用户名: 密码: 验证码:
P2P服务环境中基于社会网络的信任计算研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
P2P网络是一种动态、开放的分布式服务环境,其目标是充分利用Internet环境中各种可能的终端系统进行大规模的协作计算与资源共享。因此,由大规模自由节点匿名参与而形成的P2P服务网络,因其天生具有的系统自组织性、开放性、可扩展性等特性为P2P的发展与应用注入了无限的生机和活力。但是因为节点参与的自发性和自治性,而造成了节点之间缺乏足够的安全信任关系,产生了很多不确定因素而影响到系统安全,出现了不同程度的威胁与攻击。传统的安全技术由于依赖参与节点的正确安全操作而导致其安全机制更加不可靠,也无法解决多元化的互联网应用中匿名节点之间合作所面临的信任和激励问题。
     近几年,信任模型的研究为P2P网络的安全提供了理想的技术参考。信任模型通过对系统中的用户或资源进行评价来预测其未来行为,从而鼓励用户良性行为、打击用户恶意行为、辅助用户决策,已成为当前网络安全研究的热点之一。但是,信任建模和管理面临诸多挑战,如信任的合理形式化、信任在分布环境中的形成与传播、信任路径发现等等。
     本文基于社会网络的研究成果,辅之以博弈理论,从社会学、经济学、心理学和信息学等多学科的交叉,对信任定义进行了整体的把握理解,并针对P2P服务环境特点及其发展趋势,提出了P2P网络信任安全框架以及节点间信任关系的建立、传递、保持、验证和评估体系。
     (1)简要地分析了P2P服务环境特性及其所面临的安全挑战,阐述了社会网络中信任机制的研究以及信任机制在解决P2P服务环境安全问题的优势,介绍了论文研究的意义、研究内容和主要创新点,最后给出了论文的结构框架。
     (2)课题针对P2P网络与信任模型的研究进行了综述分析,提出了“信任计算”的研究体系。信任计算体现了信任的动态、自调整等特征,进一步明确了动态信任计算的研究思路。
     (3)基于社会网络的研究,结合P2P服务环境的特点及未来发展趋势,提出了基于信任计算的网络安全保障体系,并对体系模块进行了详细的功能分析与描述。
     (4)从生态进化的角度,基于社会网络的研究,以进化博弈理论为工具,对网络节点信任行为进行了动力学分析,提出了网络信任动力学和网络生态进化的理论思想。并进一步对信任的动力学方程进行了深入分析,运用复制动态原理分析了节点之间信任关系的演化趋势,进而揭示了信任的演化动力学规律和网络生态进化的稳定性。
     (5)依据信任是社会网络稳定的基础,并且人与人之间的信任关系会不断地更新和传递的原理,首先建立了节点信任的三维计算模型,给出了动态信任计算算法。基于生态网络的能量控制机制,给出了节点能量激励机制,从而可以提高网络安全和网络服务效率。
     (6)基于感知计算与流行病传播模型,从动力学角度分析了分布式网络信任的传播机制。从而为保障信息与网络的安全,提高网络实体之间的合作,促进分布、开放网络的无序、不合作向有序、合作进化奠定理论基础。
     (7)基于社会网络中人际关系的紧缩圈层模型提出了一种金字塔信任管理模型。在模型中,提出了基于小世界的节点聚类算法与金字塔形成算法,形成了类混合P2P网络拓扑结构,建立了金字塔信任管理模型。网络中具有高信任度的节点最终会成为金字塔的顶层结点,类似于“超级节点”的角色实施网络管理行为和接受节点信任委托任务,为目前的信任管理研究与应用提供了一个可参考模型。
     最后,总结了本文的研究工作,分析了研究中的不足,提出了下一步研究工作方向。
     P2P服务环境中基于社会网络的信任计算体系架构、方法、机制,进一步丰富了信任模型的研究框架及内容,为构建新型的网络安全保障体系给出了一个解决方案,所提出的信任计算安全保障体系和信任管理模型为P2P服务环境的应用安全提供了一个很好的理论研究和实际应用的模型环境,而且可以发展成为一种网络智能中间件嵌入到现有Internet网络体系结构中,从而可以保证网络的稳定性、可靠性和有效性。
P2P network is a kind of dynamic,open and distributed services environment.It aims at large scale collaboration computation and resource sharing by making full use of all terminal systems in Interact.But,there some different degree of threats and attacks in interactions between peers will happen.They do not trust each other because of their characteristics of autonomy and spontaneity.The traditional technologies for security are not reliabile because they depend on the right operations of peers,and can not deal with the trust and incentive issues among cooperative anonymious peers in Interact.
     Recently,the trust model is becoming a hotspot of network security research.The research of trust provides the ideal technology to solve the security issues in P2P network. The trust model can forecast the behavior of peers by evaluating trustworthiness of peers or resources,and then encourage good behavior of peers and prevent bad behaviors of them. However,there are a lot of problems to be solved,such as the reasonably formalizing the trust, building and propagating the trust in distributed environment and finding the trust path,etc.
     In this thesis,we redefine the trust based on the social network by analyzing the researches of sociology,economics,psychology and informatics.We propose a trust framework for P2P network security and the system of evaluating,building,propagating, maintaining and validating based on the characters of P2P service environment and its development tendency.
     (1) We briefly overview the characteristic of P2P service environment and the security issues,and expatiate the research of trust in social network and the advantage of trust to solve the security problem in P2P network.Then,we introduce the significance,content,the main innovation and the contracture of our research.
     (2) We propose architecture of trust computing based on the demand of P2P service environment and the comprehensive analysis of trust models provided by some researchers. The trust computing reflects the characteristic of dynamicc and self-adjusting,Therefore,we make definitude of the research of trust computing.
     (3) We propose a security framework based on trust computing of P2P network.And,we detailly describe the functions of each module of the framework.
     (4) We make the dynamics analysis of trust by evolution game based on the evolution of ecological and social network.Then,we provide the theory of trust dynamics and ecological evolution of network.Furthermore,we deeply study the dynamics equations of trust and the evolution tendency of trust relationship among peers by replicator dynamics,and find the evolution law of the trust dynamics and the evolution stability of the network ecology.
     (5) We give an evaluation mechanism of dynamic trust based on the continuous updating and propagating of the trust among persons in social network.And,we propose an incentive model based on the control mechanism of energy in ecological network.With the application of those models,the network security can be enhanced and the service efficiency can be improved.
     (6) Based on the aware computing and the model of epidemics propagation,we analyze the propagation mechanism of trust in distributed networks by dynamics.This work is the foundation of safeguarding the network security,improving the cooperation among peers,and promoting the evolution of open network from out-of-order to order and from noncooperation to cooperation.
