• Segovia-Ferreira M, Rubio-Hernan J, Cavalli A and Garcia-Alfaro J. (2024). A Survey on Cyber-Resilience Approaches for Cyber-Physical Systems. ACM Computing Surveys. 56:8. (1-37). Online publication date: 31-Aug-2024.

    https://doi.org/10.1145/3652953

  • Chen J, Lu H, Xu W, Yang Y, Amoon M and Kumari S. (2024). A blockchain‐based trusted vehicle service recommendation scheme in intelligent transport systems. SECURITY AND PRIVACY. 10.1002/spy2.452.

    https://onlinelibrary.wiley.com/doi/10.1002/spy2.452

  • Wziątek-Staśko A and Pobiedzińska K. (2023). Trust in managers in SME organizations undergoing digitization. International Journal of Contemporary Management. 10.2478/ijcm-2023-0014. 59:4. (94-111). Online publication date: 1-Dec-2023.. Online publication date: 1-Dec-2023.

    https://www.sciendo.com/article/10.2478/ijcm-2023-0014

  • Karmakar K, Varadharajan V, Hitchens M, Tupakula U and Sariputra P. (2023). A trust-aware openflow switching framework for software defined networks (SDN). Computer Networks. 10.1016/j.comnet.2023.110109. 237. (110109). Online publication date: 1-Dec-2023.

    https://linkinghub.elsevier.com/retrieve/pii/S1389128623005546

  • Awang Abu Bakar N, Idris N, Yahya N, Sheikh Abd Aziz M, Daud N and Ahmed Moallim A. (2023). Trust Reputation in Blockchain Environment: A Review. Impact of Artificial Intelligence, and the Fourth Industrial Revolution on Business Success. 10.1007/978-3-031-08093-7_51. (773-779).

    https://link.springer.com/10.1007/978-3-031-08093-7_51

  • Ahmed U, Raza I, Rana O and Hussain S. Aggregated Capability Assessment (AgCA) For CAIQ Enabled Cross-cloud Federation. IEEE Transactions on Services Computing. 10.1109/TSC.2021.3073783. 15:5. (2619-2632).

    https://ieeexplore.ieee.org/document/9406383/

  • Mathew A. (2022). Can Security Be Decentralised?. Socio-Technical Aspects in Security. 10.1007/978-3-031-10183-0_4. (67-85).

    https://link.springer.com/10.1007/978-3-031-10183-0_4

  • Kyei K, Nick W and Esterline A. (2021). A Method for Calculating Trustworthiness in Social Networks SoutheastCon 2021. 10.1109/SoutheastCon45413.2021.9401947. 978-1-6654-0379-5. (01-06).

    https://ieeexplore.ieee.org/document/9401947/

  • Chatzigiannakis I and Tselios C. Internet of Everything. Intelligent Computing for Interactive System Design. (21-56).

    https://doi.org/10.1145/3447404.3447408

  • Yi L, Fang W, Zhang W, Gao W, Li B and Li J. (2021). Game-Based Trust in Complex Networks. Complexity. 2021. Online publication date: 1-Jan-2021.

    https://doi.org/10.1155/2021/6614941

  • Segovia M, Rubio-Hernan J, Cavalli A and Garcia-Alfaro J. (2020). Cyber-Resilience Evaluation of Cyber-Physical Systems 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA). 10.1109/NCA51143.2020.9306741. 978-1-7281-8326-8. (1-8).

    https://ieeexplore.ieee.org/document/9306741/

  • Ahmed U, Raza I and Hussain S. (2019). Trust Evaluation in Cross-Cloud Federation. ACM Computing Surveys. 52:1. (1-37). Online publication date: 31-Jan-2020.

    https://doi.org/10.1145/3292499

  • Ahmed U, Petri I, Rana O, Raza I and Hussain S. Federating Cloud Systems for Collaborative Construction and Engineering. IEEE Access. 10.1109/ACCESS.2020.2990233. 8. (79908-79919).

    https://ieeexplore.ieee.org/document/9078104/

  • Hu B, Zhao X, Zhang C, Jin Y and Wei B. (2020). A Contract Based User-Centric Computational Trust Towards E-Governance. Web Services – ICWS 2020. 10.1007/978-3-030-59618-7_9. (133-149).

    http://link.springer.com/10.1007/978-3-030-59618-7_9

  • Ahmad Z and Bansiya A. (2018). Reduction of Malicious Nodes using RRT and Clustering in Mobile Ad hoc Network. International Journal of Scientific Research in Computer Science, Engineering and Information Technology. 10.32628/CSEIT183839. (133-142). Online publication date: 1-Dec-2018.

    http://ijsrcseit.com/paper/CSEIT183839.pdf

  • Ahmed U, Petri I, Rana O, Raza I and Hussain S. (2018). Risk-Based Service Selection in Federated Clouds 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion). 10.1109/UCC-Companion.2018.00038. 978-1-7281-0359-4. (77-82).

    https://ieeexplore.ieee.org/document/8605761/

  • Angeletti F, Chatzigiannakis I and Vitaletti A. (2018). Towards an Architecture to Guarantee Both Data Privacy and Utility in the First Phases of Digital Clinical Trials. Sensors. 10.3390/s18124175. 18:12. (4175).

    https://www.mdpi.com/1424-8220/18/12/4175

  • Msadek N, Soua R, Ladid L and Engel T. (2018). Advancing the Security of Trustworthy Self-IoT 2018 International Conference on Smart Communications and Networking (SmartNets). 10.1109/SMARTNETS.2018.8707421. 978-1-5386-9202-8. (1-7).

    https://ieeexplore.ieee.org/document/8707421/

  • Zheng C, Long S, Liu J, Wu C, Qi T, Zhu Y, Li X, Xie Z, Shuai J, Chen Z and Jiang W. (2018). Improved Access Control Based on Analytic Hierarchy Process 2018 IEEE 4th International Conference on Control Science and Systems Engineering (ICCSSE). 10.1109/CCSSE.2018.8724776. 978-1-5386-7887-9. (338-341).

