[1] 张晓林.开放数字图书馆的设计与实现:CSDL的实践[J].情报学报,2003,22(5):520-525.
[2] Lee W.Towards Agent-based Decision Making in the Electronic Marketplace: Interactive Recommendation and Automated Negotiation[J].Expert Systems with Applications,2004,27(4):665-679.
[3] ebXML - Enabling a Global Electronic Market.[EB/OL]. [2008-05-18]. http://www.ebxml.org/.
[4] ebXML CPPA. Automated Negotiation of Collaboration-protocol Agreements Specification Version 0.04[EB/OL]. [2008-05-18]. http://www.oasis-open.org/committees/documents.php?wg_abbrev=ebxml-cppa-negot.
[5] Yu T, WINSLETT M, Seamons K.Supporting Structured Credentials and Sensitive Policies Through Interoperable Strategies for Automated Trust Negotiation[J].ACM Transactions on Information and System Security, 2003,6(1):1-42.
[6] Chiu D K W, Cheung S C, Hung P C K,et al.Developing e-Negotiation Support with a Meta-modeling Approach in a Web Services Environment[J].Decision Support Systems, 2005,40(1):51-69.
[7] Liu X, Wirtz K W.Sequential Negotiation in Multiagent Systems for Oil Spill Response Decision-making[J].Marine Pollution Bulletin,2005,50(4):469-474
[8] Lin R J, Chou S T.Mediating a Bilateral Multi-issue Negotiation[J]. Electronic Commerce Research and Applications,2004,3(2):126-138.
[9] Seamons K E, Winslett M, Yu T et al.Protecting Privacy During on Line Trust Negotiation[J]. Lecture Notes in Computer Science, 2003,2482(1):249-253.
[10] Bertino E, Ferrari E, Squicciarini A.Trust Negotiations: Concepts, Systems, and Languages[J].Computing in Science & Engineering,2004,6(4):27-34.
[11] Skogsrud H, Benatallah B, Casati F. Trust-serv: Model-driven Lifecycle Management of Trust Negotiation Policies for Web Services[C].In: Proceedings of the 13th International Conference on World Wide Web.New York, USA: ACM Press, 2004:53-62.
[12] Nejdl W, Olmedilla D, Winslett M. PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web [EB/OL]. [2008-05-18].http://www.learninglab.de/pdf/L3S_Project_peertrust.pdf.
[13] Grosof BN, Poon TC.SweetDeal: Representing Agent Contracts with Exceptions Using XML Rules, Ontologies, and Process Descriptions[EB/OL]. [2008-05-18].http://www2003.org/cdrom/papers/refereed/p115/p115-grosof.htm.
[14] Trust Establishment[EB/OL]. [2008-05-18].http://www.haifa.il.ibm.com/projects/software/e-Business/TrustManager/index.html.
[15] TrustBuilder Research Projects[EB/OL]. [2008-05-18].http://isrl.cs.byu.edu/projects.html.
[16] Yu T, Ma X, Winslett M.PRUNES: An Efficient and Complete Strategy for Automated Trust Negotiation over the Internet[C]. In: Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens,Greece. New York: ACM Press.2000:210-219.
[17] Li N, Mitchell J. RT: A Role-based Trust-management Framework[C]. In: Proceedings of The Third DARPA Information Survivability Conference and Exposition,Washington DC. 2003.
[18] Winsborough W H. Jacobs J.Automated Trust Negotiation Technology with Attribute-based Access Control[C]. DARPA Information Survivability Conference and Exposition, Washington DC.2003.
[19] Leithead T, Nejdl W, Olmedilla D,et al.How to Exploit Ontologies in Trust Negotiation[EB/OL]. [2008-05-18]. http://trust.mindswap.org/trustWorkshop/papers/12-f.pdf.
[20] Hung P C K, Li H, Jeng J.WS-Negotiation: An Overview of Research Issues[C].In:Proceedings of the 37th Hawaii International Conference on System Sciences,BigIsland, Hawaii,2004.
[21] KAoS Semantic Policy and Domain Services: An Application of DAML to Web Services-based Grid Architectures[EB/OL]. [2008-05-18]. http://www.agentus.com/WSABE2003/program/johnson.pdf.
[22] Bradshaw J M, Beautement P, Breedy M R,et al.Making Agents Acceptable to People[EB/OL]. [2008-05-18].http://www.ihmc.us/research/projects/KAoS/biit-jeff.pdf.
[23] Bradshaw J M, DutfieldS, Benoit P, et al. KAoS: Toward an Industrial-strength Generic Agent Architecture[M]. Software Agents. The MIT Press,1997: 375-418.
[24] HP Labs. Rei: A Policy Language for the Me-Centric Project[EB/OL]. [2008-05-18].http://www.hpl.hp.com/techreports/2002/HPL-2002-270.html.
[25] Blaze M, Feigenbaum J, Lacy J.Decentralized Trust Management[M].In: Proc. IEEE Symposium on Security and Privacy, Oakland, CA. IEEE Press.1996:164-173.
[26] Blaze M, Feigenbaum J, Ioannidis J et al.The KeyNote Trust-management System Version 2. [EB/OL]. [2008-05-18].http://www.rfc-editor.org/rfc/rfc2704.txt.
[27] Trust Establishment[EB/OL]. [2008-05-18].http://www.haifa.il.ibm.com/projects/software/e-Business/TrustManager/index.html.
[28] TrustBuilder Research Projects[EB/OL]. [2008-05-18]. http://isrl.cs.byu.edu/projects.php.
[29] Skogsrud H, Benatallah B, Casati F.A Trust Negotiation System for Digital Library Web Services[J].International Journal on Digital Libraries, 2004,4(3):185-207.
[30] Bertino E, Ferrari E, Squicciarini A C.Trust-X: A Peer-to-Peer Framework for Trust Establishment[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(7): 827-842.
[31] Granovetter M. The Strength of Weak Tie [J].The American Journal of Sociology,1973,78(6): 1360-1380. |