     (7) We propose a pyramidal model of trust management based on the model of Jin-Sou-Quan-Ceng in social network.First,we design the algorithms of node clustering based small world and formation of pyramid.By applying these algorithms,we get a topology which resembles the hybrid P2P.Those peers on the top of pyramid resemble the super-peer as managers of network.Therefore,this model takes advantage of centralized and entirely distributed structure of P2P topology.It is an efficient application model to apply in the network for security issues.
     Finally,we summarize the researches of this thesis,and propose the next work in the future.
     The framework,methods and models for trust computing based on the social network presented in this thesis enrich the research of trust model,and provide some novel concepts and methods for network security.The presented trust computing system not only provides a good project to apply in P2P service environment for enhancing the security,but also grows into a network middleware which can be embedded into the current Internet network architecture to promote the efficiency and quality of network services.
引文
[1]G.Fox,"Peer-to-Peer Networks",Computing in Science & Engineering,Vol.3,No.3,2001,pp.75-77.
    [2]D.Ben,"The Power of P2P",Multimedia at Work,Vol.8,No.2,2001,pp.100-103.
    [3]Peer-to-Peer Working Group-Home,http://www.peer-to-peerwg.org/index.html.
    [4]M.Parameswaran,A.Susarla,and A.B.Whinston,"P2P Networking:an Information Sharing Alternative",Computing Practices,Vol.34,No.7,2001,pp.31-38.
    [5]R.Dingldine,M.J.Freedman,and D.Molnar,"Peer-to-Peer:Harnessing the Power of Disruptive Technologies,Chapter 12:Free Haven",O 'Reilly,2001.
    [6]W.S.Ng,B.C.Ooi,K.-L.Tan,and A.Zhou,"PeerDB:A P2P Based System for Distributed Data Sharing",Proceedings of the 19th International Conference on Data Engineering,2003,pp.633-644.
    [7]S.Saroiu,P.K.Gummadi,and S.D.Gribble,"A Measurement Study of Peer-to-Peer File Sharing Systems",Proceedings of Multimedia Computing and Networking,IEEE Society Press,2002,pp.50-59.
    [8]A.Agrawal and H.Casanova,"Clustering Hosts in P2P and Global Computing Platforms",Proceedings of the Third International Workshop on Global and Peer-to-Peer Computing on Large Scale Distributed Systems,ACM Press,2003,pp.367-343.
    [9]Groove,http://www.groove.net.
    [10]Jabber,http://www.jabber.org.
    [11]H.Homayounfar,F.Wang,and S.Areibi,"Advanced P2P Architecture Using Autonomous Agents",Proceedings of the ISCA 15th International Conference on Computer Applications in Industry and Engineering,ACM Press,2002,pp.115-118.
    [12]S.Marsh,"Formalizing Trust as a Computational Concept",Ph.D.Thesis,University of Stirling,1994.
    [13]M.Blaze,J.Feigenbaum,and J.Lacy,"Decentralized Trust Management",Proceedings of the 1996 IEEE Symposium on Security and Privacy,1996,pp.164-173.
    [14]E.Adar and B.A.Huberman,"Free Riding on Gnutella",First Monday,Vol.5,No.10, 2000,pp.2.
    [15]郑纬民,胡进锋,代亚非,袁泉,马永泉,宁宁,董海涛,洪春辉,张桦楠,“对等计算研究概论”,技术发展年度报告,中国计算机学会,2004.
    [16]A.T.Stephanos and S.Diomidis,“A Survey of Peer-to-Peer Content Distribution Technologies”,ACM Computing Surveys,Vol.36,No.4,2004,pp.335-371.
    [17]R.Steinmetz and K.Wehrle,“Peer-to-Peer-Networking & -Computing”,Informatik-Spectrum,Springer,Vol.27,No.1,2004,pp.51-54.
    [18]S.B.Handurukande,A.M.Kermarrec,F.L.Fessant,L.Massoulie,and S.Patarin,“Peer Sharing Behavior in the eDonkey Network,and Implications for the Design of Server-less File Sharing Systems”,Proceeding of the ACM SIGOPS EuroSys Conference,2006.
    [19]M.Feldman,K.Lai,J.Chuang,and I.Stoica,“Quantifying Disincentives in Peer-to-Peer Networks”,Proceeding of the First Workshop on Economics of Peer-to-Peer Systems,Berkeley:Springer-Verlag,LNCS 2735,2003,pp.117-122.
    [20]R.H.Wouhaybi and A.T.Campbell,“Building Resilient Low-diameter Peer-to-Peer Topologies”,Computer Networks,Vol.52,2008,pp.1019-1039.
    [21]S.D.Kamvar,M.T.Schlosser,and H.Garcia-Molina,“The Eigen Trust Algorithm for Reputation Management in P2P Networks”,Proceedings of the 12th International Conference on World Wide Web,ACM Press,2003,pp.640-651.
    [22]M.Yang,“Research on Incentive and Reputation Mechanism in Peer-to-Peer File Sharing System Maze”,Ph.D.Thesis,Peking University,2006.
    [23]R.Guha,R.Kumar,P.Raghavan,and A.Tomkins,“Propagation of Trust and Distrust”,Proceedings of the 13th Conference on World Wide Web,2004,pp.302-412.
    [24]M,Deutsch,“Trust and Suspicion”,The Journal of Conflict Resolution,Vol.2,No.7,1958,pp.265-279.
    [25]G.Caronni,“Walking the Web of Trust”,Proceedings of IEEE 9th International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises,2000,pp.153-158.
    [26]Robert Henner,Michael Abbott,“Java P2P Unleashed”,Sams Publishing,2003.
    [27]窦文,“信任敏感的P2P拓扑构造及其相关技术研究”,博士论文,国防科学技术大学,2003.
    [28]L.Rasmusson and S.Janssen,"Simulated Social Control for Secure Internet Commerce",Proceedings of the 1996 New Security Paradigms Workshop,ACM Press,1996.
    [29]周建国,“紧缩圈层结构论---一项中国人际关系的结构与功能分析”,社会科学研究,2002,2.
    [30]Choon Hoong Ding,Samna Nutanong,and Rajkumar Buyya,"P2P Networks for Content Sharing",Technical Report,GRIDS-TR-2003- 7,Grid Computing and Distributed Systems Laboratory,University of Melbourne,Australia,2003.
    [31]E.K.Lua,J.Crowcroft,M.Pias,R.Sharma,and S.Lim,"A Survey and Comparison of Peer-to-Peer Overlay Network Schemes",IEEE Communications Survey and Tutorials,Vol.7,No.2,2005,pp.72-93.
    [32]P.Druschel and A.Rowstron,"PAST:A Large-Scale Persistent Peer-to-Peer Storage Utility",Proceedings of the 8th Workshop on Hot Topics in Operating Systems,IEEE Press,2001,pp.75-80.
