[1] 侯富,毛新军,吴伟.一种基于多Agent系统的云服务自组织管理方法[J].软件学报,2015,26(4):835-848. HOU Fu,MAO Xin-Jun,WU Wei.Self-organizing management approach for cloud services based on multi-agent system[J].Journal of Software,2015,26(4):835-848.(in Chinese)
[2] FOSTER I,ZHAO Y,RAICUI,et al.Cloud computing and grid computing 360-degree compared[A].Proceedings of Grid Computing Environments Workshop (GCE'08),2007[C].Austin,USA:IEEE,2007.1-10.
[3] ALRIFAI M,RISSE T,NEJDL W.A hybrid approach for efficient Web service composition with end-to-end QoS constraints[J].ACM Transactions on the Web (TWEB),2012,6(2):1-31.
[4] PAREJO J A,SEGURA S,FERNANDEZ P,et al.QoS-aware web services composition using GRASP with path relinking[J].Expert Systems with Applications,2014,41(9):4211-4223.
[5] 刘必欣,王玉峰,贾焰,等.一种基于角色的分布式动态服务组合方法[J].软件学报,2005,16(11):1859-1867. LIU Bi-xin,WANG Yu-feng,JIA Yan,et al.A role-based approach for decentralized dynamic service composition[J].Journal of Software,2005,16(11):1859-1867.(in Chinese)
[6] 夏亚梅,程渤,陈俊亮,等.基于改进蚁群算法的服务组合优化[J].计算机学报,2012,35(2):270-281. XIA Ya-mei,CHENG Bo,CHEN Jun-liang,et al.Optimizing services composition based on improved ant colony algorithm[J].Chinese Journal of Computers,2012,35(2):270-281.(in Chinese)
[7] 尼克拉斯卢曼.信任:一个社会复杂性的简化机制[M].瞿铁鹏,等,译.上海:上海人民出版社,2001.
[8] KOSFELD M.Trust in the brain:Neurobiological determinants of human social behavior[J].EMBO Reports,2007,8(S):S44-S47.
[9] 马礼,郑纬民.信息网格环境下的综合信任度评价模型[J].清华大学学报(自然科学版),2009,49(4),599-603. MA Li,ZHENG Weimin.Synthesize trust degree evaluating model for an information grid environment[J].Journal of Tsinghua University (Sci & Teh),2009,49(4),599-603.(in Chinese)
[10] 王怀民,唐扬斌,尹刚,李磊.互联网软件的可信机理[J].中国科学(E辑:信息科学),2006,36(10):1156-1169. WANG Huai-min,TANG Yang-bin,YIN Gang,et al.Trustworthy theory and key technologies of internet software[J].Science in China (Ser E:Information Sciences),2006,36(10):1156-1169.(in Chinese)
[11] 沈昌祥,张焕国,王怀民,等.可信计算的研究与发展[J].中国科学(E辑:信息科学),2010,40(2):139-166. SHEN Chang-xiang,ZHANG Huan-guo,WANG Huai-min,et al.Research and development of trusted computing[J].Science in China (Ser E:Information Sciences),2010,40(2):139-166.(in Chinese)
[12] 波利亚.数学与猜想(第二卷):合情推理模式[M].北京:科学出版社,2003. POLYA G.Mathematics and Plausible Reasoning:Patterns of Plausible Inference (2)[M].Beijing:China Science Publishing & Media Ltd,2003.(in Chinese)
[13] BETH T,BORCHERDING M,KLEIN B.Valuation of trust in open network[A].Proceedings of the European Symposium on Research in Security (ESORICS'94)[C].Brighton,UK:Springer-Verlag,1994.3-18.
[14] ABDUL-RAHMAN A,HAILES S.A distributed trust model[A].1997 New Security Paradigms Workshop[C].Cumbria,UK:ACM Press,1998.48-60.
[15] JØSANG A.A subjective metric of authentication[A].Proceedings of the European Symposium on Research in Security (ESORICS'98)[C].Louvain-la-Neuve,Belgium:Springer,1998.329-344.
[16] JØSANG A,Haller J.The Beta reputation system[A].Proceedings of the 15th Bled Electronic Commerce Conference[C].Bled,Slovenia:Bled eConference,2002.1-14.
[17] CUKERF,SMALES.On the mathematical foundations of learning[J].Bulletin (New Series) of the American Mathematical Society,2001,39(1):1-49.
[18] PARADESI S,DOSHI P,SWAIKA S.Integrating behavioral trust in web service compositions[A].IEEE International Conference on Web Services(ICWS'09)[C].Los Angeles,CA,USA:IEEE,2009.453-460.
[19] HUANG L,DENG S,LI Y,et al.Trust evaluation mechanism for collaboration of data-intensive services in cloud[J].Applied Mathematics & Information Sciences,2003,7(1L):121-129.
[20] HANG Chung-Wei,ZHE Zhang,MUNINDAR S.Shin:Generalized trust propagation with limited evidence[J].Computer,2013,46(3):78-85. |