-
3
-
-
3042525923
-
A recommendation based Peer-to-Peer Trust model
-
in Chinese
-
Dou Wen, Wang Huai-Min, Jia Yan, Zou Peng. A recommendation based Peer-to-Peer Trust model. Journal of Software, 2004, 15(4): 571-583 (in Chinese)
-
(2004)
Journal of Software
, vol.15
, Issue.4
, pp. 571-583
-
-
Dou, W.1
Wang, H.-M.2
Jia, Y.3
Zou, P.4
-
4
-
-
33748519605
-
The decision to trust
-
Hurley R F. The decision to trust. Harvard Business Review, 2006, 84(9): 55-62
-
(2006)
Harvard Business Review
, vol.84
, Issue.9
, pp. 55-62
-
-
Hurley, R.F.1
-
5
-
-
33646831908
-
Trust guard: Countering vulnerabilities in reputation management for decentralized overlay networks
-
Chiba, Japan
-
Srivatsa M, Xiong L, Liu L. Trust guard: Countering vulnerabilities in reputation management for decentralized overlay networks//Proceedings of the 14th World Wide Web Conference. Chiba, Japan, 2005: 422-431
-
(2005)
Proceedings of the 14th World Wide Web Conference
, pp. 422-431
-
-
Srivatsa, M.1
Xiong, L.2
Liu, L.3
-
6
-
-
35048832333
-
Analysing the relationship between risk and trust
-
LNCS 2995. Oxford, UK
-
Jøsang A, Presti S. Analysing the relationship between risk and trust//Proceedings of the iTrust'04. LNCS 2995. Oxford, UK, 2004: 135-145
-
(2004)
Proceedings of the iTrust'04
, pp. 135-145
-
-
Jøsang, A.1
Presti, S.2
-
7
-
-
53349128426
-
Trust as risk and the foundation of investment value
-
Olsen Robert A. Trust as risk and the foundation of investment value. The Journal of Socio-Economics, 2008, 37(6): 2189-2200
-
(2008)
The Journal of Socio-Economics
, vol.37
, Issue.6
, pp. 2189-2200
-
-
Olsen, R.A.1
-
11
-
-
33749487896
-
DyTrust: A time-frame based dynamic trust mode for P2P systems
-
in Chinese
-
Chang Jun-Sheng, Wang Huai-Min, Yin Gang. DyTrust: A time-frame based dynamic trust mode for P2P systems. Chinese Journal of Computers, 2006, 29(8): 1301-1307 (in Chinese)
-
(2006)
Chinese Journal of Computers
, vol.29
, Issue.8
, pp. 1301-1307
-
-
Chang, J.-S.1
Wang, H.-M.2
Yin, G.3
-
12
-
-
40949153358
-
A new trust model based on recommendation evidence for P2P networks
-
in Chinese
-
Tian Chun-Qi, Zou Shi-Hong, Wang Wen-Dong, Cheng Shi-Duan. A new trust model based on recommendation evidence for P2P networks. Chinese Journal of Computers, 2008, 31(2): 270-281 (in Chinese)
-
(2008)
Chinese Journal of Computers
, vol.31
, Issue.2
, pp. 270-281
-
-
Tian, C.-Q.1
Zou, S.-H.2
Wang, W.-D.3
Cheng, S.-D.4
-
13
-
-
33644940300
-
Construction of Peer-to-Peer multiple-grain Trust model
-
in Chinese
-
Zhang Qian, Zhang Xia, Wen Xue-Zhi et al. Construction of Peer-to-Peer multiple-grain Trust model. Journal of Software, 2006, 17(1): 96-107 (in Chinese)
-
(2006)
Journal of Software
, vol.17
, Issue.1
, pp. 96-107
-
-
Zhang, Q.1
Zhang, X.2
Wen, X.-Z.3
-
14
-
-
33745141365
-
Survey of information security risk assessment
-
in Chinese
-
Feng Deng-Guo, Zhang Yang, Zhang Yu-Qing. Survey of information security risk assessment. Journal of China Institute of Communications, 2004, 25(7): 10-18 (in Chinese)
-
(2004)
Journal of China Institute of Communications
, vol.25
, Issue.7
, pp. 10-18
-
-
Feng, D.-G.1
Zhang, Y.2
Zhang, Y.-Q.3
-
18
-
-
37348999613
-
A kind of game-theoretic control mechanism of user behavior trust based on prediction in trustworthy network
-
in Chinese
-
Tian Li-Qin, Lin Chuang. A kind of game-theoretic control mechanism of user behavior trust based on prediction in trustworthy network. Chinese Journal of Computers, 2007, 30(11): 1930-1938 (in Chinese)
-
(2007)
Chinese Journal of Computers
, vol.30
, Issue.11
, pp. 1930-1938
-
-
Tian, L.-Q.1
Lin, C.2
-
19
-
-
65349136794
-
From trust to dependability through risk analysis
-
DIT-University of Trento: Technical Report DIT-06-079
-
Asnar Y, Giorgini P, Massacci F, Zannone N. From trust to dependability through risk analysis. DIT-University of Trento: Technical Report DIT-06-079, 2006
-
(2006)
-
-
Asnar, Y.1
Giorgini, P.2
Massacci, F.3
Zannone, N.4
-
21
-
-
20444392884
-
A survey of computer vulnerability assessment
-
in Chinese
-
Xing Xu-Jia, Lin Chuang, Jiang Yi-Xin. A survey of computer vulnerability assessment. Chinese Journal of Computers, 2004, 27(1): 1-11 (in Chinese)
-
(2004)
Chinese Journal of Computers
, vol.27
, Issue.1
, pp. 1-11
-
-
Xing, X.-J.1
Lin, C.2
Jiang, Y.-X.3
|