Society Press, 2003.29-38
-
(2003)
Proc of the IEEE/WIC Int'l Conf on Web Intelligence
, pp. 29-38
-
-
Wang, Y.1
Vassileva, J.2
-
20
-
-
30944468750
-
A distributed trust model for e-commerce applications
-
Las Vegas, Nevada, USA
-
Hui Lei, Gholamali C Shoja. A distributed trust model for e-commerce applications[C]. IEEE Int'l Conf on E-Technology, E-Commerce and E-Service (EEE'05), Las Vegas, Nevada, USA, 2005
-
(2005)
IEEE Int'l Conf on E-Technology, E-Commerce and E-Service (EEE'05)
-
-
Lei, H.1
Shoja, G.C.2
-
21
-
-
13444253030
-
Study on the behavior-based trust model in grid security system
-
Washington, DC
-
Gui Xiaolin, Xie Bing, Li Yinan, et al. Study on the behavior-based trust model in grid security system[C]. The 2004 IEEE Int'l Conf on Services Computing, Washington, DC, 2004
-
(2004)
The 2004 IEEE Int'l Conf on Services Computing
-
-
Gui, X.1
Xie, B.2
Li, Y.3
-
22
-
-
0036880296
-
Research and development of trust management in Web security
-
Chinese source
-
Xu Feng, Lu Jian. Research and development of trust management in Web security[J]. Journal of Software, 2002, 13(11): 2057-2064 (in Chinese)
-
(2002)
Journal of Software
, vol.13
, Issue.11
, pp. 2057-2064
-
-
Xu, F.1
Lu, J.2
-
23
-
-
3042525923
-
A recommendation-based peer-to-peer trust model
-
Chinese source
-
Dou Wen, et al. A recommendation-based peer-to-peer trust model[J]. Journal of Software, 2004, 15(4): 571-583 (in Chinese)
-
(2004)
Journal of Software
, vol.15
, Issue.4
, pp. 571-583
-
-
Dou, W.1
-
24
-
-
4444369890
-
The interpretation of generalized evidence theory
-
Chinese source
-
Liu Dayou, Li Yuefeng. The interpretation of generalized evidence theory[J]. Chinese Journal of Computers, 1997, 2(20): 159-164 (in Chinese)
-
(1997)
Chinese Journal of Computers
, vol.2
, Issue.20
, pp. 159-164
-
-
Liu, D.1
Li, Y.2
-
25
-
-
4544313437
-
Extended method of evidence theory for pervasive computing
-
Chinese source
-
Zhang Degan, Xu Guangyou, Shi Yuanchun, et al. Extended method of evidence theory for pervasive computing[J]. Chinese Journal of Computers, 2004, 7(27): 918-927 (in Chinese)
-
(2004)
Chinese Journal of Computers
, vol.7
, Issue.27
, pp. 918-927
-
-
Zhang, D.1
Xu, G.2
Shi, Y.3
-
26
-
-
20144377734
-
A grid and P2P trust model based on recommendation evidence reasoning
-
Chinese source
-
Zhu Junmao, Yang Shoubao, Fan Jianping, et al. A grid and P2P trust model based on recommendation evidence reasoning[J]. Journal of Computer Research and Development, 2005, 42(5): 797-803 (in Chinese)
-
(2005)
Journal of Computer Research and Development
, vol.42
, Issue.5
, pp. 797-803
-
-
Zhu, J.1
Yang, S.2
Fan, J.3
-
27
-
-
0242439292
-
Research of subjective trust management model based on the fuzzy set theory
-
Chinese source
-
Tang Wen, Chen Zhong. Research of subjective trust management model based on the fuzzy set theory[J]. Journal of Software, 2003, 14(8): 1401-1408 (in Chinese)
-
(2003)
Journal of Software
, vol.14
, Issue.8
, pp. 1401-1408
-
-
Tang, W.1
Chen, Z.2
-
28
-
-
19744371210
-
An optimistic fair electronic payment scheme
-
Chinese source
-
Deng Suoyun, Zhan Banghua, Hu Zhengming, et al. An optimistic fair electronic payment scheme[J]. Chinese Journal of Computers, 2002, 10(25): 1094-1098 (in Chinese)
-
(2002)
Chinese Journal of Computers
, vol.10
, Issue.25
, pp. 1094-1098
-
-
Deng, S.1
Zhan, B.2
Hu, Z.3
-
29
-
-
27744464611
-
Research on a fuzzy logic-based subjective trust management model
-
Chinese source
-
Tang Wen, Hu JianBin, Chen Zhong. Research on a fuzzy logic-based subjective trust management model[J]. Journal of Computer Research and Development, 2005, 42(10): 1654-1659 (in Chinese)
-
(2005)
Journal of Computer Research and Development
, vol.42
, Issue.10
, pp. 1654-1659
-
-
Tang, W.1
Hu, J.2
Chen, Z.3
-
30
-
-
0003900673
-
Internet public key infrastructure Part 1 X509 certificate and CRL profile
-
R Housley, W Ford. Internet public key infrastructure part 1 X509 certificate and CRL profile[OL]. Internet Draft. http://www.ietf.org, 1996
-
(1996)
-
-
Housley, R.1
Ford, W.2
-
32
-
-
54749125032
-
Trusted platform module main specification
-
Trusted Computing Group
-
Trusted Computing Group. Trusted platform module main specification[OL]. http://www.trustedcomputinggroup.org, 2006
-
(2006)
-
-
-
33
-
-
3142581502
-
The set and function approach to modeling authorization in distributed systems
-
St. Petersburg, Russia
-
Tatyana Ryutov, Clifford Neuman. The set and function approach to modeling authorization in distributed systems[C]. MMM-ACNS, St. Petersburg, Russia, 2001
-
(2001)
MMM-ACNS
-
-
Ryutov, T.1
Neuman, C.2
|