    [33]P.Kalnis,W.S.Ng,B.C.Ooi,D.Papadias,and K.L.Tan,"An Adaptive Peer-to-Peer Network for Distributed Caching of OLAP Results",Proceedings of ACM Conference on Management of Data(ACM SIGMOD),ACM Press,2002,pp.25-36.
    [34]Sun Microsystems Inc,"Project JXTA:An Open,Innovative Collaboration",Project JXTA Documentation,2001,http://download.jxta.org/files/documents/27/15/JXTA-Vision.pdf.
    [35]孙默,武波,“P2P网络安全模型的研究与设计实现”,硕士论文,西安电子科技大学,2005.
    [36]秦益,杨波,“分布式系统中的信任管理研究”,硕士论文,西安电子科技大学,2005.
    [37]田慧蓉,“P2P网络信任模型及激励机制的研究”,博士论文,北京邮电大学,2006.
    [38]H.Homayounfar,F.Wang and S.Areibi,"Andvanced P2P Architecture Using Autonomous Agents",Proceedings of the 15th International Conference on Computer Applications in Industry and Engineering,ACM Press,2002,pp.115-118.
    [39]S.Saroiu,P.K.Gummadi,and S.D.Gribble,"A Measurement Study of Peer-to-Peer File Sharing Systems",Proceedings of Multimedia Computing and Networking(MMCN'02),SPIE Press,2002.
    [40]J.Ledlie,J.Taylor,L.Serban,and M.Seltzer,"Self-Organization in Peer-to-Peer Systems",Proceeding of the Tenth SIGOPS European Workshop,2002.
    [41]Dou Wen,Jia Yan,Liu Zhong,and Zou Peng,"A Simple Constructing Approach to Build P2P Global Computing Overlay Network",Proceedings of the 13th International Conference on Artificial Neural Networks,LNCS 2714,Springer-Verlag,2003,pp.607-614.
    [42]Bob Doyle,"Groove Tool Development",Proceedings of the O'Reilly Peer-to-Peer and Web Services Conference,2001.
    [43]W.T.Sullivan,D.Werthimer,S.Bowyer,J.Cobb,D.Gedye,and D.Anderson,"A New Major SETI Project Based on Project Serendip Data and 100,000 Personal Computers",Proceedings of the Fifth International Conference on Bioastronomy,1997,pp.729.
    [44]J.Kubiatowicz,D.Bindel,Y.Chen,S.Czerwinski,P.Eaton,D.Geels,R.Gummadi,S.Rhea,H.Weatherspoon,W.Weimer,C.Wells,and B.Zhao,"OceanStore:An Architecture for Global-Scale Persistent Storage",Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS),2000,pp.190-201.
    [45]D.S.Milojicic,Vana Kalogeraki,Rajan Lukose,Kiran Nagaraja,Jim Pruyne,Bruno Richard,Sami Rollins,and Zhichen Xu,"Peer-to-Peer Computing",HP Labs:Tech Report:HPL-2002-57Rl,2002.
    [46]Juan Carlos Soto,Mike Duigou,Nelson Minar,"Project JXTA:Introduction and Development",the O'Reilly Peer-to-Peer and Web Services Conference,Washington DC,2001.
    [47]Napster,http://www.napster.com.
    [48]Gnutella,http://www.gnutella.com.
    [49]K.Aberer,P.Cudre-Mauroux,A.Datta,Z.Despotovic,M.Hauswirth,M.Punceva,and Roman Schmidt,"P-Grid:A Self-Organizing Structured P2P System",SIGMOD Record,Vol.32,No.2,September 2003.
    [50]B.Y.Zhao,J.Kubiatowicz,and A.D.Joseph,"Tapestry:An Infrastructure for Fault-tolerant Wide-area Location and Routing",Technical Report No.UCB/CSD-01-1141,University of California Berkeley,2001.
    [51]Ion Stoica,Robert Morris,David Karger,M.Frans Kaashoek,and Hari Balakrishnan, "Chord:A Scalable Peer-to-peer Lookup Service for Internet Applications",Proceeding of ACM SIGCOMM,2001.
    [52]Sylvia Asamy,Paul Francis,Mark Handley,Richard Karp,and Scott Shenker,"A Scalable Content-Addressable Network",Proceedings of ACM SIGCOMM2001,2001.
    [53]Antony Rowstron and Peter Druschel,"Pastry:Scalable,Decentralized Object Location and Routing for Large-Scale Peer-to-Peer Systems",Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms(Middleware 2001),2001,pp.329-350.
    [54]C.Creg Plaxton,Rajmohan Rajararnan,and Andrea W.Richa,"Accessing Nearby Copies of Replicated Objects in a Distributed Environment",Proceedings of ACM Symposium on Parallel Algorithms and Architectures,June 1997.
    [55]KaZaa.http://www.kazaa.com.
    [56]J.Liang,N.Naoumov,and K.W.Ross,"The Index Poisoning Attack in P2P File-sharing Systems",Proceedings of INFOCOM'06,2006.
    [57]R.Sylvia,S.Scott,and S.Ion,"Routing Algorithms for DHTs:Some Open Questions",Proceedings of the 1st International Workshop on Peer-to-Peer Systems,2002
    [58]S.Emil and M.Robert,"Security Considerations for Peer-to-Peer Distributed Hash Tables",Proceedings of the 1st International Workshop on Peer-to-Peer Systems,2002.
    [59]孙伟正,赵建芳,“信任研究的哲学思考--基于不同学科视角的分析”,石家庄学院学报,2006,8(2):14-19.
    [60]D.H.McKnight and N.L.Chervany,"The Meanings of Trust",Technical Report MISRC Working Paper Series 96-04,University of Minnesota,Management Information Systems Research Center,1996.
    [61]A.Abdul-Rahman and S.Hailes,"Supporting Trust in Virtual Communities",Proceeding of the Hawaii International Conference on System Sciences,2000.
    [62]杨中芳,彭泗清,“中国人人际信任的概念化:一个人际关系的观点”,社会学研究,1999,2.
    [63]J.B.Rotter,"A New Scale for The Measurement of Interpersonal Trust",Journal of Personality,Vol.35,No.4,1967,pp.651-665.
    [64]L.S.Wrightsman,"Assumptions about Human Nature:Implications for Researchers and Practitioners",Newbury Park,CA:Sage Publications,1992.
    [65]C.F.Sabel,"Studied Trust:Building New Forms of Cooperation in a Volatile Economy",Human Relations,Vol.46,No.9,1993,pp.1133-1170.
    [66]M.Deutsch,"The Resolution of Conflict:Constructive and Destructive Processes",New Haven and London:Yale University Press,1973.
    [67]D.Gambetta,"Trust",Oxford,Blackwell,1990.
    [68]T.Grandison and M.Sloman,"A Survey of Trust in Internet Applications",IEEE Communications Survey,Vol.3,No.4,2000,pp.2-16.
