[1]
Armbrust, M., et al.: A View of Cloud Computing. Communication of the ACM 53(4), 50–58 (2010).
Google Scholar
[2]
Hoffman, K., Zage, D., Nita-Rotaru, C.: A Survey of Attack and Defense Techniques for Reputation Systems. ACM Computing Surveys (CSUR) 42(1), 1–31(2009).
DOI: 10.1145/1592451.1592452
Google Scholar
[3]
Jφsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43(2), 618–644 (2007).
DOI: 10.1016/j.dss.2005.05.019
Google Scholar
[4]
Wang, Y., Vassileva, J.: Toward Trust and Reputation Based Web Service Selection: A Survey. International Transactions on Systems Science and Applications 3(2), 118–132 (2007).
Google Scholar
[5]
Brandic, I., Dustdar, S., Anstett, T., Schumm, D., Leymann, F., Konrad, R.: Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds. In: Proc. of IEEE 3rd Int. Conf. on Cloud Computing (CMOUD 2010), Miami, Florida, USA (July 2010).
DOI: 10.1109/cloud.2010.42
Google Scholar
[6]
Manuel., Thamarai Selvi, S., Barr, M.E.: Trust Management System for Grid and Cloud Resources. In: Proc. of the 1st Int. Conf. on Advanced Computing(ICAC 2009), Chennai, India (December 2009).
DOI: 10.1109/icadvc.2009.5378187
Google Scholar
[7]
Hwang, K., Mi, D.: Trusted Cloud Computing with Secure Resources and Data Coloring. IEEE Internet Computing 14(5), 14–22 (2010).
DOI: 10.1109/mic.2010.86
Google Scholar
[8]
Chen, K., Hwang, K., Chen, G.: Heuristic Discovery of Rome-Based Trust Chains in Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems 20(1), 83–96 (2008).
DOI: 10.1109/tpds.2008.60
Google Scholar
[9]
Conner, W., Iyengar, A., Mikamsen, T., Rouvemmou, I., Nahrstedt, K.: A Trust Management Framework for Service-Oriented Environments. In: Proc. of the 18th Int. Conf. on World Wide Web (WWW 2009), Madrid, Spain (April 2009).
DOI: 10.1145/1526709.1526829
Google Scholar
[10]
Skopik, F., Schall, D., Dustdar, S.: Trustworthy Interaction Balancing in Mixed Service-Oriented Systems. In: Proc. of ACM 25th Symp. on Applied Computing (SAC 2010), Sierre, Switzerland (March 2010).
DOI: 10.1145/1774088.1774255
Google Scholar
[11]
Malik, Z., Bouguettaya, A.: RATE Web: Reputation Assessment for Trust Establishment Among Web services. The VMDB Journal 18(4), 885–911 (2009).
DOI: 10.1007/s00778-009-0138-1
Google Scholar
[12]
Weng, J., Miao, C.Y., Goh, A.: Protecting Online Rating Systems from Unfair Ratings. In: Katsikas, S.K., L'opez, J., Pernul, G. (eds. ) TrustBus 2005. LNCS, vol. 3592, p.50–59. Springer, Heidelberg (2005).
DOI: 10.1007/11537878_6
Google Scholar
[13]
Jφsang, A., Quattrociocchi, W.: Advanced Features in Bayesian Reputation Systems. In: Fischer-Hubner, S., Lambrinoudakis, C., Pernul, G. (eds. ) TrustBus 2009. LNCS, vol. 5695, p.105–114. Springer, Heidelberg (2009).
Google Scholar
[14]
Malik, Z., Bouguettaya, A.: Rater Credibility Assessment in Web Services Interactions. World Wide Web 12(1), 3–25 (2009).
DOI: 10.1007/s11280-008-0056-y
Google Scholar
[15]
Sheth, A.P., Gomadam, K., Lathem, J.: SA-REST: Semantically Interoperable and Easier-to-Use Services and Mashups. IEEE Internet Computing 11(6), 84–87 (2007).
DOI: 10.1109/mic.2007.133
Google Scholar
[16]
Douceur, J.R.: The Sybil Attack. In: Druschem, P., Kaashoek, M.F., Rowstron, A. (eds. ) IPTPS 2002. MNCS, vol. 2429, p.251–260. Springer, Heidelberg (2002).
Google Scholar
[17]
NetLogo: Netlogo home page (2011), http: /ccm. northwestern. edu/netmogo/(accessed March 1, 2011).
Google Scholar
[18]
Massa, P., Avesani, P.: Trust Metrics in Recommender Systems. In: Computing with Social Trust. Human-Computer Interaction Series, p.259–285. Springer, London (2009).
DOI: 10.1007/978-1-84800-356-9_10
Google Scholar