    https://ieeexplore.ieee.org/document/8724776/

  • Granatyr J, Osman N, Dias J, Nunes M, Masthoff J, Enembreck F, Lessing O, Sierra C, Paiva A and Scalabrin E. (2017). The Need for Affective Trust Applied to Trust and Reputation Models. ACM Computing Surveys. 50:4. (1-36). Online publication date: 31-Jul-2018.

    https://doi.org/10.1145/3078833

  • Daif A, Karouchi A, Ounacer S and Azouazi M. Conceptual Model for Trust and Recommendation Systems. Proceedings of the Fourth International Conference on Engineering & MIS 2018. (1-6).

    https://doi.org/10.1145/3234698.3234724

  • Cao S, Zheng W, Mo S, Jin X, Dai C, Fan Z, Qu Y, Zhou J and Deng F. (2018). Access control of cloud users credible behavior based on IPv6 2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA). 10.1109/ICBDA.2018.8367697. 978-1-5386-4794-3. (303-308).

    https://ieeexplore.ieee.org/document/8367697/

  • Oliver I, Panda S, Wang K and Kalliola A. (2018). Modelling NFV concepts with ontologies 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN). 10.1109/ICIN.2018.8401590. 978-1-5386-3458-5. (1-7).

    https://ieeexplore.ieee.org/document/8401590/

  • Sun B and Li D. A Comprehensive Trust-Aware Routing Protocol With Multi-Attributes for WSNs. IEEE Access. 10.1109/ACCESS.2017.2786944. 6. (4725-4741).

    http://ieeexplore.ieee.org/document/8240887/

  • Pérez J, Silva D, Góez J, Sarmiento A, Sarmiento-Romero A, Akhavan-Tabatabaei R and Riaño G. (2017). Algorithm 972. ACM Transactions on Mathematical Software. 43:3. (1-22). Online publication date: 30-Sep-2017.

    https://doi.org/10.1145/3009968

  • Wazan A, Laborde R, Chadwick D, Barrere F, Benzekri A, Kaiiali M, Habbal A and Masucci B. (2017). Trust Management for Public Key Infrastructures. Security and Communication Networks. 2017. Online publication date: 1-Jan-2017.

    https://doi.org/10.1155/2017/6907146

  • Mali G and Misra S. TRAST: Trust-Based Distributed Topology Management for Wireless Multimedia Sensor Networks. IEEE Transactions on Computers. 10.1109/TC.2015.2456026. 65:6. (1978-1991).

    http://ieeexplore.ieee.org/document/7155527/

  • Patel K and Shah J. Analysis of Existing Trust Based Routing Schemes Used in Wireless Network. International Journal of Information Security and Privacy. 10.4018/IJISP.2016040103. 10:2. (26-40).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJISP.2016040103

  • Tian B, Han J and Liu K. (2016). Closed-Loop Feedback Computation Model of Dynamical Reputation Based on the Local Trust Evaluation in Business-to-Consumer E-Commerce. Information. 10.3390/info7010004. 7:1. (4).

    https://www.mdpi.com/2078-2489/7/1/4

  • Granatyr J, Botelho V, Lessing O, Scalabrin E, Barthès J and Enembreck F. (2015). Trust and Reputation Models for Multiagent Systems. ACM Computing Surveys. 48:2. (1-42). Online publication date: 21-Nov-2015.

    https://doi.org/10.1145/2816826

  • Xiang M, Liu W, Bai Q and Al-Anbuky A. The double-edged sword. Proceedings of the 2015 International Telecommunication Networks and Applications Conference (ITNAC). (286-291).

    https://doi.org/10.1109/ATNAC.2015.7366827

  • Xiang M, Liu W, Bai Q and Al-Anbuky A. Simmelian Ties and Structural Holes. Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01. (96-103).

    https://doi.org/10.1109/Trustcom.2015.362

  • Zou Q and Park E. Trust and Trust Building of Virtual Communities in the Networked Age. Handbook of Research on Emerging Developments in Data Privacy. 10.4018/978-1-4666-7381-6.ch014. (300-328).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-7381-6.ch014

  • Bixin Li , Li Liao , Leung H and Rui Song . PHAT: A Preference and Honesty Aware Trust Model for Web Services. IEEE Transactions on Network and Service Management. 10.1109/TNSM.2014.2325771. 11:3. (363-375).

    http://ieeexplore.ieee.org/document/6868989/

  • Gambhir M, Doja M and Moinuddin . Action-Based Trust Computation Algorithm for Online Social Network. Proceedings of the 2014 Fourth International Conference on Advanced Computing & Communication Technologies. (451-458).

    https://doi.org/10.1109/ACCT.2014.89

  • Neisse R, Wegdam M and van Sinderen M. (2014). Trust Management Support for Context-Aware Service Platforms. User-Centric Networking. 10.1007/978-3-319-05218-2_4. (75-106).

    https://link.springer.com/10.1007/978-3-319-05218-2_4

  • Carminati B, Ferrari E and Viviani M. (2013). Security and Trust in Online Social Networks. Synthesis Lectures on Information Security, Privacy, and Trust. 10.2200/S00549ED1V01Y201311SPT008. 4:3. (1-120). Online publication date: 26-Dec-2013.

    http://www.morganclaypool.com/doi/abs/10.2200/S00549ED1V01Y201311SPT008

  • Xiang M, Liu W and Bai Q. TIGER. Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. (65-72).

    https://doi.org/10.1109/TrustCom.2013.12

  • Li B, Song R, Liao L and Liu C. A User-Oriented Trust Model for Web Services. Proceedings of the 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering. (224-232).

    https://doi.org/10.1109/SOSE.2013.17

  • Yang G, Hou X, Tan Z, Zhang L and Yu H. (2013). Balance Theory-Based Model for Discovering Trust Network. Proceedings of the International Conference on Information Engineering and Applications (IEA) 2012. 10.1007/978-1-4471-4853-1_44. (339-346).