    [69]D.H.McKnight and N.L.Chervany,"The Meanings of Trust",Technical Report 94-04,Carlson School of Management,University of Minnesota,1996.
    [70]A.Abdul-Rahrnan and S.Hailes,"A Distributed Trust Model",Proceedings of the 1997New Security Paradigms Workshop,ACM Press,1998,pp.48-60.
    [71]沙赢,白硕,当前公开密钥基础设施的主要问题分析,微电子学与计算机,2002,6:18-21.
    [72]D.Krackhardt,M.Lundberg,and L.O.Rourke,"KrackPlot:A Picture's Worth a Thousand Words",Connections,Vol.16,No.1&2,1993,pp.37-47.
    [73]S.Wasserman and K.Faust,"Social Network Analysis:Methods and Applications",Cambridge University Press,1994.
    [74]L.Mui,M.Mohtashemi,and A.Halberstadt,"A Computational Model of Trust and Reputation",Proceedings of the 35th Hawaii International Conference on System Sciences,2002.
    [75]Y.Wang and J.Vassileva,"Bayesian Network-Based Trust Model",Proceedings of IEEE/WIC International Conference on Web Intelligence(WI'2003),2003,pp.372-378.
    [76]L.Mui,A.Halberstadt,and M.Mohtashemi,"Notions of Reputation in Multi-agent Systems:A Review",Proceedings of the First International Joint Conference on Autonomous Agents & Multi-agent Systems(AAMAS),July 2002.
    [77]Paul Resnick,Richard Zeckhauser,Eric Friedman,and Ko Kuwabara,"Reputation Systems",Communications of the ACM,Vol.43,No.12,2000,pp.45-48.
    [78]C.Duma,N.Shahmehri,and G.Caronni,"Dynamic Trust Metrics for Peer-to-Peer Systems",Proceedings of 2nd IEEE Workshop on P2P Data Management,Security and Trust,2005.
    [79]D.Gambetta,"Can We Trust Trust?" In:Gambetta,D.,ed.Trust:Making and Breaking Cooperative Relations.Basil Blackwell:Oxford Press,1990,pp.213-237.
    [80]T.Beth,M.Borcherding,and B.Klein,"Valuation of Trust in Open Network",Proceedings of the European Symposium on Research in Security,1994.
    [81]A.Jφsang and R.Ismail,"The Beta Reputation System",Proceedings of the 15th Bled Electronic Commerce Conference,2002.
    [82]Y.Wang and J.Vassileva,"Bayesian Networks-Based Trust Model",Proceedings of IEEE/WIC International Conference on Web Intelligence,2003,pp.372.
    [83]A.Jφsang,"The Right Type of Trust for Distributed Systems",Proceedings of the 1996New Security Paradigms Workshop,ACM Press,1996.
    [84]A.Jφsang,"A Model for Trust in Security Systems",Proceedings of the 2nd Nordic Workshop on Secure Computer Systems,1997.
    [85]A.Jφsang and S.J.Knapskog,"A Metric for Trusted Systems",Global IT Security,Wien:Austrian Computer Society,1998,pp.541-549.
    [86]A.Jφsang,"A Sybjective Metric of Authentication",Proceedings of the ESORICS'98,Springer Verlag,1998,pp.329-344.
    [87]B.Yu and M.P.Singh,"An Evidential Model of Distributed Reputation Management",Proceedings of First International Joint Conference on Autonomous Agents and Multi-Agent System,2002,pp.294-301.
    [88]D.W.Manchala,"E-Commerce Trust Metrics and Models",IEEE Internet Computing,Vol.4,No.2,2000,pp.36-44.
    [89]J.Sabater and C.Sierra,"Reputation and Social Network Analysis in Multi-Agent Systems",Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems,2002.
    [90]D.Kaur and Dominic Wilson,"Trust Evaluation within a Type-2 Fuzzy Logic Framework",Proceedings of the International Joint Conference on Neural Networks IJCNN and IEEE International Conference on Fuzzy Systems,IEEE-FUZZ 2004,Budapest,Hungary,2004,pp.203-208.
    [91]Giorgos Zacharia and Pattie Maes,"Trust Management through Reputation Mechanisms", Applied Artificial Intelligence,Vol.14,No.9,2000,pp.881-907.
    [92]张骞,张霞,文学志,刘积仁,Ting Shan,Peer-to-Peer环境下多粒度Trust模型构造,软件学报,2006,17(1):96-107.
    [93]M.Blaze,J.Feigenbaum,and M.Strauss,"Compliance Checking in the PolicyMaker Trust Management System",Proceedings of the Financial Cryptography '98,LNCS,1165,1998,pp.254-274.
    [94]M.Blaze,J.Feigenbaum,and A.D.Keromytis,"KeyNote:Trust Management for Public-Key Infrastructures",Cambridge 1998 Security Protocols International Workshop,Cambridge,England:Springer,1998,pp.59-63.
    [95]Y.H.Chu,J.Feigenbaum,B.LaMacchia,P.Resnick,and M.Strauss,"REFEREE:Trust Management for Web Applications",World Wide Web Journal,Vol.2,No.2,1997,pp.127-139.
    [96]N.li,J.C.Mitchell,and W.F.Winsborough,"Design of a Role-Based Trust-Management Framework",Proceedings of the 2002 IEEE Symposium on Security and Privacy,IEEE Computer Society,2002.
    [97]B.Yu and M.P.Singh,"Detecting Deception in Reputation Management",Proceedings of Second International Joint Conference on Autonomous Agents and Multi-Agent Systems,2003,pp.73-80.
    [98]P.Yau and C.T.Mitchell,"Reputation Methods for Routing Security for Mobile Ad Hoc Networks",Proceedings of SympoTIC'03,Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications,IEEE Press,Bratislava,2003,pp.130-137.
    [99]C.Keser,"Experimental Games for the Design of Reputation Management Systems",IBM Systems Journal,Vol.42,No.3,2003,pp.498-506.
    [100]V.Buskens and J.Weesie,"Cooperation via Social Networks",Analyse & Kritik,Vol.22,2000,pp.44-74.
    [101]H.Miranda and L.Rodrigues,"Friends and Foes:Preventing Selfishness in Open Mobile Ad Hoc Networks",Proceedings of the First International Workshop on Mobile Distributed Computing(MDC'03),IEEE Computer Society Press,2003.
    [102]S.Fahnrich,P.Obreiter,and B.Konig-Ries,"The Buddy System:A Distributed Reputation System Based On Social Structure",Proceedings of the First International Workshop on Data Management in Mobile Environments,2004.
    [103]E.Damiani,D.C.di Vimercati,S.Paraboschi,P.Samarati,and F.Violante,"A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks",Proceedings of the 9th ACM Conference on Computer and Communications Security,2002.
