A. Aldini (2015):
Modeling and Verification of Trust and Reputation Systems.
Journal of Security and Communication Networks 8(16),
pp. 2933–2946,
doi:10.1002/sec.1220.
A. Aldini, B. Bernardo & F. Corradini (2010):
A Process Algebraic Approach to Software Architecture Design.
Springer,
doi:10.1007/978-1-84800-223-4.
A. Aldini & A. Bogliolo (2014):
Modeling and Verification of Cooperation Incentive Mechanisms in User-Centric Wireless Communications.
In: D. Rawat, B. Bista & G. Yan: Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications.
IGI Global,
pp. 432–461,
doi:10.4018/978-1-4666-4691-9.ch018.
M. ter Beek, A. Fantechi, S. Gnesi & F. Mazzanti (2008):
An Action/State-Based Model-Checking Approach for the Analysis of Communication Protocols for Service-Oriented Applications.
In: 12th Workshop on Formal Methods for Industrial Critical Systems (FMICS'07),
LNCS 4916.
Springer,
pp. 133–148,
doi:10.1007/978-3-540-79707-4_11.
T. Beth, M. Borcherding & B. Klein (1994):
Valuation of Trust in Open Networks.
In: Conference on Computer Security.
Springer,
pp. 3–18,
doi:10.1.1.50.7349.
L. Bortolussi, R. De Nicola, V. Galpin, S. Gilmore, J. Hillston, D. Latella, M. Loreti & M. Massink (2015):
CARMA: Collective Adaptive Resource-sharing Markovian Agents.
In: Nathalie Bertrand & Mirco Tribastone: Procs. of 13th Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL,
Electronic Proceedings in Theoretical Computer Science 194,
pp. 16–31,
doi:10.4204/EPTCS.194.2.
L. Cardelli & A. D. Gordon (2000):
Mobile ambients.
Theoretical Computer Science 240(1),
pp. 177–213,
doi:10.1016/S0304-3975(99)00231-5.
J.-H. Cho, A. Swami & I.-R. Chen (2011):
A survey on trust management for mobile ad hoc networks.
Communications Surveys & Tutorials 13(4),
pp. 562–583,
doi:10.1109/SURV.2011.092110.00088.
S. Ganeriwal, L. K. Balzano & M. B. Srivastava (2008):
Reputation-based Framework for High Integrity Sensor Networks.
ACM Trans. Sen. Netw. 4(3),
pp. 15:1–15:37,
doi:10.1145/1362542.1362546.
J. A. Goguen & J. Meseguer (1982):
Security Policies and Security Models.
In: IEEE Symposium on Security and Privacy,
pp. 11–20,
doi:10.1109/SP.1982.10014.
G. Han, J. Jiang, L. Shu, J. Niu & H.-C. Chao (2014):
Management and applications of trust in Wireless Sensor Networks: A survey.
Journal of Computer and System Sciences 80(3),
pp. 602–617,
doi:10.1016/j.jcss.2013.06.014.
Special Issue on Wireless Network Intrusion.
F. He, H. Zhang, H. Wang, M. Xu & F. Yan (2010):
Chain of Trust Testing Based on Model Checking.
In: 2nd Int. Conf. on Networks Security Wireless Communications and Trusted Computing, NSWCTC.
IEEE,
pp. 273–276,
doi:10.1109/NSWCTC.2010.264.
A. Jøsang (2007):
Trust and Reputation Systems.
In: A. Aldini & R. Gorrieri: Foundations of Security Analysis and Design IV (FOSAD'07),
LNCS 4677.
Springer,
pp. 209–245,
doi:10.1007/978-3-540-74810-6_8.
S.-D. Kamvar, M.-T. Schlosser & H. Garcia-Molina (2003):
The Eigentrust Algorithm for Reputation Management in P2P Networks.
In: 12th Conf. on World Wide Web (WWW'03).
ACM,
pp. 640–651,
doi:10.1.1.11.4846.
W.-S. Kim (2009):
Effects of a Trust Mechanism on Complex Adaptive Supply Networks: An Agent-Based Social Simulation Study.
Journal of Artificial Societies and Social Simulation 12(3),
pp. 4.
Available at http://jasss.soc.surrey.ac.uk/12/3/4.html.
