@article(Ald15, author = {A. Aldini}, year = {2015}, title = {Modeling and Verification of Trust and Reputation Systems}, journal = {Journal of Security and Communication Networks}, volume = {8}, number = {16}, pages = {2933--2946}, doi = {10.1002/sec.1220}, ) @book(ABC, author = {A. Aldini and B. Bernardo and F. Corradini}, year = {2010}, title = {A Process Algebraic Approach to Software Architecture Design}, publisher = {Springer}, doi = {10.1007/978-1-84800-223-4}, ) @incollection(AB14, author = {A. Aldini and A. Bogliolo}, year = {2014}, title = {Modeling and Verification of Cooperation Incentive Mechanisms in User-Centric Wireless Communications}, editor = {D. Rawat and B. Bista and G. Yan}, booktitle = {Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications}, publisher = {IGI Global}, pages = {432--461}, doi = {10.4018/978-1-4666-4691-9.ch018}, ) @inproceedings(BFGM, author = {M. ter Beek and A. Fantechi and S. Gnesi and F. Mazzanti}, year = {2008}, title = {An Action/State-Based Model-Checking Approach for the Analysis of Communication Protocols for Service-Oriented Applications}, booktitle = {12th Workshop on Formal Methods for Industrial Critical Systems (FMICS'07)}, series = {LNCS}, volume = {4916}, publisher = {Springer}, pages = {133--148}, doi = {10.1007/978-3-540-79707-4\_11}, ) @inproceedings(Beth94valuationof, author = {T. Beth and M. Borcherding and B. Klein}, year = {1994}, title = {Valuation of Trust in Open Networks}, booktitle = {Conference on Computer Security}, publisher = {Springer}, pages = {3--18}, doi = {10.1.1.50.7349}, ) @inproceedings(EPTCS194.2, author = {L. Bortolussi and De Nicola, R. and V. Galpin and S. Gilmore and J. Hillston and D. Latella and M. Loreti and M. Massink}, year = {2015}, title = {CARMA: Collective Adaptive Resource-sharing Markovian Agents}, editor = {Nathalie Bertrand and Mirco Tribastone}, booktitle = {Procs.~of 13th Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL}, series = {Electronic Proceedings in Theoretical Computer Science}, volume = {194}, pages = {16--31}, doi = {10.4204/EPTCS.194.2}, ) @article(CardelliGordon, author = {L. Cardelli and A. D. Gordon}, year = {2000}, title = {Mobile ambients}, journal = {Theoretical Computer Science}, volume = {240}, number = {1}, pages = {177--213}, doi = {10.1016/S0304-3975(99)00231-5}, ) @article(CSC11, author = {J.-H. Cho and A. Swami and I.-R. Chen}, year = {2011}, title = {A survey on trust management for mobile ad hoc networks}, journal = {Communications Surveys \& Tutorials}, volume = {13}, number = {4}, pages = {562--583}, doi = {10.1109/SURV.2011.092110.00088}, ) @article(Ganeriwal2008, author = {S. Ganeriwal and L. K. Balzano and M. B. Srivastava}, year = {2008}, title = {Reputation-based Framework for High Integrity Sensor Networks}, journal = {ACM Trans. Sen. Netw.}, volume = {4}, number = {3}, pages = {15:1--15:37}, doi = {10.1145/1362542.1362546}, ) @inproceedings(GM82, author = {J. A. Goguen and J. Meseguer}, year = {1982}, title = {Security Policies and Security Models}, booktitle = {IEEE Symposium on Security and Privacy}, pages = {11--20}, doi = {10.1109/SP.1982.10014}, ) @article(Han2014602, author = {G. Han and J. Jiang and L. Shu and J. Niu and H.-C. Chao}, year = {2014}, title = {Management and applications of trust in Wireless Sensor Networks: A survey}, journal = {Journal of Computer and System Sciences}, volume = {80}, number = {3}, pages = {602--617}, doi = {10.1016/j.jcss.2013.06.014}, note = {Special Issue on Wireless Network Intrusion}, ) @inproceedings(He2010, author = {F. He and H. Zhang and H. Wang and M. Xu and F. Yan}, year = {2010}, title = {Chain of Trust Testing Based on Model Checking}, booktitle = {2nd Int.~Conf.~on Networks Security Wireless Communications and Trusted Computing, NSWCTC}, publisher = {IEEE}, pages = {273--276}, doi = {10.1109/NSWCTC.2010.264}, ) @incollection(Jos, author = {J{\o}sang, A.}, year = {2007}, title = {Trust and Reputation Systems}, editor = {A. Aldini and R. Gorrieri}, booktitle = {Foundations of Security Analysis and Design IV (FOSAD'07)}, series = {LNCS}, volume = {4677}, publisher = {Springer}, pages = {209--245}, doi = {10.1007/978-3-540-74810-6\_8}, ) @inproceedings(KSG, author = {S.-D. Kamvar and M.-T. Schlosser and Garcia-Molina, H.}, year = {2003}, title = {The Eigentrust Algorithm for Reputation Management in P2P Networks}, booktitle = {12th Conf.\ on World Wide Web (WWW'03)}, publisher = {ACM}, pages = {640--651}, doi = {10.1.1.11.4846}, ) @article(Kim2009, author = {W.-S. Kim}, year = {2009}, title = {Effects of a Trust Mechanism on Complex Adaptive Supply Networks: An Agent-Based Social Simulation Study}, journal = {Journal of Artificial Societies and Social Simulation}, volume = {12}, number = {3}, pages = {4}, url = {http://jasss.soc.surrey.ac.uk/12/3/4.html}, ) @inproceedings(KPS, author = {M. Kwiatkowska and D. Parker and A. Simaitis}, year = {2013}, title = {Strategic Analysis of Trust Models for User-Centric Networks}, booktitle = {Int.