    [104]K.Aberer and Z.Despotovic,"Managing Trust in a Peer-to-Peer Infromation System",Proceedings of the JX International Conference on Information and Knowledge Management,Atlanta,Georgia,2001.
    [105]S.Lee,R.Sherwood,and B.Bhattacharjee,"Cooperative Peer Groups in NICE",Proceedings of lEEE Infocom '03,2003.
    [106]L.Xiong and L.Liu,"PeerTrust:Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities",IEEE Transactions on Knowledge and Data Engineering,Vol.16,No.7,2004,pp.843-857.
    [107]S.Song,K.Hwang,R.Zhou and Y.K.Kwok,"Trusted P2P Transactions with Fuzzy Reputation Aggregation",IEEE Internet Computing,Vol.9,No.6,2005,pp.24-34.
    [108]Z.Q.Liang and W.S.Shi,"PET:A Personalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing",Proceedings of the 38th Hawaii International Conference on System Science,2005.
    [109]J.Sabater and C.Sierra,"Reputation and Social Network Analysis in Multi-Agent Systems",Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems,2002.
    [110]J.Pujol and R.Sanguesa,"Extracting Reputation in Multi-Agent Systems by Means of Social Network Topology",Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems,2002.
    [111]D.E.Houser and J.Wonders,"Reputation in Auctions:Theory and Evidence from eBay",Journal of Economics and Management Strategy,Vol.15,No.2,2006,pp.353-369.
    [112]M.T.Schlosser,T.E.Condie,and S.D.Kamvar,"Simulating a File-Sharing P2P Network",Proceedings of First Workshop on Semantics in P2P and Grid Computing (SemPGRID'03),2003,pp.69-80.
    [113]C.Dellarocas,"Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior",Proceedings of the 2nd ACM Conference on Electronic Commerce,2000.
    [114]C.Dellarocas,"Building Trust On-Line:The Design of Robust Reputation Mechanisms for Online Trading Communities",Information Society or Information Economy,2004,pp.95-113.
    [115]R.Jurca and B.Faltings,"An Incentive Compatible Reputation Mechanism",Proceedings of IEEE International Conference on E-Commerce,2003.
    [116]R.Gupta and A.K.Somani,"Reputation Management Framework and Its Use as Currency in Large-Scale Peer-to-Peer Networks",Proceedings of TEEE International Conference on Peer-to-Peer Computing,2004.
    [117]F.Azzedin and M.Maheswaran,"Towards Trust-Aware Resource Management in Grid Computing Systems",Proceedings of the 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid,2002.
    [118]G.Zacharia,A.Moukas,and P.Maes,"Collaborative Reputation Mechanisms in Electronic Marketplaces",Proceedings of the 32nd Annual Hawaii International Conference on System Sciences(HICSS'32),1999.
    [119]蒋兴浩,基于PKI机制的对等网信任管理问题研究,博士论文,浙江大学,2002.
    [120]刘鹏,刘欣,陈钟,信任管理研究综述,计算机工程与应用,2004,40(32):39-43.
    [121]程男男,杨波,信任管理中的模型设计和安全性分析,硕士论文,西安电子科学大学,2005.
    [122]袁时金,信任管理关键技术研究,博士论文,复旦大学,2004.
    [123]F.Cornelli,E.Damiani,S.D.C.di Vimercati,S.Paraboschi,and P.Samarati,"Choosing Reputable Servents in a P2P Network",Proceedings of WWW2002,ACM Press,Honolulu,Hawaii,USA,2002.
    [124]F.Cornelli,E.Damiani,S.De Capitani di Vimercati,S.Paraboschi,and P.Samarati,"Choosing Reputable Servents in a P2P network",Proceedings of the 7th International World Wide Web Conference,2002.
    [125]D.Prashant and D.Partha,"PRIDE:Peer-to-Peer Reputation Infrastructure for Decentralized Environments",Proceedings of the 13th International World Wide Web Conference(WWW2004),New York,2004.
    [126]A.Singh and L.Liu,"TrustMe:Anonymous Managemet of Trust Relationships in Decentralized P2P Systems",Proceedings of the 3rd IEEE International Conference on Peer-to-Peer Computing,2003.
    [127]Shalendra Chhabra,Ernesto Damiani,Sabrina De Capitani di Vimercati,Stefano Paraboschi,and Pierangela Samarati,"A Protocol for Reputation Management in Super-Peer Networks",Proceedings of the 15th International Workshop on Database and Expert Systems Applications,2004.
    [128]Tyson Condie,Sepandar D.Kamvar,and Hector Gareia-Molina,"Adaptive Peer-to-Peer Topologies",Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P'04),2004.
    [129]郑也夫,信任论,中国广播出版社,2001,15-18.
    [130]F.Stajano,"Security for Ubiquitous Computing",Wiley,2002,pp.110-111.
    [131]J.M.Seigneur,S.Farrell,and C.D.Jensen,"Secure Ubiquitous Computing Based on Entity Recognition",Proceedings of the Ubicomp '02 Security Workshop,2002.
    [132]J.M.Seigneur,S.Farrell,C.D.Jensen,E.Gray,and C.Yong,"End-to-End Trust in Pervasive Computing Starts with Recognition",Proceedings of the First International Conference on Security in Pervasive Computing,2003.
    [133]ITU:Information Technology-Opens Systems Interconnection-The Directory:Authentication Framework.Number X.509 in ITU-T Recommendation.International Telecommunication Union,1993.
    [134]J.Kohl and B.Neuman,"The Kerberos Network Authentication Service(Version 5)",RFC1510,IETF,1993.
    [135]M.Gupta,P.Judge,and M.Ammar,"A Reputation System for Peer-to-Peer Networks",Proceedings of the 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video,ACM Press,2003.
    [136]M.Kinateder and S.Pearson,"A Privacy-Enhanced Peer-to-Peer Reputation System".Proceedings of the 4th International Conference on Electronic Commerce and Web Technologies,LNCS 2378,Springer,2003.
    [137]A.Selcuk,E.Uzun,and M.R.Pariente,"A Reputation-Based Trust Management System for P2P Networks".Proceedings of the Fourth International Workshop on Global and Peer-to-Peer Computing,2004.
    [138]R.Want,A.Hopper,V.Falcao,and J.Gibbons,"The Active Badge Location System",ACM Transactions on Information Systems,Vol.10,No.1,1992,pp.91-102.
    [139]刘凤鸣,丁永生,基于生态网络的P2P环境信任博弈进化模型,计算机工程与应用,2007,3(23):24-27.
    [140]刘凤鸣,丁永生,基于进化博弈的P2P网络中信任计算的动力学分析,计算机应用研究,2008.(In Press)
    [141]G.Szabσ and G.F(?)th,"Evolutionary Games on Graphs",Physics Reports,Vol.446,No.4-6,2007,pp.97-216.
