SINGH A,LIU L.Trustme:anonymuous management of trust relationships in decentralized P2P systems[C]∥Proc of theThird IEEE International Conference on Peer-to-Peer Computing.Atlanta:IEEE,2003:142-149.
[2]
ABERER K,DESPOTOVIC Z.Managing trust in a peer-2-peer information system[C]∥Proc of the Tenth InternationalConference on Information and knowledge Management,Georgia:ACM,2001:310-317.
[3]
REED M,SYERSON P,GOLDSCHLAG D M.Proxies for anonymous routing[C]∥Proc of twelfth Annual ComputerSecurity Applications Conference.San Diego,California:IEEE,1996:95-104.
[4]
SWEENEY L.Achieving k-anonymity privacy protection using generalization and suppression[J].International Journal onUncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):571-588.
[5]
SHERWOOD R,BHATTACHHARJEE B,SRINIVASAN A.A protocol for scalable anonymous communication[C]∥Procof IEEE Symposium on Security and Privacy.Oakland,CA:IEEE,2002:53-65.
[6]
WU Xu,HE Jing-sha,XU Fei.An enhanced trust model based on reputation for P2P networks[C]∥Proc of 2008 IEEEInternational Conference on Sensor Networks,Ubiquitous,and Trustworthy Computing.Taichung,Taiwan:IEEE,2008:67-73.
[7]
FERRAIOLO D,KUHN D R.Role-Based access control[C]∥Proc of the 15th National Computer Security Conference.Baltimore:NIST-NCSC,1992:554-563.
[8]
WU Xu,HE Jing-sha,XU Fei.A group-based reputation mechanism for mobile P2P networks[C]∥Proc InternationalSymposium on Advances in Grid and Pervasive Systems.Heidelberg:Springer Verlag,2009:410-421.