[ 1] 徐锋, 吕建.W eb安全中的信任管理研究与进展[ J]. 软件学报, 2002, 13( 11): 2 057-2 064. Xu Feng, L?? Jian. Research and deve lopm ent o f trustm anagement in web security [ J]. Journa l of Softw are, 2002, 13( 11): 2 057-2 064. ( in Chinese)
[ 2] B lazeM, Fe igenbaum J, Lacy J. Decentralized trustm anagem ent[ C ] / / Da le J, D ino lt G. Proceed ings o f the 17 th Sym po sium on Security and Pr ivacy. Oakland, CA: IEEE Com puter Soc iety Press, 1996: 164-173.
[ 3] W insboroughW H, Seam ons K E, JonesV E. Automa ted trust nego tia tion[ C] / / DARPA Info rma tion Surv ivability Conference and Exposition, 2000. New Yo rk: IEEE Com puter Soc iety, 2000: 88-102.
[ 4] Abdu-l Rahm an A, H a iles S. A distr ibuted trust m odel[ C] / / Proc of the 97 New Secur ity Pa radigm sW orkshop. Cumb ria: ACM, 1997: 48-60.
[ 5] Beth T, Borcherd ingM, K le in B. Va luation of trust in open netw ork[ C] / / Go llm ann D. Proceedings of the European Sympos-i um on Research in Security( ESORICS). Br ighton UK: Springer-Verlag, 1994: 3-18.
[ 6] W ang Yao, VaSS ileva J. T rust and reputation m ode l in peer- to-peer netwo rks[ C ] / / The Th ird Inte rnational Conference on Peer- to-Peer Com puting. S ing apore: IEEE, 2003: 761-763.
[ 7] W ilensky U. Ne tLogo [ CP /OL ]. [ 2010-01-16]. h ttp: / / cc.l northw estern. edu /netlogo /. Center for Connected Learn ing and Com puter B asedM ode ling, Northw estern Un ive rsity, Evanston, IL, 1999.