    [142]H.Ohtsuki,C.Hauert,E.Lieberman,and M.A.Nowak,"A Simple Rule for the Evolution of Cooperation on Graphs and Social Networks",Nature,Vol.441,2006,pp.502.
    [143]M.A.Nowak and K.Sigmund,"Evolution of Indirect Reciprocity",Nature,Vol.437,2006,pp.1291.
    [144]M.A.Nowak,"Five Rules for the Evolution",Science,Vol.314,2006,pp.1560.
    [145]S.Bowles,"Group Competition,Reproductive Leveling,and the Evolution of Human Altruism",Science,Vol.314,2006,pp.1569.
    [146]R.Boyd,"The Puzzle of Human Sociality",Science,Vol.314,2006,pp.1555.
    [147]A.Traulsen and M.A.Nowak,"Evolution of Cooperation by Multilevel Selection",PNAS,Vol.103,No.29,2006,pp.10952-10955
    [148]J.M.Smith,"Evolution and the Theory of Games",Cambridge University Press,Cambridge,1982.
    [149]R.Axelrod and W.D.Hamilton,"The Evolution of Cooperation",Science,Vol.211,1981,pp.1390.
    [150]R.Axelrod,"The Evolution of Cooperation",Basic Books,New York,1984.
    [151]J.M.Smith and E.Szathm(?)ry,"The Major Transitions in Evolution",W.H.Freeman,Oxford,UK,1995.
    [152]J.W.Weibull,"Evolutionary Game Theory",MTT Press,Cambridge,MA,1995.
    [153]J.Hotbauer and K.Sigmund,"Evolutionary Games and Population Dynamics", Cambridge University Press,Cambridge,1998.
    [154]J.Von Neumann and O.Morgenstern,"Theory of Games and Economic Behavior",Princeton University Press,Princeton,NJ,1953.
    [155]R.Cressman,"Evolutionary Dynamics and Extensive Form Games",MIT Press,Cambridge,MA,2003.
    [156]L.A.Dugatltin,"Cooperation among Animals:An Evolutionary Perspective",Oxford University Press,Oxford,1997.
    [157]H.Gintis,"Game Theory Evolving",Princeton University,Princeton,NJ,2000.
    [158]A.M.Colman,"Game Theory and Its Applications in the Social and Biological Sciences",Butterworth-Heinemann,Oxford,1995.
    [159]B.Skyrms,"The Stag Hunt and the Evolution of Social Structure",Cambridge University Press,Cambridge,England,2004.
    [160]K.G.Binmore,"Playing Fair:Game Theory and the Social Contract",MIT Press,Cambridge,1994.
    [161]J.M.Smith,and G.R.Price,"The Logic of Animal Conflict",Nature,Vol.246,1973,15.
    [162]M.A.Nowak and R.M.May,"Evolutionary Games and Spatial Chaos",Nature,Vol.359,1992.pp.826.
    [163]M.A.Nowak and R.M.May,"The Spatial Dilemmas of Evolution",International Journal of Bifurcation and Chaos 3,1993,pp.35-78.
    [164]M.A.Nowak,S.Bonhoeffer,and R.M.May,"More Spatial Games",International Journal of Bifurcation and Chaos 4,1994,pp.33-56.
    [165]A.V.M.Herz,"Collective Phenomena in Spatially Extended Evolutionary Games",Journal of Theoretical Biology,Vol.169,No.1,1994,pp.65-87.
    [166]P.E.Turner and L.Chao,"Prisoner's Dilemma in an RNA Virus",Nature,Vol.398,1999,pp.441.
    [167]R.Dawkins,"The Selfish Gene",Oxford University Press,Oxford,1989.
    [168]M.A.Nowak,A.Sasaki,C.Taylor and D.Fudenberg,"Emergence of Cooperation and Evolutionary Stability in Finite Populations",Nature,Vol.428,2004,pp.646.
    [169]M.A.Nowak and K.Sigmund,"Evolutionary Dynamics of Biological Games",Science,Vol.303,2004,pp.793.
    [170]A.Alchian."Uncertainty,Evolution,and the Economic Theory",The Journal of Political Economy,Vol.58,No.3,1995,pp.211-221.
    [171]P.D.Taylor and L.B.Jonker,"Evolutionarily Stable Strategies and Game Dynamics",Mathematical Biosciences,No.40,1978,pp.145-156.
    [172]J.Berg and J.Dickhaut,and K.Mccabe,"Trust,Reciprocity,and Social History",Games and Economic Behavior,Vol.10,No.1,1995,pp.122-142.
    [173]K.A.McCabe,M.L.Rigdon,and V.L.Smith,"Positive Reciprocity and Intentions in the Trust Game",Journal of Economic Behavior and Organization,No.52,2003,pp.267-275.
    [174]R.Boyd and J.Lorberbaum,"No Pure Strategy is Evolutionarily Stable in the Repeated Prisoner's Dilemma Game",Nature,Vol.327,1987,pp.58-59.
    [175]L.Keller and H.K.Reeve,"Familiarity Breeds Cooperation",Nature,Vol.394,1998,pp.121-122.
    [176]A.Lotem,M.A.Fishman,and L.Stone,"Evolution of Cooperation between Individuals",Nature,Vol.440,1999,pp.226-227.
    [177]H.J.Holm and P.Nystedt,"Trust in Surveys and Games---a Matter of Money and Location?" Working Paper 26,Lund University,2005.
    [178]J.Engle-Wamick and R.L.Slonim,"The Evolution of Strategies in a Repeated Trust Game",Journal of Economic Behavior and Organization,No.55,2004,pp.553-573.
    [179]O.Johansson-Stenman,M.Mahmud,and P.Martinsson,"Does Stake Size Matter in Trust Games?" Economic Letters,Vol.88,No.3,2005,pp.365-369.
    [180]I.Bohnet and D.K(u|¨)bler,"Compensating the Cooperators:Is Sorting Possible in the Prisoner's Dilemma Game?" Journal of Economic Behavior and Organization,Vol.56,No.1,2005,pp.61-76.
    [181]M.J.Osborne and A.Rubenstein,"A Course in Game Theory",Cambridge,Massachusetts:The MIT Press,1994.
    [182]K.Ranganathan,M.Ripeanu,A.Sarin,and I.Foster,"To Share or Not to Share:An Analysis of Incentives to Contribute in File Sharing Environments",Proceedings of the First International Workshop on Economics of Peer to Peer Systems,2003.
    [183]A.Blanc,Y.K.Liu,and A.Vahdat,"Designing Incentives for Peer-to-Peer Routing", Proceedings of the 2nd Workshop on on Economics of Peer to Peer Systems,2004.
    [184]C.Buragohain,D.Agrawal,and S.Suri,"A Game Theoretic Framework for Incentives in P2P Systems",Proceedings of the 3rd International Conference Peer-to-Peer Computing,IEEE Computer Society Press,2003.