    https://link.springer.com/10.1007/978-1-4471-4853-1_44

  • Xiang M, Bai Q and Liu W. Self-Adjustable Trust-Based Energy Efficient Routing for Smart Grid Systems. Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03. (378-382).

    https://doi.org/10.1109/WI-IAT.2012.89

  • Song R, Li B, Wu X, Liu C and Qi S. A Preference and Honesty Aware Trust Model for Web Services. Proceedings of the 2012 19th Asia-Pacific Software Engineering Conference - Volume 01. (61-66).

    https://doi.org/10.1109/APSEC.2012.28

  • Zhang Y, Hou F and Yang C. (2012). An Authentication Structure across Trust Domains. Advanced Materials Research. 10.4028/www.scientific.net/AMR.601.301. 601. (301-306).

    https://www.scientific.net/AMR.601.301

  • Huang W, Deng Z, Li R and Tang X. (2012). Trust-Based Particle Swarm Optimization for Grid Task Scheduling. Applied Mechanics and Materials. 10.4028/www.scientific.net/AMM.239-240.1331. 239-240. (1331-1335).

    https://www.scientific.net/AMM.239-240.1331

  • Ming Xiang , Liu W and Quan Bai . (2012). Trust-based geographical routing For smart grid communication networks 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm). 10.1109/SmartGridComm.2012.6486069. 978-1-4673-0910-3. (704-709).

    http://ieeexplore.ieee.org/document/6486069/

  • Abu Bakar A, Ismail R, Ahmad A and Abdul Manan J. (2012). Subjective trust model for mobile ad-hoc network in emergency environment 2012 IEEE Symposium on Wireless Technology & Applications (ISWTA). 10.1109/ISWTA.2012.6373865. 978-1-4673-2210-2. (297-302).

    http://ieeexplore.ieee.org/document/6373865/

  • Viehmann J. The theory of creating trust with a set of mistrust-parties. Proceedings of the 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST). (185-194).

    https://doi.org/10.1109/PST.2012.6297939

  • Wu Z and Weaver A. Privacy-Preserving Trust Establishment with Web Service Enhancements. Innovations, Standards and Practices of Web Services. 10.4018/978-1-61350-104-7.ch003. (54-73).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61350-104-7.ch003

  • Manolopoulos C, Sofotassios D, Spirakis P and Stamatiou Y. ICT and eGovernance. Public Sector Reform Using Information Technologies. 10.4018/978-1-60960-839-2.ch007. (115-136).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-839-2.ch007

  • Arikpo I, Osofisan A and Eteng I. Enhancing Trust in E-Commerce in Developing IT Environments. Leveraging Developing Economies with the Use of Information Technology. 10.4018/978-1-4666-1637-0.ch011. (193-203).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-1637-0.ch011

  • Fusco S, Abbas R, Michael K and Aloudat A. Location-Based Social Networking: Impact on Trust in Relationships. IEEE Technology and Society Magazine. 10.1109/MTS.2012.2196340. 31:2. (39-50).

    http://ieeexplore.ieee.org/document/6213869/

  • Canfora G and Visaggio C. (2012). Managing Trust in Social Networks. Information Security Journal: A Global Perspective. 21:4. (206-215). Online publication date: 1-Jan-2012.

    https://doi.org/10.1080/19393555.2012.660677

  • Dimitrakos T. (2012). A Perspective on the Evolution of the International Trust Management Research Community in the Last Decade. Trust Management VI. 10.1007/978-3-642-29852-3_24. (267-280).

    http://link.springer.com/10.1007/978-3-642-29852-3_24

  • Aradhana and Chana I. (2011). Developing trust policies for cloud scenarios 2011 2nd International Conference on Computer and Communication Technology (ICCCT). 10.1109/ICCCT.2011.6075147. 978-1-4577-1385-9. (389-393).

    http://ieeexplore.ieee.org/document/6075147/

  • Bathelt H and Turi P. (2011). Local, global and virtual buzz: The importance of face-to-face contact in economic interaction and possibilities to go beyond. Geoforum. 10.1016/j.geoforum.2011.04.007. 42:5. (520-529). Online publication date: 1-Sep-2011.

    https://linkinghub.elsevier.com/retrieve/pii/S0016718511000558

  • Li S, Fan Y and Li X. (2011). A trust-based approach to selection of business services. International Journal of Computer Integrated Manufacturing. 24:8. (769-784). Online publication date: 1-Aug-2011.

    https://doi.org/10.1080/0951192X.2011.574235

  • Ishtiaq S and O'Hearn P. (2011). BI as an assertion language for mutable data structures. ACM SIGPLAN Notices. 46:4. (84-96). Online publication date: 20-May-2011.

    https://doi.org/10.1145/1988042.1988050

  • Claessen K and Hughes J. (2011). QuickCheck. ACM SIGPLAN Notices. 46:4. (53-64). Online publication date: 20-May-2011.

    https://doi.org/10.1145/1988042.1988046

  • Bala V, Duesterwald E and Banerjia S. (2011). Dynamo. ACM SIGPLAN Notices. 46:4. (41-52). Online publication date: 20-May-2011.

    https://doi.org/10.1145/1988042.1988044

  • Fusco S, Michael K, Aloudat A and Abbas R. (2011). Monitoring people using location-based social networking and its negative impact on trust 2011 IEEE International Symposium on Technology and Society (ISTAS). 10.1109/ISTAS.2011.7160597. 978-1-4244-9149-0. (1-11).

    http://ieeexplore.ieee.org/document/7160597/

  • Viriyasitavat W and Martin A. A Survey of Trust in Workflows and Relevant Contexts. IEEE Communications Surveys & Tutorials. 10.1109/SURV.2011.072811.00081.

    http://ieeexplore.ieee.org/document/5989901/

  • Viriyasitavat W and Martin A. Formal Trust Specification in Service Workflows. Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. (703-710).

    https://doi.org/10.1109/EUC.2010.111

  • Dell'Amico M and Capra L. (2010). Dependable filtering. ACM Transactions on Information Systems. 29:1. (1-37). Online publication date: 1-Dec-2010.

