-
1
-
-
85049899506
-
An attribute-based trust negotiation protocol for d2d communication in smart city balancing trust and privacy
-
J. Guo, J. Ma, X. Li, J. Zhang, and T. Zhang, “An attribute-based trust negotiation protocol for d2d communication in smart city balancing trust and privacy,” Journal of Information Science and Engineering, Vol. 33, 2017, pp. 1007-1023.
-
(2017)
Journal of Information Science and Engineering
, vol.33
, pp. 1007-1023
-
-
Guo, J.1
Ma, J.2
Li, X.3
Zhang, J.4
Zhang, T.5
-
2
-
-
84928939574
-
A survey on trust and reputation models for web services: Single, composite, and communities
-
O. A. Wahab, J. Bentahar, H. Otrok, and A. Mourad, “A survey on trust and reputation models for web services: Single, composite, and communities,” Decision Support Systems, Vol. 74, 2015, pp. 121-134.
-
(2015)
Decision Support Systems
, vol.74
, pp. 121-134
-
-
Wahab, O.A.1
Bentahar, J.2
Otrok, H.3
Mourad, A.4
-
3
-
-
84927602818
-
An efficient distributed trust model for wireless sensor networks
-
J. Jiang, G. Han, F. Wang, L. Shu, and M. Guizani, “An efficient distributed trust model for wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, Vol. 26, 2015, pp. 1228-1237.
-
(2015)
IEEE Transactions on Parallel and Distributed Systems
, vol.26
, pp. 1228-1237
-
-
Jiang, J.1
Han, G.2
Wang, F.3
Shu, L.4
Guizani, M.5
-
4
-
-
85032733441
-
Dynamic trust relationships aware data privacy protection in mobile crowd-sensing
-
D. Wu, S. Si, S. Wu, and R. Wang, “Dynamic trust relationships aware data privacy protection in mobile crowd-sensing,” IEEE Internet of Things Journal, 2017, DOI: 10.1109/JIOT.2017.2768073.
-
(2017)
IEEE Internet of Things Journal
-
-
Wu, D.1
Si, S.2
Wu, S.3
Wang, R.4
-
5
-
-
85035802982
-
Rse-pow: A role symmetric encryption pow scheme with authorized deduplication for multimedia data
-
J. Xiong, Y. Zhang, X. Li, M. Lin, Z. Yao, and G. Liu, “Rse-pow: a role symmetric encryption pow scheme with authorized deduplication for multimedia data,” Mobile Networks and Applications, 2017. DOI: 10.1007/s11036-017-0975-x.
-
(2017)
Mobile Networks and Applications
-
-
Xiong, J.1
Zhang, Y.2
Li, X.3
Lin, M.4
Yao, Z.5
Liu, G.6
-
6
-
-
84919372488
-
Security, privacy and trust in internet of things: The road ahead
-
S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini, “Security, privacy and trust in internet of things: The road ahead,” Computer Networks, Vol. 76, 2015, pp. 146-164.
-
(2015)
Computer Networks
, vol.76
, pp. 146-164
-
-
Sicari, S.1
Rizzardi, A.2
Grieco, L.3
Coen-Porisini, A.4
-
7
-
-
84878352525
-
A social recommender mechanism for e-commerce: Combining similarity, trust, and relationship
-
Y. Li, C. Wu, and C. Lai, “A social recommender mechanism for e-commerce: Combining similarity, trust, and relationship,” Decision Support Systems, Vol. 55, 2013, pp. 740-752.
-
(2013)
Decision Support Systems
, vol.55
, pp. 740-752
-
-
Li, Y.1
Wu, C.2
Lai, C.3
-
8
-
-
84865687237
-
Scalable feedback aggregating (sfa) overlay for large-scale p2p trust management
-
X. Li, F. Zhou, and X. Yang, “Scalable feedback aggregating (sfa) overlay for large-scale p2p trust management,” IEEE Transactions on Parallel and Distributed Systems, Vol. 23, 2012, pp. 1944-1957.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, pp. 1944-1957
-
-
Li, X.1
Zhou, F.2
Yang, X.3
-
9
-
-
85032368231
-
Crowddefense: A trust vector-based threat defense model in crowdsourcing environments
-
B. Ye, Y. Wang, and L. Liu, “Crowddefense: A trust vector-based threat defense model in crowdsourcing environments,” in Proceedings of IEEE International Conference on Web Services, 2017, pp. 245-252.
-
(2017)
Proceedings of IEEE International Conference on Web Services
, pp. 245-252
-
-
Ye, B.1
Wang, Y.2
Liu, L.3
-
10
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
A. Jøsang, R. Ismail, and C. Boyd, “A survey of trust and reputation systems for online service provision,” Decision Support Systems, Vol. 43, 2007, pp. 618-644.
-
(2007)
Decision Support Systems
, vol.43
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
11
-
-
84926222822
-
Trustworthy service composition in service-oriented mobile social networks
-
T. Zhang, J. Ma, N. Xi, X. Liu, Z. Liu, and J. Xiong, “Trustworthy service composition in service-oriented mobile social networks,” in Proceedings of IEEE International Conference on Web Services, 2014, pp. 684-687.
