参考文献/References:
[1] BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management [A]. New York:IEEE Computer Society Press, 1996.164-173.
[2] BLAZE M, FEIGENBAUM J, IOANNIDIS J, ed al. RFC 2704:The KeyNote Trust Management System Version 2 [EB/OL]. http://www.cnpaf.net/Class/Rfcen/200502/3756_2.html, 2005.
[3] JSANG A, KNAP SKOG S J. A metric for trusted systems:Global IT security [M]. Wien:Austrian Computer Society, 1998.541-549.
[4] JSANG A. Trust-based decision making for electronic transactions [A]. Kista:Stockholm University Press, 1999.1-21.
[5] JSANG A. The right type of trust for distributed systems [A]. Lake Arrowhead:ACM Press, 1996.119-132.
[6] JSANG A. A model for trust in security systems [A]. Philadelphia:ACM Press, 1997.
[7] JSANG A. A subjective metric of authentication [A]. Brighton:Springer-Verlag, 1998.329-344.
[8] BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open network [A]. Brighton:Springer-Verlag, 1994.3-18.
[9] 唐文, 陈钟. 基于模糊集合理论的主观信任管理模型 [J]. 软件学报, 2003(8):1401-1408.
[10] 袁禄来, 曾国荪, 王伟. 基于Dempster-Shafer证据理论的信任度评估模型 [J]. 武汉大学学报(理学版), 2006(5):627-630.doi:10.3321/j.issn:1671-8836.2006.05.026.
[11] 张艳群, 张辰. 基于模糊理论的信任度评估模型 [J]. 计算机工程与设计, 2007(3):532-534.doi:10.3969/j.issn.1000-7024.2007.03.013.
[12] 沈昌祥, 张焕国, 冯登国. 信息安全综述 [J]. 中国科学E辑, 2007(2):129-150.doi:10.3321/j.issn:1006-9275.2007.02.001.