    https://doi.org/10.1145/1877766.1877771

  • Uusitalo I, Karppinen K, Juhola A and Savola R. Trust and Cloud Services - An Interview Study. Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science. (712-720).

    https://doi.org/10.1109/CloudCom.2010.41

  • Dong Y, Yin G and Teng X. A Dynamic Trust Measurement Based on Characteristics of Evaluation Indexes. Proceedings of the 2010 Fifth International Conference on Internet Computing for Science and Engineering. (182-187).

    https://doi.org/10.1109/ICICSE.2010.42

  • Balfe S, Yau P and Paterson K. (2010). A guide to trust in mobile ad hoc networks. Security and Communication Networks. 10.1002/sec.147. 3:6. (503-516). Online publication date: 1-Nov-2010.

    https://onlinelibrary.wiley.com/doi/10.1002/sec.147

  • Gai X, Li Y, Chen Y and Shen C. Formal Definitions for Trust in Trusted Computing. Proceedings of the 2010 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing. (305-310).

    https://doi.org/10.1109/UIC-ATC.2010.77

  • Tabesh A, Hussain F, Chang E and Sianki O. Subjective Quality Assessments in Virtual Environments. Proceedings of the 2010 13th International Conference on Network-Based Information Systems. (345-349).

    https://doi.org/10.1109/NBiS.2010.99

  • Safa H and Abu Shahla F. (2010). Trust-aware monitoring scheme for WiMAX networks 2010 Eighth Annual International Conference on Privacy, Security and Trust (PST). 10.1109/PST.2010.5593257. 978-1-4244-7551-3. (88-95).

    http://ieeexplore.ieee.org/document/5593257/

  • Ahamed S, Haque M and Talukder N. (2010). A formal context specific trust model (FTM) for multimedia and ubiquitous computing environment. Telecommunications Systems. 44:3-4. (221-240). Online publication date: 1-Aug-2010.

    https://doi.org/10.1007/s11235-009-9261-y

  • Dong Yu-xin , Yin Gui-sheng , Wang Y and Dong Hong-bin . (2010). The self-organizing trust model of the Internetware based on evolutionary game 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2010). 10.1109/ICCSIT.2010.5564864. 978-1-4244-5537-9. (363-368).

    http://ieeexplore.ieee.org/document/5564864/

  • Everding T, Jürrens E and Andrae S. In-stream Validation of Measurements with OGC SWE Web Services. Proceedings of the 2010 Second International Conference on Advanced Geographic Information Systems, Applications, and Services. (93-98).

    https://doi.org/10.1109/GEOProcessing.2010.21

  • Ahamed S, Haque M, Hoque M, Rahman F and Talukder N. (2010). Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments. Journal of Systems and Software. 83:2. (253-270). Online publication date: 1-Feb-2010.

    https://doi.org/10.1016/j.jss.2009.09.040

  • Liagkou V, Spirakis P and Stamatiou Y. (2010). Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society?. Next Generation Society. Technological and Legal Issues. 10.1007/978-3-642-11631-5_19. (199-208).

    http://link.springer.com/10.1007/978-3-642-11631-5_19

  • Tian J, Yuan P and Lu Y. Security for Resource Allocation Based on Trust and Reputation in Computational Economy Model for Grid. Proceedings of the 2009 Fourth International Conference on Frontier of Computer Science and Technology. (339-345).

    https://doi.org/10.1109/FCST.2009.40

  • Hoque M, Rahman F, Ahamed S and Liu L. Trust based security auto-configuration for smart assisted living environments. Proceedings of the 2nd ACM workshop on Assurable and usable security configuration. (7-12).

    https://doi.org/10.1145/1655062.1655065

  • Chen Y, Bu T, Zhang M and Zhu H. Max-Minimum Algorithm for Trust Transitivity in Trustworthy Networks. Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03. (62-64).

    https://doi.org/10.1109/WI-IAT.2009.231

  • Chen Y, Zhang M, Zhu H and Bu T. Average Transitive Trustworthy Degrees for Trustworthy Networks. Proceedings of the 4th International Conference on Rough Sets and Knowledge Technology. (682-689).

    https://doi.org/10.1007/978-3-642-02962-2_86

  • Neisse R. (2009). Trust management in pervasive and service-oriented architectures Simulation (HPCS). 10.1109/HPCSIM.2009.5192093. 978-1-4244-4906-4. (255-255).

    http://ieeexplore.ieee.org/document/5192093/

  • Denko M, Sun T and Woungang I. (2009). Deterministic trust management in pervasive computing. Journal of Mobile Multimedia. 5:1. (64-80). Online publication date: 1-Mar-2009.

    /doi/10.5555/2011043.2011049

  • Li Y and Kao C. (2009). TREPPS. Expert Systems with Applications: An International Journal. 36:2. (3263-3277). Online publication date: 1-Mar-2009.

    https://doi.org/10.1016/j.eswa.2008.01.078

  • Uddin M, Zulkernine M and Ahamed S. (2009). Collaboration through computation: incorporating trust model into service-based software systems. Service Oriented Computing and Applications. 10.1007/s11761-009-0037-8. 3:1. (47-63). Online publication date: 1-Mar-2009.

    http://link.springer.com/10.1007/s11761-009-0037-8

  • Vizcaíno A, Portillo-Rodríguez J, Soto J and Piattini M. Encouraging the Reuse of Knowledge in Communities of Practice by Using a Trust Model. Proceedings of the 2009 International Conference on Information, Process, and Knowledge Management. (28-33).

    https://doi.org/10.1109/eKNOW.2009.9

  • Weaver A and Wu Z. (2009). Using Web Service Enhancements to Establish Trust Relationships with Privacy Protection (Extended and Invited from ICWS 2006 with id 47). International Journal of Web Services Research. 10.4018/jwsr.2009092203. 6:1. (49-68). Online publication date: 1-Jan-2009.