    [185]J.S.Baras and Tao Jiang,"Cooperation,Trust and Games in Wireless Networks",Proceedings of Symposium on Systems,Control and Networks,2005.
    [186]M.Felegyhazi,L.Buttyan,and J.P.Hubaux,"Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks---the Static Case",Proceedings of Personal Wireless Communications(PWC'03),2003.
    [187]J.S.Baras and Tao Jiang,"Cooperative Games,Phase Transitions on Graphs and Distributed Trust in MANET",Proceedings of the IEEE CDC,2004.
    [188]H.Ebel and S.Bornholdt,"Coevolutionary Games on Networks",Physical Review E,Vol.66,No.5,2002,pp.056118.
    [189]皋磊,基于生态网络的下一代Internet资源动态服务的研究,博士论文,东华大学,2005.
    [190]R.B.Myerson."Game Theory:Analysis of Conflict",Harvard University Press,Cambridge,Massachusetts,1991.
    [191]S.Weeks "Understanding Trust Management Systems",Proceedings of the 2001 IEEE Symposium on Security and Privacy,IEEE Computer Society Press,2001,pp.94-105.
    [192]F.Xu and J.L(u|¨),"Research and Development of Trust Management in Web Security",Journal of Software,2002,13(11):2057-2064.
    [193]E.Chang,P.Thomson,T.Dillon,and F.Hussain,"The Fuzzy and Dynamic Nature of Trust",LNCS 3592.Berlin:Springer-Verlag,2005,pp.161-174.
    [194]E.Koutrouli and A.Tsalgatidou,"Reputation-Based Trust Systems for P2P Applications:Design Issues and Comparison Framework",LNCS 4083,2006,pp.152-161.
    [195]S.Ruohomaa and L.Kutvonen,"Trust Management Survey",LNCS 3477.Berlin:Springer-Verlag,2005,pp.77-92.
    [196]S.Song,K.Hwang,R.Zhou,and Y.K.Kwok,"Trusted P2P Transactions with Fuzzy Reputation Aggregation",IEEE Internet Computing,Vol.9,No.6,2005,pp.24-34.
    [197]F.Almenarez,A.Marin,D.Diaz,and J.Sanchez,"Developing a Model for Trust Management in Pervasive Devices",Proceedings of the 3rd IEEE International Workshop on Pervasive Computing and Communication Security(PerSec 2006),IEEE Computer Society Press,2006,pp.267-272.
    [198]F.Almenarez,A.Marin,C.Campo,and R.C.Garcia,"PTM:A Pervasive Trust Management Model for Dynamic Open Environments",Proceedings of the 1st Workshop on Pervasive Security,Privacy and Trust,2004.
    [199]F.Almenarez,A.Marin,C.Campo,and R.C.Garcia,"TrustAC:Trust-Based Access Control for Pervasive Devices",LNCS 450,Berlin:Springer-Verlag,2005,pp.225-238.
    [200]郑师章等,普通生态学-原理、方法和应用,上海:复旦大学出版社,1994.
    [201]张向锋,任立红,皋磊,丁永生,生态网络仿真平台的能量管理服务,计算机工程与应用,2003,31:145-148.
    [202]S.Saroiu,P.K.Gummadi,and S.D.Gribble,"A Measurement Study of Peer-to-Peer File Sharing Systems",Proceedings of the Multimedia Computing and Networking 2002,2002.
    [203]G.Philippe,L.B.Kevin,M.Hya,and L.Mark,"Incentives for Sharing in Peer-to-Peer Networks",Proceedings of the ACM Conference on Electronic Commerce,2001,pp.264-267.
    [204]B.Yang and H.G.Molina,"Micropayments for Peer-to-Peer Systems",Proceedings of the 10th ACM Conference on Computer and Communications Security,ACM Press,2003,pp.300-310.
    [205]J.Ioannidis,S.Ioannidis,A.D.Keromytis,and V.Prevelakis,"Fileteller:Paying and Getting Paid for File Storage",Proceedings of the 6th Annual Conference on Financial Cryptography,2002,pp.282-299.
    [206]S.D.Karnvar,M.T.Shlosser,and H.Garcia-Molina,"Incentives for Combatting Freeriding on P2P Networks",In Euro-Par 2003,June,2003.
    [207]R.T.B.Ma,S.C.M.Lee,J.C.S.Lui,and D.K.Y.Yau,"An Incentive Mechanism for P2P Networks",Proceedings of the 24th International Conference Distributed Computing Systems,2004,pp.516-523.
    [208]Q.Sun and H.Garcia-Molina,"SLIC:A Selfish Link-Based Incentive Mechanism for Unstructured Peer-to-Peer Networks",Proceedings of the 24th International Conference on Distributed Computing Systems,2004,pp.506-515.
    [209]K.Lai,M.Feldman,I.Stoica,and J.Chuang,"Incentives for Cooperation in Peer-to-Peer Networks",Workshop on Economics of P2P Systems,2003.
    [210]M.Feldman,K.Lai,I.Stoica,and J.Chuang,"Robust Incentive Techniques for Peer-to-Peer Networks",Proceedings of the 5th ACM Conference on Electronic Commerce,2004.
    [211]J.Jiang,H.Bai,and W.Wang,"Trust and Cooperation in Peer-to-Peer Systems",Proceedings of the 2nd Workshop on Grid and Cooperative Computing,2003.
    [212]S.Jun and M.Ahamad,"Incentives in BitTorrent Induce Free Riding",Proceedings of the ACM SIGCOMM.Workshop on Economics of Peer-to-Peer Systems(P2PECON),2005.
    [213]刘凤鸣,丁永生,一种P2P网络服务环境的信任度计算模型,计算机应用,2008,28(03):623-625.
    [214]李小勇,桂小林,大规模分布式环境下动态信任模型研究,软件学报,2007,18(6):1510-1521.
    [215]C.E.Shannon,"A Mathematical Theory of Communication",Bell System Technical Journal,Vol.27,1948,pp.379-423&623-656.
    [216]Fengming Liu and Yongsheng Ding,"Ecological Network-Inspired Trust Management Model of P2P Networks",Proceedings of the 2nd Workshop on Digital Media and its Application in Museum & Heritage(DMAMH'2007),IEEE Computer Society Press,Dec 2007,pp.297-302.
    [217]任立红,丁永生,一种新颖的基于生态网络计算的网络仿真平台,系统仿真学报,2002,14(11):1497-1499.
    [218]丁永生,任立红,一种基于免疫突现计算的生物网络结构的设计,控制与决策,2003,18(2):185-189.
    [219]The Foundation for Physical Agents,http://www.fipa.org/.
    [220]C.Gutwin and S.Greenberg,"Workspace Awareness",Proceedings of CHI'97Workshop on Awareness in Collaborative Systems,1997.