\ Workshop on Strategic Reasoning (SR'13)}, volume = {112}, publisher = {EPTCS}, pages = {53--60}, doi = {10.4204/EPTCS.112.10}, ) @inproceedings(MELA, author = {G. Marion L. Vissat, J. Hillston and M. Smith}, year = {2016}, title = {MELA: Modelling in Ecology with Location Attributes}, booktitle = {Procs.~of 14th Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL}, ) @article(LiKato08, author = {J. Li and R. Li and J. Kato}, year = {2008}, title = {Future trust management framework for mobile ad hoc networks}, journal = {IEEE Communications Magazine}, volume = {46}, number = {4}, pages = {108--114}, doi = {10.1109/MCOM.2008.4481349}, ) @article(LS, author = {Z. Li and H. Shen}, year = {2012}, title = {Game-Theoretic Analysis of Cooperation Incentives Strategies in Mobile Ad Hoc Networks}, journal = {Transactions on Mobile Computing}, volume = {11}, number = {8}, pages = {1287--1303}, doi = {10.1109/TMC.2011.151}, ) @article(MP, author = {F. G. Marmol and G. M. Perez}, year = {2009}, title = {Security Threats Scenarios in Trust and Reputation Models for Distributed Systems}, journal = {Computers and Security}, volume = {28}, number = {7}, pages = {545--556}, doi = {10.1016/j.cose.2009.05.005}, ) @inbook(Momani2010, author = {M. Momani}, year = {2010}, title = {Recent Trends in Network Security and Applications: Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings}, chapter = {Trust Models in Wireless Sensor Networks: A Survey}, pages = {37--46}, publisher = {Springer}, doi = {10.1007/978-3-642-14478-3\_4}, ) @article(Mousa2015, author = {H. Mousa and S. Ben Mokhtar and O. Hasan and O. Younes and M. Hadhoud and L. Brunie}, year = {2015}, title = {Trust management and reputation systems in mobile participatory sensing applications: A survey}, journal = {Computer Networks}, volume = {90}, pages = {49--73}, doi = {10.1016/j.comnet.2015.07.011}, ) @inproceedings(NgaiLyn94, author = {E. C. H. Ngai and M. R. Lyu}, year = {2004}, title = {Trust- and clustering-based authentication services in mobile ad hoc networks}, booktitle = {24th Int.~Conf.~on Distributed Computing Systems Workshops}, publisher = {IEEE}, pages = {582--587}, doi = {10.1109/ICDCSW.2004.1284091}, ) @incollection(eps365559, author = {H. S. Packer and L. Dragan and L. Moreau}, year = {2014}, title = {An auditable reputation service for collective adaptive systems}, editor = {Daniele Miorandi and Vincenzo Maltese and Michael Rovatsos and Anton Nijholt and James Stewart}, booktitle = {Social Collective Intelligence: Combining the Powers of Humans and Machines to Build a Smarter Society}, publisher = {Springer}, pages = {159--184}, url = {http://eprints.soton.ac.uk/365559/}, ) @inproceedings(Reith2007, author = {M. Reith and J. Niu and W. H. Winsborough}, year = {2007}, title = {Apply Model Checking to Security Analysis in Trust Management}, booktitle = {IEEE 23rd Int.~Conf.~on Data Engineering Workshop}, publisher = {IEEE}, pages = {734--743}, doi = {10.1109/ICDEW.2007.4401061}, ) @inproceedings(NordioInfocom2015, author = {A. Tarable and A. Nordio and E. Leonardi and M. G. Ajmone Marsan}, year = {2015}, title = {The Importance of Being Earnest in Crowdsourcing Systems}, booktitle = {IEEE Conference on Computer Communications, INFOCOM}, publisher = {IEEE}, pages = {2821--2829}, doi = {10.1109/INFOCOM.2015.7218675}, ) @article(Xiong2004, author = {L. Xiong and L. Liu}, year = {2004}, title = {PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities}, journal = {IEEE Trans.~on Knowl.~and Data Eng.}, volume = {16}, number = {7}, pages = {843--857}, doi = {10.1109/TKDE.2004.1318566}, ) @inproceedings(Yaich:2012:AST:2245276.2232112, author = {R. Yaich and O. Boissier and P. Jaillon and G. Picard}, year = {2012}, title = {An Adaptive and Socially-Compliant Trust Management System for Virtual Communities}, booktitle = {Proceedings of the 27th Annual ACM Symposium on Applied Computing}, series = {SAC'12}, publisher = {ACM}, pages = {2022--2028}, doi = {10.1145/2245276.2232112}, ) @article(YuLiZL, author = {Y. Yu and K. Li and W. Zhoub and P. Lib}, year = {2012}, title = {Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures}, journal = {Journal of Network and Computer Applications}, volume = {35}, number = {3}, pages = {867--880}, doi = {10.1016/j.jnca.2011.03.005}, ) @article(ZLH, author = {Y. Zhang and L. Lin and J. Huai}, year = {2007}, title = {Balancing Trust and Incentive in Peer-to-Peer Collaborative System}, journal = {Journal of Network Security}, volume = {5}, pages = {73--81}, doi = {10.1.1.148.3767}, ) @article(ZH, author = {R. Zhou and K. Hwang}, year = {2007}, title = {PowerTrust: a Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing}, journal = {Transactions on Parallel and Distributed Systems}, volume = {18}, number = {4}, pages = {460--473}, doi = {10.1109/TPDS.2007.1021}, )