    https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jwsr.2009092203

  • Seigneur J. (2009). Social Trust of Virtual Identities. Computing with Social Trust. 10.1007/978-1-84800-356-9_4. (73-118).

    http://link.springer.com/10.1007/978-1-84800-356-9_4

  • Ma Y and Zhang M. A Computation Model of Trustworthy Degree. Proceedings of the 2008 International Symposium on Intelligent Information Technology Application Workshops. (523-526).

    https://doi.org/10.1109/IITA.Workshops.2008.164

  • Peng S, Jia W and Wang G. Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks. Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02. (3-9).

    https://doi.org/10.1109/EUC.2008.93

  • Wang Q and Wang L. A Vector-Based Trust Model for P2P E-commerce. Proceedings of the 2008 Fourth International Conference on Natural Computation - Volume 07. (117-123).

    https://doi.org/10.1109/ICNC.2008.616

  • Chen M, He L, Cai X and Xia W. Trust Evaluation Model for Composite Service Based on Subjective Logic. Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing. (1482-1485).

    https://doi.org/10.1109/IIH-MSP.2008.22

  • Wei-Peng L and Ju H. A Formal Model of Trust and Security for Task-Oriented Information System. Proceedings of the 2008 International Symposium on Electronic Commerce and Security. (502-506).

    https://doi.org/10.1109/ISECS.2008.191

  • Stevens M, Williams P, Peterson G and Kurkowski S. (2008). Integrating trust into the CyberCraft Initiative via the Trust Vectors model [Application Notes]. IEEE Computational Intelligence Magazine. 3:2. (65-68). Online publication date: 1-May-2008.

    https://doi.org/10.1109/MCI.2008.4490264

  • Fu B and O'Sullivan D. (2008). User Centric Trust-Based Access Control Management for Ubiquitous Computing Environments NOMS 2008 - 2008 IEEE Network Operations and Management Symposium Workshop. 10.1109/NOMSW.2007.43. 978-1-4244-2067-4. (265-274).

    http://ieeexplore.ieee.org/document/4509959/

  • Sun T and Denko M. Performance Evaluation of Trust Management in Pervasive Computing. Proceedings of the 22nd International Conference on Advanced Information Networking and Applications. (386-394).

    https://doi.org/10.1109/AINA.2008.147

  • Uddin M, Zulkernine M and Ahamed S. CAT. Proceedings of the 2008 ACM symposium on Applied computing. (2024-2029).

    https://doi.org/10.1145/1363686.1364176

  • Ahamed S, Haque M and Talukder N. Service sharing with trust in pervasive environment. Proceedings of the 2008 ACM symposium on Applied computing. (1622-1628).

    https://doi.org/10.1145/1363686.1364070

  • Lutfiyya H, Perry M and Yew C. Trust and Autonomic Systems. Proceedings of the 2008 International MCETECH Conference on e-Technologies. (239-242).

    https://doi.org/10.1109/MCETECH.2008.36

  • Dell'Amico M and Capra L. SOFIA: Social Filtering for Robust Recommendations. Trust Management II. 10.1007/978-0-387-09428-1_9. (135-150).

    http://link.springer.com/10.1007/978-0-387-09428-1_9

  • Soriano E, Ballesteros F and Guardiola G. (2007). Human-to-Human authorization for resource sharing in SHAD. Pervasive and Mobile Computing. 3:6. (677-697). Online publication date: 1-Dec-2007.

    https://doi.org/10.1016/j.pmcj.2007.07.001

  • Etalle S, den Hartog J and Marsh S. Trust and punishment. Proceedings of the 1st international conference on Autonomic computing and communication systems. (1-6).

    /doi/10.5555/1365562.1365569

  • Arnott D and Arnott D. (2007). Research on trust: a bibliography and brief bibliometric analysis of the special issue submissions. European Journal of Marketing. 10.1108/03090560710773408. 41:9/10. (1203-1240). Online publication date: 25-Sep-2007.

    https://www.emerald.com/insight/content/doi/10.1108/03090560710773408/full/html

  • Antoniou A, Korakas C, Manolopoulos C, Panagiotaki A, Sofotassios D, Spirakis P and Stamatiou Y. A trust-centered approach for building e-voting systems. Proceedings of the 6th international conference on Electronic Government. (366-377).

    /doi/10.5555/2392010.2392047

  • Hussain F, Hussain O and Chang E. (2007). An overview of the interpretations of trust and reputation 2007 IEEE Conference on Emerging Technologies & Factory Automation (EFTA 2007). 10.1109/EFTA.2007.4416865. 978-1-4244-0825-2. (826-830).

    http://ieeexplore.ieee.org/document/4416865/

  • Haque M and Ahamed S. An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment. Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 01. (49-56).

    https://doi.org/10.1109/COMPSAC.2007.69

  • Jian-Yong Z. (2007). Research on Trust Management Model in Pervasive Computing 2007 2nd International Conference on Pervasive Computing and Applications. 10.1109/ICPCA.2007.4365480. 978-1-4244-0970-9. (419-423).

    http://ieeexplore.ieee.org/document/4365480/

  • Hussain F and Chang E. An Overview of the Interpretations of Trust and Reputation. Proceedings of the The Third Advanced International Conference on Telecommunications.

    https://doi.org/10.1109/AICT.2007.11

  • Liagkou V, Makri E, Spirakis P and Stamatiou Y. Trust in global computing systems as a limit property emerging from short range random interactions. Proceedings of the The Second International Conference on Availability, Reliability and Security. (741-748).

    https://doi.org/10.1109/ARES.2007.154

  • Sun T and Denko M. (2007). A Distributed Trust Management Scheme in the Pervasive Computing Environment 2007 Canadian Conference on Electrical and Computer Engineering. 10.1109/CCECE.2007.311. 1-4244-1020-7. (1219-1222).

    http://ieeexplore.ieee.org/document/4232970/

  • Czenko M, Etalle S, Li D and Winsborough W. An Introduction to the Role Based Trust Management Framework RT. Foundations of Security Analysis and Design IV. 10.1007/978-3-540-74810-6_9. (246-281).

