References

  1. A. Aldini (2015): Modeling and Verification of Trust and Reputation Systems. Journal of Security and Communication Networks 8(16), pp. 2933–2946, doi:10.1002/sec.1220.
  2. A. Aldini, B. Bernardo & F. Corradini (2010): A Process Algebraic Approach to Software Architecture Design. Springer, doi:10.1007/978-1-84800-223-4.
  3. A. Aldini & A. Bogliolo (2014): Modeling and Verification of Cooperation Incentive Mechanisms in User-Centric Wireless Communications. In: D. Rawat, B. Bista & G. Yan: Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications. IGI Global, pp. 432–461, doi:10.4018/978-1-4666-4691-9.ch018.
  4. M. ter Beek, A. Fantechi, S. Gnesi & F. Mazzanti (2008): An Action/State-Based Model-Checking Approach for the Analysis of Communication Protocols for Service-Oriented Applications. In: 12th Workshop on Formal Methods for Industrial Critical Systems (FMICS'07), LNCS 4916. Springer, pp. 133–148, doi:10.1007/978-3-540-79707-4_11.
  5. T. Beth, M. Borcherding & B. Klein (1994): Valuation of Trust in Open Networks. In: Conference on Computer Security. Springer, pp. 3–18, doi:10.1.1.50.7349.
  6. L. Bortolussi, R. De Nicola, V. Galpin, S. Gilmore, J. Hillston, D. Latella, M. Loreti & M. Massink (2015): CARMA: Collective Adaptive Resource-sharing Markovian Agents. In: Nathalie Bertrand & Mirco Tribastone: Procs. of 13th Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL, Electronic Proceedings in Theoretical Computer Science 194, pp. 16–31, doi:10.4204/EPTCS.194.2.
  7. L. Cardelli & A. D. Gordon (2000): Mobile ambients. Theoretical Computer Science 240(1), pp. 177–213, doi:10.1016/S0304-3975(99)00231-5.
  8. J.-H. Cho, A. Swami & I.-R. Chen (2011): A survey on trust management for mobile ad hoc networks. Communications Surveys & Tutorials 13(4), pp. 562–583, doi:10.1109/SURV.2011.092110.00088.
  9. S. Ganeriwal, L. K. Balzano & M. B. Srivastava (2008): Reputation-based Framework for High Integrity Sensor Networks. ACM Trans. Sen. Netw. 4(3), pp. 15:1–15:37, doi:10.1145/1362542.1362546.
  10. J. A. Goguen & J. Meseguer (1982): Security Policies and Security Models. In: IEEE Symposium on Security and Privacy, pp. 11–20, doi:10.1109/SP.1982.10014.
  11. G. Han, J. Jiang, L. Shu, J. Niu & H.-C. Chao (2014): Management and applications of trust in Wireless Sensor Networks: A survey. Journal of Computer and System Sciences 80(3), pp. 602–617, doi:10.1016/j.jcss.2013.06.014. Special Issue on Wireless Network Intrusion.
  12. F. He, H. Zhang, H. Wang, M. Xu & F. Yan (2010): Chain of Trust Testing Based on Model Checking. In: 2nd Int. Conf. on Networks Security Wireless Communications and Trusted Computing, NSWCTC. IEEE, pp. 273–276, doi:10.1109/NSWCTC.2010.264.
  13. A. Jøsang (2007): Trust and Reputation Systems. In: A. Aldini & R. Gorrieri: Foundations of Security Analysis and Design IV (FOSAD'07), LNCS 4677. Springer, pp. 209–245, doi:10.1007/978-3-540-74810-6_8.
  14. S.-D. Kamvar, M.-T. Schlosser & H. Garcia-Molina (2003): The Eigentrust Algorithm for Reputation Management in P2P Networks. In: 12th Conf. on World Wide Web (WWW'03). ACM, pp. 640–651, doi:10.1.1.11.4846.
  15. W.-S. Kim (2009): Effects of a Trust Mechanism on Complex Adaptive Supply Networks: An Agent-Based Social Simulation Study. Journal of Artificial Societies and Social Simulation 12(3), pp. 4. Available at http://jasss.soc.surrey.ac.uk/12/3/4.html.