    [221]P.Dourish and V.Bellotti,"Awareness and Coordination in Shared Workspace",Proceedings of Conference on Computer Supported Cooperative Work,1992,pp.107-114.
    [222]M.Endsley,"Toward a Theory of Situation Awareness in Dynamic Systems",Human Factors,Vol.37,No.1,1995,pp.32-64.
    [223]W.Keith Edwards,"Coordination Infrastructure in Collaborative Systems",Ph.D.Thesis,Georgia Institute of Technology,College of Computing,1995.
    [224]M.L.Minsky,"Theory of Neural-Analog Reinforcement Systems and Its Application to the Brain-Model Problem",Ph.D.Thesis,Princeton University,1954.
    [225]A.Onat,N.Kosino,M.Kuramitu,and H.Kita,"Reinforcement Learning under Incomplete Perception Using Stochastic Gradient Ascent and Recurrent Neural Networks",Proceedings of the IEEE International Conference on Systems,Man and Cybernetics,1999,pp.481-486.
    [226]J.Peng and B.Bhanu,"Delayed Reinforcement Learning for Adaptive Image Segmentation and Feature Extraction",IEEE Transactions on Systems Man,and Cybernetics Part C,Vol.28,No.3,1998,pp.482-488.
    [227]N.T.J.Bailey,"The Mathematical Theory of Infectious Diseases and Its Applications",New York:Hafner Press,1975.
    [228]R.M.Anderson and R.M.May,"Infectious Diseases of Humans",Oxford:Oxford University Press,1991.
    [229]M.Barth(?)lemy,A.Barrat,R.Pastor-Satorras,and A.Vespignani,"Velocity and Hierarchical Spread of Epidemic Outbreaks in Scale-Free Networks",Physical Review Letters,Vol.92,2004,pp.178701.
    [230]R.Pastor-Satorras and A.Vespignani,"Epidemic Spreading in Scale-Free Networks",Physical Review Letters,Vol.86,2001,pp.3200-3203.
    [231]Y.Moreno,R.Pastor-Satorras,and A.Vespignani,"Epidemic Outbreaks in Complex Heterogeneous Networks",The European Physical Journal B,Vol.26,2002,pp.521-529.
    [232]C.Ellison,B.Frantz,B.Lampson,R.Rivest,B.Thomas,and T.Ylonen,"SPKI Certificate Theory",RFC 2693,1999.
    [233]L.Ninghui,W.H.Winsborough,and J.C.Mitchell,"Distributed Credential Chain Discovery in Trust Management(Extended Abstract)",Proceedings of the 8th ACM Computer and Communication Security,2001,pp.156-165.
    [234]E.Freudenthal,T.Pesin,L.Port,E.Keenan and V.Karamcheti,"dRBAC:Distributed Role-Based Access Control for Dynamic Coalition Environments",Technical Report TR2001-819,New York University,2001.
    [235]C.Watkins and P.Dayan,"Q-Learning",Machine Learning,Vol.8,No.3,1992,pp.279-292.
    [236]D.F.Ferraiolo,R.Sandhu,S.Gavrila,D.R.Kuhn,and R.Chandramouli,"Proposed NIST Standard for Role-Based Access Control",ACM Transactions on Information and System Security,Vol.4,No.3,2001,pp.224-274.
    [237]周建国,紧缩圈层结构论---一项中国人际关系的结构与功能分析,社会科学研究,2002,(2).
    [238]刘少杰,后现代西文社会学理论,北京:社会科学文献出版社,2002,80-81.
    [239]周建国,紧缩圈层结构论:一项中国人际关系的结构与功能分析,上海:上海三联书店,2005.
    [240]S.Milgram,"The Small World Problem",Psychology Today,No.2,1967,pp.60-67.
    [241]D.J.Watts and S.H.Strogatz,"Collective Dynamics of Small-World Networks",Nature,Vol.393,1998,pp.440-442.
    [242]I.Pool and M.Kochen,"Contacts and Inuence",Social Networks,No.1,1978,pp.1-48.
    [243]M.Girvan and M.E.J.Newman,"Community Structure in Social and Biological Networks",Proceedings of National Academy Sciences,Vol.99,2002,pp.7821-7826.
    [244]D.Gibson,J.Kleinberg,and P.Raghavan,"Inferring Web Communities from Link Topology",Proceedings of the 9th ACM Conference on Hypertext and Hypermedia,1998,pp.225-234.
    [245]G.W.Flake,S.R.Lawrence,C.L.Giles,and F.M.Coetzee,"Self-Organization and Identification of Web Communities",IEEE Computer,Vol.35,No.3,2002,pp.66-71.
    [246]A.L.Adamic and E.Adar,"Friends and Neighbors on the Web",Social Networks,Vol.25,No.3,2003,pp.211-130.
    [247]S.Shen-Orr,R.Milo,S.Mangan,and U.Alon,"Network Motifs in the Transcriptional Regulation Network of Escherichia Coli",Nature Genetics,Vol.31,No.1,2002,pp.64-68.
    [248]R.Milo,S.Shen-Orr,S.Itzkovitz,N.Kashtan,D.Chklovskii,and U.Alon,"Network Motifs:Simple Building Blocks of Complex Networks",Science,Vol.298,No.5594, 2002,pp.824-827.
    [249]P.Holme,M.Huss,and H.Jeong,“Sub-Network Hierarchies of Biochemical Pathways”,Bioinformatics,Vol.19,No.4,2003,pp.532-538.
    [250]P.Gleiser and L.Danon,“Community Structure in Jazz”,Advances in Complex Systems,Vol.6,No.4,2003,pp.565-573.
    [251]M.R.Garey and D.S.Johnson,“Computers and Intractability:A Guide to the Theory of NP-Completeness”,San Francisco:W.H.Freeman Publishers,1979.
    [252]J.Scott,“Social Network Analysis:A Handbook”,2nd edition London:Sage Publications,2002.
    [253]B.W.Kernighan and S.Lin,“A Efficient Heuristic Procedure for Partitioning Graphs”,Bell System Technical Journal,Vol.49,No.2,1970,pp.291-307.
    [254]M.Fiedler,“Algebraic Connectivity of Graphs”,Czechoslovak Mathematical Journal,Vol.23,No.98,1973,pp.298-305.
    [255]A.Pothen,H.Simon,and K.P.Liou,“Partitioning Sparse Matrices with Eigenvectors of Graphs”,SIAM Journal on Matrix Analysis and Applications,Vol.11,No.3,1990,pp.430-452.
    [256]G Palla,I.Derenyi,I.Farkas,and T.Vicsek,“Uncovering the Overlapping Community Structure of Complex Networks in Nature and Society”,Nature,Vol.435,No.7043,2005,pp.814-818.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700