    http://link.springer.com/10.1007/978-3-540-74810-6_9

  • Antoniou A, Korakas C, Manolopoulos C, Panagiotaki A, Sofotassios D, Spirakis P and Stamatiou Y. A Trust-Centered Approach for Building E-Voting Systems. Electronic Government. 10.1007/978-3-540-74444-3_31. (366-377).

    http://link.springer.com/10.1007/978-3-540-74444-3_31

  • Ardagna C, Damiani E, De Capitani di Vimercati S, Foresti S and Samarati P. (2007). Trust Management. Security, Privacy, and Trust in Modern Data Management. 10.1007/978-3-540-69861-6_8. (103-117).

    http://link.springer.com/10.1007/978-3-540-69861-6_8

  • Herrmann P and Kraemer P. Design of Trusted Systems with Reusable Collaboration Models. Trust Management. 10.1007/978-0-387-73655-6_21. (317-332).

    http://link.springer.com/10.1007/978-0-387-73655-6_21

  • Golbeck J and Hendler J. (2006). Inferring binary trust relationships in Web-based social networks. ACM Transactions on Internet Technology. 6:4. (497-529). Online publication date: 1-Nov-2006.

    https://doi.org/10.1145/1183463.1183470

  • Wu Z and Weaver A. Using web service enhancements to bridge business trust relationships. Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services. (1-8).

    https://doi.org/10.1145/1501434.1501477

  • von der Weth C and Böhm K. A unifying framework for behavior-based trust models. Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part I. (444-461).

    https://doi.org/10.1007/11914853_27

  • Wu Z and Weaver A. Bridging Trust Relationships with Web Service Enhancements. Proceedings of the IEEE International Conference on Web Services. (163-169).

    https://doi.org/10.1109/ICWS.2006.40

  • Yuan W, Guan D, Lee S and Lee Y. A dynamic trust model based on naive bayes classifier for ubiquitous environments. Proceedings of the Second international conference on High Performance Computing and Communications. (562-571).

    https://doi.org/10.1007/11847366_58

  • Yuan W, Guan D, Hung L, Lee Y and Lee S. (2006). A Trust Model with Dynamic Decision Making for Ubiquitous Environments 2006 14th IEEE International Conference on Networks. 10.1109/ICON.2006.302565. 0-7803-9746-0. (1-6).

    http://ieeexplore.ieee.org/document/4087692/

  • Li S, Balfe S, Zhou J and Chen K. Enforcing trust in pervasive computing with trusted computing technology. Proceedings of the First international conference on Critical Information Infrastructures Security. (195-209).

    https://doi.org/10.1007/11962977_16

  • Golbeck J. (2006). Computing with Trust: Definition, Properties, and Algorithms 2006 Securecomm and Workshops. 10.1109/SECCOMW.2006.359579. 1-4244-0422-3. (1-7).

    http://ieeexplore.ieee.org/document/4198839/

  • Gross S. (2006). Towards Cooperative Self-Protecting Mobile Devices using Trustful Relationships 2006 Securecomm and Workshops. 10.1109/SECCOMW.2006.359542. 1-4244-0422-3. (1-7).

    http://ieeexplore.ieee.org/document/4198802/

  • Balfe S, Li S and Zhou J. Pervasive Trusted Computing. Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing. (88-94).

    https://doi.org/10.1109/SECPERU.2006.14

  • Herrmann P. Temporal logic-based specification and verification of trust models. Proceedings of the 4th international conference on Trust Management. (105-119).

    https://doi.org/10.1007/11755593_9

  • Strauss K, Shen X and Torrellas J. (2006). Flexible Snooping. ACM SIGARCH Computer Architecture News. 34:2. (327-338). Online publication date: 1-May-2006.

    https://doi.org/10.1145/1150019.1136514

  • Swanson S, Putnam A, Mercaldi M, Michelson K, Petersen A, Schwerin A, Oskin M and Eggers S. (2006). Area-Performance Trade-offs in Tiled Dataflow Architectures. ACM SIGARCH Computer Architecture News. 34:2. (314-326). Online publication date: 1-May-2006.

    https://doi.org/10.1145/1150019.1136513

  • Balakrishnan S and Sohi G. (2006). Program Demultiplexing. ACM SIGARCH Computer Architecture News. 34:2. (302-313). Online publication date: 1-May-2006.

    https://doi.org/10.1145/1150019.1136512

  • Marias G, Georgiadis P, Flitzanis D and Mandalas K. (2006). Cooperation enforcement schemes for MANETs: a survey. Wireless Communications and Mobile Computing. 10.1002/wcm.398. 6:3. (319-332). Online publication date: 1-May-2006.

    https://onlinelibrary.wiley.com/doi/10.1002/wcm.398

  • Kotsovinos E and Williams A. BambooTrust. Proceedings of the 2006 ACM symposium on Applied computing. (1893-1897).

    https://doi.org/10.1145/1141277.1141723

  • Pirzada A and McDonald C. (2006). Trust Establishment In Pure Ad-hoc Networks. Wireless Personal Communications: An International Journal. 37:1-2. (139-168). Online publication date: 1-Apr-2006.

    https://doi.org/10.1007/s11277-006-1574-5

  • Chuk-Yang Seng and Arbaugh W. A Secure Trust Establishment Model IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing -Vol 1 (SUTC'06). 10.1109/SUTC.2006.1636162. 0-7695-2553-9. (78-85).

    http://ieeexplore.ieee.org/document/1636162/

  • Altmann J and Sampath R. (2006). UNIQuE: A User-Centric Framework for Network Identity Management 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006. 10.1109/NOMS.2006.1687578. 1-4244-0142-9. (495-506).

    http://ieeexplore.ieee.org/document/1687578/

  • Ceravolo P, Damiani E and Viviani M. Adding a Trust Layer to Semantic Web Metadata. Soft Computing in Web Information Retrieval. 10.1007/3-540-31590-X_5. (87-104).