  16. M. Kwiatkowska, D. Parker & A. Simaitis (2013): Strategic Analysis of Trust Models for User-Centric Networks. In: Int. Workshop on Strategic Reasoning (SR'13) 112. EPTCS, pp. 53–60, doi:10.4204/EPTCS.112.10.
  17. G. Marion L. Vissat, J. Hillston & M. Smith (2016): MELA: Modelling in Ecology with Location Attributes. In: Procs. of 14th Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL.
  18. J. Li, R. Li & J. Kato (2008): Future trust management framework for mobile ad hoc networks. IEEE Communications Magazine 46(4), pp. 108–114, doi:10.1109/MCOM.2008.4481349.
  19. Z. Li & H. Shen (2012): Game-Theoretic Analysis of Cooperation Incentives Strategies in Mobile Ad Hoc Networks. Transactions on Mobile Computing 11(8), pp. 1287–1303, doi:10.1109/TMC.2011.151.
  20. F. G. Marmol & G. M. Perez (2009): Security Threats Scenarios in Trust and Reputation Models for Distributed Systems. Computers and Security 28(7), pp. 545–556, doi:10.1016/j.cose.2009.05.005.
  21. M. Momani (2010): Recent Trends in Network Security and Applications: Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings, chapter Trust Models in Wireless Sensor Networks: A Survey, pp. 37–46. Springer, doi:10.1007/978-3-642-14478-3_4.
  22. H. Mousa, S. Ben Mokhtar, O. Hasan, O. Younes, M. Hadhoud & L. Brunie (2015): Trust management and reputation systems in mobile participatory sensing applications: A survey. Computer Networks 90, pp. 49–73, doi:10.1016/j.comnet.2015.07.011.
  23. E. C. H. Ngai & M. R. Lyu (2004): Trust- and clustering-based authentication services in mobile ad hoc networks. In: 24th Int. Conf. on Distributed Computing Systems Workshops. IEEE, pp. 582–587, doi:10.1109/ICDCSW.2004.1284091.
  24. H. S. Packer, L. Dragan & L. Moreau (2014): An auditable reputation service for collective adaptive systems. In: Daniele Miorandi, Vincenzo Maltese, Michael Rovatsos, Anton Nijholt & James Stewart: Social Collective Intelligence: Combining the Powers of Humans and Machines to Build a Smarter Society. Springer, pp. 159–184. Available at http://eprints.soton.ac.uk/365559/.
  25. M. Reith, J. Niu & W. H. Winsborough (2007): Apply Model Checking to Security Analysis in Trust Management. In: IEEE 23rd Int. Conf. on Data Engineering Workshop. IEEE, pp. 734–743, doi:10.1109/ICDEW.2007.4401061.
  26. A. Tarable, A. Nordio, E. Leonardi & M. G. Ajmone Marsan (2015): The Importance of Being Earnest in Crowdsourcing Systems. In: IEEE Conference on Computer Communications, INFOCOM. IEEE, pp. 2821–2829, doi:10.1109/INFOCOM.2015.7218675.
  27. L. Xiong & L. Liu (2004): PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Trans. on Knowl. and Data Eng. 16(7), pp. 843–857, doi:10.1109/TKDE.2004.1318566.
  28. R. Yaich, O. Boissier, P. Jaillon & G. Picard (2012): An Adaptive and Socially-Compliant Trust Management System for Virtual Communities. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC'12. ACM, pp. 2022–2028, doi:10.1145/2245276.2232112.
  29. Y. Yu, K. Li, W. Zhoub & P. Lib (2012): Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications 35(3), pp. 867–880, doi:10.1016/j.jnca.2011.03.005.
  30. Y. Zhang, L. Lin & J. Huai (2007): Balancing Trust and Incentive in Peer-to-Peer Collaborative System. Journal of Network Security 5, pp. 73–81, doi:10.1.1.148.3767.
  31. R. Zhou & K. Hwang (2007): PowerTrust: a Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing. Transactions on Parallel and Distributed Systems 18(4), pp. 460–473, doi:10.1109/TPDS.2007.1021.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org