[1]Kamver S D, Schlosser M T, GarciaMolina H. The Eigentrust Algorithm for Reputation Management in P2P Networks\[C\]//Proc. of the 12th Int’1 World Wide Web Conference.Hungary:Budapest, ACM Press, 2003: 640651.
[2]李景涛, 荆一楠, 肖晓春, 等.基于相似度加权推荐的P2P环境下的信任模型\[J\]. 软件学报, 2007, 18(1): 157167.
[3]李小勇, 桂小林. 可信网络中基于多维决策属性的信任量化模型\[J\]. 计算机学报, 2009, 32(3): 405416.
[4]宋远骏, 杨孝宗, 李德毅, 等.考虑环境因素的计算机可靠性云模型评价\[J\]. 计算机研究与发展, 2001, 38(5): 631636.
[5]司聿宣,苏远兴,杨正芳. 分布式环境实时语音通讯系统的设计与实现\[J\]. 武汉工程大学学报, 2012, 34(5): 6063.
[6]王守信, 张莉, 李鹤松. 一种基于云模型的主观信任评价方法\[J\]. 软件学报, 2010, 2l(6): 13411352.
[7]Wu D, Mendel J M. A comparative study of ranking methods, similarity measures and uncertainty measures for interval type2 fuzzy sets\[J\]. Information Sciences, 2009, 179(8): 11691192.
[8]Li Deyi, Liu Chang Yu, Gan Wenyan. A new cognitive model: Cloud model \[J\]. International Journal of Intelligent Systems, 2009, 24(4): 357375.
[9]Li Tao. An immunity based network security risk estimation \[J\]. Science in China Series F: Information Sciences, 2005, 48(5): 557578.
[10]Wang Shouxin, Zhang Li, Li Hesong. Evaluation approach of subjective trust based on cloud model\[J\].Journal of Software, 2010, 21(6): 13411352.
[11]Li Deyi, Du Yi. Artificial intelligence with uncertainty \[M\].Beijing: National Defense Industry Press, 2005: 178186.
[12]雷建云,余涵,蒋天发,等. 自动信任协商中的敏感信息保护方案\[J\]. 武汉理工大学学报, 2012,34(3):137140.
[13]田春岐, 邹仕洪, 王文东, 等. 一种基于推荐证据的有效抗攻击P2P网络信任模型\[J\]. 计算机学报, 2008, 31(2): 270281.