-
(2014)
Proceedings of IEEE International Conference on Web Services
, pp. 684-687
-
-
Zhang, T.1
Ma, J.2
Xi, N.3
Liu, X.4
Liu, Z.5
Xiong, J.6
-
12
-
-
85042522044
-
Catrust: Context-aware trust management for service-oriented ad hoc networks
-
Y. Wang, I. R. Chen, J. H. Cho, A. Swami, Y. C. Lu, C. T. Lu, and J. Tsai, “Catrust: Context-aware trust management for service-oriented ad hoc networks,” IEEE Transactions on Services Computing, 2017, DOI: 10.1109/TSC.2016.2587259
-
(2017)
IEEE Transactions on Services Computing
-
-
Wang, Y.1
Chen, I.R.2
Cho, J.H.3
Swami, A.4
Lu, Y.C.5
Lu, C.T.6
Tsai, J.7
-
13
-
-
84873949571
-
Assessment of node trustworthiness in vanets using data plausibility checks with particle filters
-
N. Bismeyer, S. Mauthofer, K. M. Bayarou, and F. Kargl, “Assessment of node trustworthiness in vanets using data plausibility checks with particle filters,” in Proceedings of IEEE Vehicular Networking Conference, 2012, pp. 78-85.
-
(2012)
Proceedings of IEEE Vehicular Networking Conference
, pp. 78-85
-
-
Bismeyer, N.1
Mauthofer, S.2
Bayarou, K.M.3
Kargl, F.4
-
14
-
-
70449498881
-
Reputation propagation in composite services
-
S. Nepal, Z. Malik, and A. Bouguettaya, “Reputation propagation in composite services,” in Proceedings of IEEE International Conference on Web Services, 2009, pp. 295-302.
-
(2009)
Proceedings of IEEE International Conference on Web Services
, pp. 295-302
-
-
Nepal, S.1
Malik, Z.2
Bouguettaya, A.3
-
16
-
-
84929520889
-
A method for fair propagation of user perceptions for trust management in composite services
-
R. Sadeghi and M. A. Azgomi, “A method for fair propagation of user perceptions for trust management in composite services,” Service Oriented Computing and Applications, Vol. 9, 2015, pp. 157-176.
-
(2015)
Service Oriented Computing and Applications
, vol.9
, pp. 157-176
-
-
Sadeghi, R.1
Azgomi, M.A.2
-
17
-
-
84866359631
-
Shapley value based impression propagation for reputation management in web service composition
-
A. Liu, Q. Li, L. Huang, and S. Wen, “Shapley value based impression propagation for reputation management in web service composition,” in Proceedings of IEEE International Conference on Web Services, 2012, pp. 58-65.
-
(2012)
Proceedings of IEEE International Conference on Web Services
, pp. 58-65
-
-
Liu, A.1
Li, Q.2
Huang, L.3
Wen, S.4
-
18
-
-
84900333258
-
Rating propagation in web services reputation systems: A fast shapley value approach
-
A. Liu, Q. Li, X. Zhou, L. Li, G. Liu, and Y. Gao, “Rating propagation in web services reputation systems: A fast shapley value approach,” in Proceedings of International Conference on Database Systems for Advanced Applications, 2014, pp. 466-480.
-
(2014)
Proceedings of International Conference on Database Systems for Advanced Applications
, pp. 466-480
-
-
Liu, A.1
Li, Q.2
Zhou, X.3
Li, L.4
Liu, G.5
Gao, Y.6
-
20
-
-
85019081472
-
Trustworthy service composition with secure data transmission in sensor networks
-
T. Zhang, L. Zheng, Y. Wang, Y. Shen, N. Xi, J. Ma, and J. Yong, “Trustworthy service composition with secure data transmission in sensor networks,” World Wide Web, Vol. 21, 2018, pp. 185-200.
-
(2018)
World Wide Web
, vol.21
, pp. 185-200
-
-
Zhang, T.1
Zheng, L.2
Wang, Y.3
Shen, Y.4
Xi, N.5
Ma, J.6
Yong, J.7
-
21
-
-
84906305880
-
Trust-based service composition in multi-domain environments under time constraint
-
T. Zhang, J. Ma, Q. Li, N. Xi, and C. Sun, “Trust-based service composition in multi-domain environments under time constraint,” Science China Information Sciences, Vol. 57, 2014, pp. 1-16.
-
(2014)
Science China Information Sciences
, vol.57
, pp. 1-16
-
-
Zhang, T.1
Ma, J.2
Li, Q.3
Xi, N.4
Sun, C.5
-
22
-
-
33646682404
-
Practical Bayesian estimation of a finite beta mixture through gibbs sampling and its applications
-
N. Bouguila, D. Ziou, and E. Monga, “Practical bayesian estimation of a finite beta mixture through gibbs sampling and its applications,” Statistics and Computing, Vol. 16, 2006, pp. 215-225.
-
(2006)
Statistics and Computing
, vol.16
, pp. 215-225
-
-
Bouguila, N.1
Ziou, D.2
Monga, E.3
|