[1] Beth T, Borcherding M, Klein B.Valuation of trust in open network [C]//Proceedings of the European Symposium on Research in Computer Security.Springer-Verlag, 1994:3-18.
[2] Abdul-Rahman A, Hailes S.A distributed trust model[C]//Proceeding of the 1997 New Security Paradigms Workshop.Cumbria:ACM Press, 1997:48-60.
[3] JØsang A.Prospectives of modeling trust in information security [C]//Proceedings of the 2nd Australasian Conf on Infor Security and Privacy.Sydney, 1997:2-13.
[4] JØsang A.A subjective metric of authentication [C]//Proceedings of 5th European Symposium on Research in Computer Security, Louvain-la-Neuve.Belgium, 1998:329-344.
[5] JØsang A.A logic for uncertain probabilities [J].Intl J Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3):279-311.
[6] Cornelli F, Damiani E, de Capitani S.Choosing reputable servants in a P2P network[C]//The 11th World Wide Web Conference.Honolulu, Hawaii, USA, 2002:376-386.
[7] Xiong L, Liu L.PeerTrust:supporting reputation-based trust for peer-to-peer electronic communities [J].IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7):843-857.
[8] Srivatsa M, Xiong L, Liu L.Trust guard:countering vulnerabilities in reputation management for decentralized overlay networks [C]//Proceedings of the 14th World Wide Web Conference.Chiba, Japan, 2005:422-431.
[9] Chang Junsheng, Wang Huaimin, Yin Gang.DyTrust:a time-frame based dynamic trust model for P2P systems [J].Chinese Journal of Computer, 2006, 29(8):1301-1307.(in Chinese)