M. Kwiatkowska, D. Parker & A. Simaitis (2013):
Strategic Analysis of Trust Models for User-Centric Networks.
In: Int. Workshop on Strategic Reasoning (SR'13) 112.
EPTCS,
pp. 53–60,
doi:10.4204/EPTCS.112.10.
G. Marion L. Vissat, J. Hillston & M. Smith (2016):
MELA: Modelling in Ecology with Location Attributes.
In: Procs. of 14th Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL.
J. Li, R. Li & J. Kato (2008):
Future trust management framework for mobile ad hoc networks.
IEEE Communications Magazine 46(4),
pp. 108–114,
doi:10.1109/MCOM.2008.4481349.
Z. Li & H. Shen (2012):
Game-Theoretic Analysis of Cooperation Incentives Strategies in Mobile Ad Hoc Networks.
Transactions on Mobile Computing 11(8),
pp. 1287–1303,
doi:10.1109/TMC.2011.151.
F. G. Marmol & G. M. Perez (2009):
Security Threats Scenarios in Trust and Reputation Models for Distributed Systems.
Computers and Security 28(7),
pp. 545–556,
doi:10.1016/j.cose.2009.05.005.
M. Momani (2010):
Recent Trends in Network Security and Applications: Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings, chapter Trust Models in Wireless Sensor Networks: A Survey,
pp. 37–46.
Springer,
doi:10.1007/978-3-642-14478-3_4.
H. Mousa, S. Ben Mokhtar, O. Hasan, O. Younes, M. Hadhoud & L. Brunie (2015):
Trust management and reputation systems in mobile participatory sensing applications: A survey.
Computer Networks 90,
pp. 49–73,
doi:10.1016/j.comnet.2015.07.011.
E. C. H. Ngai & M. R. Lyu (2004):
Trust- and clustering-based authentication services in mobile ad hoc networks.
In: 24th Int. Conf. on Distributed Computing Systems Workshops.
IEEE,
pp. 582–587,
doi:10.1109/ICDCSW.2004.1284091.
H. S. Packer, L. Dragan & L. Moreau (2014):
An auditable reputation service for collective adaptive systems.
In: Daniele Miorandi, Vincenzo Maltese, Michael Rovatsos, Anton Nijholt & James Stewart: Social Collective Intelligence: Combining the Powers of Humans and Machines to Build a Smarter Society.
Springer,
pp. 159–184.
Available at http://eprints.soton.ac.uk/365559/.
M. Reith, J. Niu & W. H. Winsborough (2007):
Apply Model Checking to Security Analysis in Trust Management.
In: IEEE 23rd Int. Conf. on Data Engineering Workshop.
IEEE,
pp. 734–743,
doi:10.1109/ICDEW.2007.4401061.
A. Tarable, A. Nordio, E. Leonardi & M. G. Ajmone Marsan (2015):
The Importance of Being Earnest in Crowdsourcing Systems.
In: IEEE Conference on Computer Communications, INFOCOM.
IEEE,
pp. 2821–2829,
doi:10.1109/INFOCOM.2015.7218675.
L. Xiong & L. Liu (2004):
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities.
IEEE Trans. on Knowl. and Data Eng. 16(7),
pp. 843–857,
doi:10.1109/TKDE.2004.1318566.
R. Yaich, O. Boissier, P. Jaillon & G. Picard (2012):
An Adaptive and Socially-Compliant Trust Management System for Virtual Communities.
In: Proceedings of the 27th Annual ACM Symposium on Applied Computing,
SAC'12.
ACM,
pp. 2022–2028,
doi:10.1145/2245276.2232112.
Y. Yu, K. Li, W. Zhoub & P. Lib (2012):
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures.
Journal of Network and Computer Applications 35(3),
pp. 867–880,
doi:10.1016/j.jnca.2011.03.005.
Y. Zhang, L. Lin & J. Huai (2007):
Balancing Trust and Incentive in Peer-to-Peer Collaborative System.
Journal of Network Security 5,
pp. 73–81,
doi:10.1.1.148.3767.
R. Zhou & K. Hwang (2007):
PowerTrust: a Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing.
Transactions on Parallel and Distributed Systems 18(4),
pp. 460–473,
doi:10.1109/TPDS.2007.1021.