    http://link.springer.com/10.1007/3-540-31590-X_5

  • Zhao W, Varadharajan V and Bryan G. Analysis and modelling of trust in distributed information systems. Proceedings of the First international conference on Information Systems Security. (106-119).

    https://doi.org/10.1007/11593980_8

  • Jameel H, Hung L, Kalim U, Sajjad A, Lee S and Lee Y. A Trust Model for Ubiquitous Systems based on Vectors of Trust Values. Proceedings of the Seventh IEEE International Symposium on Multimedia. (674-679).

    https://doi.org/10.1109/ISM.2005.22

  • Sierra J, Navarro A, Fernández-Manjón B and Fernández-Valmayor A. (2005). Incremental definition and operationalization of domain-specific markup languages in ADDS. ACM SIGPLAN Notices. 40:12. (28-37). Online publication date: 1-Dec-2005.

    https://doi.org/10.1145/1117303.1117308

  • Kumar R, Gupta A, Pankaj B, Ghosh M and Chakrabarti P. (2005). Post-compilation optimization for multiple gains with pattern matching. ACM SIGPLAN Notices. 40:12. (14-23). Online publication date: 1-Dec-2005.

    https://doi.org/10.1145/1117303.1117306

  • Savidis A. (2005). More dynamic imperative languages. ACM SIGPLAN Notices. 40:12. (6-13). Online publication date: 1-Dec-2005.

    https://doi.org/10.1145/1117303.1117305

  • Coetzee M and Eloff J. (2005). Autonomous trust for web services. Internet Research. 10.1108/10662240510629448. 15:5. (498-507). Online publication date: 1-Dec-2005.

    https://www.emerald.com/insight/content/doi/10.1108/10662240510629448/full/html

  • Wang C, Yang X and Gao Y. A routing protocol based on trust for MANETs. Proceedings of the 4th international conference on Grid and Cooperative Computing. (959-964).

    https://doi.org/10.1007/11590354_115

  • Ryutov T, Zhou L, Neuman C, Foukia N, Leithead T and Seamons K. Adaptive Trust Negotiation and Access Control for Grids. Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing. (55-62).

    https://doi.org/10.1109/GRID.2005.1542724

  • Tsetsos V, Marias G and Paskalis S. Trust management issues for ad hoc and self-organized networks. Proceedings of the Second international IFIP conference on Autonomic Communication. (153-164).

    https://doi.org/10.1007/11687818_12

  • Viljanen L. Towards an ontology of trust. Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business. (175-184).

    https://doi.org/10.1007/11537878_18

  • Aime M and Lioy A. Incremental Trust. Proceedings of the First International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing - Volume 03. (603-608).

    https://doi.org/10.1109/WOWMOM.2005.54

  • Jøsang A, Keser C and Dimitrakos T. Can we manage trust?. Proceedings of the Third international conference on Trust Management. (93-107).

    https://doi.org/10.1007/11429760_7

  • Ruohomaa S and Kutvonen L. Trust management survey. Proceedings of the Third international conference on Trust Management. (77-92).

    https://doi.org/10.1007/11429760_6

  • Jøsang A and Pope S. Semantic constraints for trust transitivity. Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling - Volume 43. (59-68).

    /doi/10.5555/1082276.1082284

  • Marias G, Tsetsos V, Sekkas O and Georgiadis P. Performance evaluation of a self-evolving trust building framework Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.. 10.1109/SECCMW.2005.1588306. 0-7803-9468-2. (134-143).

    http://ieeexplore.ieee.org/document/1588306/

  • Ryutov T, Neuman C, Li Zhou and Foukia N. Establishing agreements in dynamic virtual organizations Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.. 10.1109/SECCMW.2005.1588300. 0-7803-9468-2. (92-101).

    http://ieeexplore.ieee.org/document/1588300/

  • Bhattaram S, Wilson S and Hexmoor H. Towards an analysis of information sharing metrics International Conference on Integration of Knowledge Intensive Multi-Agent Systems, 2005.. 10.1109/KIMAS.2005.1427107. 0-7803-9013-X. (347-354).

    http://ieeexplore.ieee.org/document/1427107/

  • Pirzada A and McDonald C. Deploying trust gateways to reinforce dynamic source routing INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005.. 10.1109/INDIN.2005.1560472. 0-7803-9094-6. (779-784).

    http://ieeexplore.ieee.org/document/1560472/

  • Hossain L and Wigand R. (2006). ICT Enabled Virtual Collaboration through Trust. Journal of Computer-Mediated Communication. 10.1111/j.1083-6101.2004.tb00233.x. 10:1. (00-00).

    https://academic.oup.com/jcmc/article/4614474

  • Seigneur J and Jensen C. Trust enhanced ubiquitous payment without too much privacy loss. Proceedings of the 2004 ACM symposium on Applied computing. (1593-1599).

    https://doi.org/10.1145/967900.968218

  • Pirzada A and McDonald C. Establishing trust in pure ad-hoc networks. Proceedings of the 27th Australasian conference on Computer science - Volume 26. (47-54).

    /doi/10.5555/979922.979929

  • Pirzada A and McDonald C. (2004). Trusted route discovery with TORA protocol Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004.. 10.1109/DNSR.2004.1344720. 0-7695-2096-0. (121-130).

    http://ieeexplore.ieee.org/document/1344720/

  • Varadharajan V. (2004). Trustworthy Computing. Web Information Systems – WISE 2004. 10.1007/978-3-540-30480-7_2. (13-16).

    http://link.springer.com/10.1007/978-3-540-30480-7_2

  • Ruth P, Xu D, Bhargava B and Regnier F. (2004). E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities. Trust Management. 10.1007/978-3-540-24747-0_13. (161-175).

    http://link.springer.com/10.1007/978-3-540-24747-0_13

  • Twigg A. A subjective approach to routing in P2P and ad hoc networks. Proceedings of the 1st international conference on Trust management. (225-238).

    /doi/10.5555/1759008.1759024

  • Grandison T and Sloman M. Trust management tools for internet applications. Proceedings of the 1st international conference on Trust management. (91-107).

