The Role of Trust Management in Distributed Systems Security, Secure Internet Programming: Issues in Distributed and Mobile Object Systems, pp.183-210, 1999. ,
DOI : 10.1007/3-540-48749-2_8
Digital signatures and electronic records, Archival Science, vol.7, issue.2, pp.179-193, 2007. ,
DOI : 10.1007/978-94-015-9375-5
Trustworthy repositories audit & certification: Criteria and checklist, 2008. ,
Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks, IEEE Internet Computing, vol.9, issue.6, pp.35-41, 2005. ,
DOI : 10.1109/MIC.2005.123
Upper and Lower Probabilities Induced by a Multivalued Mapping, The Annals of Mathematical Statistics, vol.38, issue.2, pp.325-339, 1967. ,
DOI : 10.1214/aoms/1177698950
Trustworthy 100-year digital objects, ACM Transactions on Information Systems, vol.22, issue.3, pp.406-436, 2004. ,
DOI : 10.1145/1010614.1010617
Trustworthy 100-year digital objects, ACM Transactions on Information Systems, vol.23, issue.3, pp.299-324, 2005. ,
DOI : 10.1145/1080343.1080346
A survey of trust in internet applications, IEEE Communications Surveys & Tutorials, vol.3, issue.4, 2000. ,
DOI : 10.1109/COMST.2000.5340804
Selection and use of content experts for instrument development, Research in Nursing & Health, vol.20, issue.3, pp.269-274, 1997. ,
DOI : 10.1002/(SICI)1098-240X(199706)20:3<269::AID-NUR9>3.0.CO;2-G
D-S Evidence Theory Based Digital Image Trustworthiness Evaluation Model, 2009 International Conference on Multimedia Information Networking and Security, p.2009, 2009. ,
DOI : 10.1109/MINES.2009.154
A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007. ,
DOI : 10.1016/j.dss.2005.05.019
The Eigentrust algorithm for reputation management in P2P networks, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.640-651, 2003. ,
DOI : 10.1145/775152.775242
Theory of evidence ? A survey of its mathematical foundations, applications and computational aspects, ZOR Zeitschrift f???r Operations Research Mathematical Methods of Operations Research, vol.32, issue.1, pp.35-68, 1994. ,
DOI : 10.1117/12.7973833
Determination and Quantification Of Content Validity, Nursing Research, vol.35, issue.6, p.382, 1986. ,
DOI : 10.1097/00006199-198611000-00017
Development and validation of requirements for evidential value for assessing trustworthiness of digital records over time, Journal of Information, 2011. ,
SSL and TLS: Designing and building secure systems, 2000. ,
Combination of evidence in dempster-shafer theory, 2002. ,
DOI : 10.2172/800792
A Mathematical Theory of Evidence, 1976. ,
Attacks on Trust Evaluation in Distributed Networks, 2006 40th Annual Conference on Information Sciences and Systems, pp.1461-1466, 2006. ,
DOI : 10.1109/CISS.2006.286695
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.419.5646
A formal apparatus for modeling trust in computing environments, Mathematical and Computer Modelling, vol.49, issue.1-2, pp.226-233, 2009. ,
DOI : 10.1016/j.mcm.2008.05.005
A Simple View of the Dempster-Shafer Theory of Evidence and its Implication for the Rule of Combination, AI Magazine, vol.7, issue.2, pp.85-90, 1986. ,
DOI : 10.1142/9789814261302_0033