    /doi/10.5555/1759008.1759015

  • Herrmann P. Trust-based protection of software component users and designers. Proceedings of the 1st international conference on Trust management. (75-90).

    /doi/10.5555/1759008.1759014

  • Dragovic B, Hand S, Harris T, Kotsovinos E and Twigg A. Managing trust and reputation in the XenoServer open platform. Proceedings of the 1st international conference on Trust management. (59-74).

    /doi/10.5555/1759008.1759013

  • Rössler T and Hollosi A. (2003). Privacy and Trust in Distributed Networks. Communications and Multimedia Security. Advanced Techniques for Network and Data Protection. 10.1007/978-3-540-45184-6_10. (117-131).

    http://link.springer.com/10.1007/978-3-540-45184-6_10

  • Dragovic B, Hand S, Harris T, Kotsovinos E and Twigg A. (2003). Managing Trust and Reputation in the XenoServer Open Platform. Trust Management. 10.1007/3-540-44875-6_5. (59-74).

    http://link.springer.com/10.1007/3-540-44875-6_5

  • Twigg A. (2003). A Subjective Approach to Routing in P2P and Ad Hoc Networks. Trust Management. 10.1007/3-540-44875-6_16. (225-238).

    http://link.springer.com/10.1007/3-540-44875-6_16

  • Dimitrakos T. (2003). A Service-Oriented Trust Management Framework. Trust, Reputation, and Security: Theories and Practice. 10.1007/3-540-36609-1_6. (53-72).

    http://link.springer.com/10.1007/3-540-36609-1_6

  • Dimitrakos T. A service-oriented trust management framework. Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice. (53-72).

    /doi/10.5555/1762128.1762134

  • English C, Nixon P, Terzis S, McGettrick A and Lowe H. Security models for trusting network appliances 5th IEEE International Workshop on Networked Appliances. 10.1109/IWNA.2002.1241334. 0-7803-7686-2. (39-44).

    http://ieeexplore.ieee.org/document/1241334/

  • Carbo J, Molina J and Davila J. Privacy of trust in similarity estimation through secure computations 13th International Workshop on Database and Expert Systems Applications. 10.1109/DEXA.2002.1045947. 0-7695-1668-8. (498-502).

    http://ieeexplore.ieee.org/document/1045947/

  • Weimerskirch A and Thonet G. (2002). A Distributed Light-Weight Authentication Model for Ad-hoc Networks. Information Security and Cryptology — ICISC 2001. 10.1007/3-540-45861-1_26. (341-354).

    http://link.springer.com/10.1007/3-540-45861-1_26

  • Fahrenholtz D and Lamersdorf W. (2002). Transactional Security for a Distributed Reputation Management System. E-Commerce and Web Technologies. 10.1007/3-540-45705-4_23. (214-223).

    http://link.springer.com/10.1007/3-540-45705-4_23

  • Dimitrakos T. System Models, e-Risks and e-Trust. Towards the E-Society. 10.1007/0-306-47009-8_4. (45-58).

    http://link.springer.com/10.1007/0-306-47009-8_4

  • Ølnes J. A Taxonomy for Trusted Services. Towards the E-Society. 10.1007/0-306-47009-8_3. (31-44).

    http://link.springer.com/10.1007/0-306-47009-8_3

  • Au R, Looi M and Ashley P. Automated cross-organisational trust establishment on extranets. Proceedings of the workshop on Information technology for virtual enterprises. (3-11).

    /doi/10.5555/545618.545620

  • Au R, Looi M and Ashley P. (2001). Automated cross-organisational trust establishment on extranets. Australian Computer Science Communications. 23:6. (3-11). Online publication date: 1-Jan-2001.

    /doi/10.5555/545617.545620

  • Au R, Looi M and Ashley P. Automated cross-organisational trust establishment on extranets Workshop on Information Technology for Virtual Enterprises. ITVE 2001. 10.1109/ITVE.2001.904483. 0-7695-0960-6. (3-11).

    http://ieeexplore.ieee.org/document/904483/

  • Grandison T and Sloman M. (2000). A survey of trust in internet applications. IEEE Communications Surveys & Tutorials. 3:4. (2-16). Online publication date: 1-Oct-2000.

    https://doi.org/10.1109/COMST.2000.5340804

  • Abdul-Rahman A and Hailes S. Supporting trust in virtual communities HICSS33: Hawaii International Conference on System Sciences. 10.1109/HICSS.2000.926814. 0-7695-0493-0. (9).

    http://ieeexplore.ieee.org/document/926814/

  • Abdul-Rahman A and Hailes S. A distributed trust model. Proceedings of the 1997 workshop on New security paradigms. (48-60).

    https://doi.org/10.1145/283699.283739

  • JØsang A. (1998). A subjective metric of authentication. Computer Security — ESORICS 98. 10.1007/BFb0055873. (329-344).

    http://link.springer.com/10.1007/BFb0055873

  • Simmons R, Goodwin R, Haigh K, Koenig S, O'Sullivan J and Veloso M. (1997). Xavier. ACM SIGART Bulletin. 8:1-4. (22-33). Online publication date: 1-Dec-1997.

    https://doi.org/10.1145/272874.272878

  • Johnson W and Rickel J. (1997). Steve. ACM SIGART Bulletin. 8:1-4. (16-21). Online publication date: 1-Dec-1997.

    https://doi.org/10.1145/272874.272877

  • Jøsang A. (1997). A trust policy framework. Information and Communications Security. 10.1007/BFb0028475. (192-202).

    http://link.springer.com/10.1007/BFb0028475

  • Jøsang A. (1997). Prospectives for modelling trust in information security. Information Security and Privacy. 10.1007/BFb0027928. (2-13).

    http://link.springer.com/10.1007/BFb0027928

  • Jøsang A, Laenen F, Knapskog S and Vandewalle J. (1997). How to trust systems. Information Security in Research and Business. 10.1007/978-0-387-35259-6_19. (241-252).

    http://link.springer.com/10.1007/978-0-387-35259-6_19