[1] H. Shakeri and A. G. Bafghi. Computing trust resultant using intervals. In Proceedings of the 8th International ISC Conference on Information Security and Cryptology (ISCISC’11), pages 15-20.FUM, Mashhad, Iran, 2011.
[2] H. Shakeri and A. G. Bafghi. Propagation of trust and confidence using intervals. In Proceedings of the 6th International Conference for Internet Technology and Secured Transactions (ICITST 2011), pages 436-441. Khalifa University, Abu Dhabi, UAE, 2011.
[3] D. Olmedilla, O. Rana, B. Matthews, and W. Nejdl. Security and trust issues in semantic grids. In Proceedings of the Dagsthul Seminar, Semantic Grid: The Convergence of Technologies, no. 05271, 2005.
[4] P. Massa and C. Hayes. Page-rank: Using trusted links to re-rank authority. In Proceedings of the 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI’05), pages 614- 617.Washington DC, USA, 2005.
[5] H. Shakeri and A. G. Bafghi. RTBIMS: Accuracy enhancement in iterative multiplication strategy for computing propagated trust. In Proceedings of the 8th International ISC Conference on Information Security and Cryptology (ISCISC’11), pages 9-14.FUM, Mashhad, Iran, 2011.
[6] J. A. Golbeck. Computing and applying trust in web-based social networks. Ph.D. Dissertation, University of Maryland, College Park, 2005.
[7] U. Kuter and J. Golbeck. SUNNY: A new algorithm for trust inference in social networks using probabilistic confidence models. In Proceedings of the 22nd National Conference on Artificial Intelligence, British Columbia, Canada, pages 1377-1382. 2007.
[8] U. Kuter and J. Golbeck. Using probabilistic confidence models for trust inference in web-based social networks. ACM Transactions on Internet Technology, 10(2):Article 8, 2010.
[9] T. Huynh, N. Jennings, and N. Shadbolt. An integrated trust and reputation model for open multi-agent systems, Autonomous Agents and Multi-Agent Systems, 13:119-154, 2006.
[10] L. Ding, P. Kolari, S. Ganjugunte, T. Finin, and A. Joshi. Modeling and evaluating trust network inference. In Proceedings of the 7th International Workshop on Trust in Agent Societies at AAMAS, 2004.
[11] J. Sabater. Trust and reputation for agent societies. Ph.D. Thesis, Universitat Autonoma de Barcelona, 2003.
[12] W. Teacy, J. Patel, N. Jennings, and M. Luck. Travos: trust and reputation in the context of inaccurate information sources. Journal of Autonomous Agents and Multi-Agent Systems, 12(2):183-198, 2006.
[13] . Saadi, J. M. Pierson, and L. Brunie. Authentication and access control using trust collaboration in pervasive grid environment. In Proceedings of the International Conference on Grid and Pervasive Computing (GPC 2007), 2007.
[14] O. Hasan, L. Brunie, and J. M. Pierson. Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments. In Proceedings of ICPS’09, London, United Kingdom, 2009.
[15] Y. Wang and M. P. Singh. Trust representation and aggregation in a distributed agent system. In Proceedings of 21st National Conference on Artificial Intelligence (AAAI), pages 1425-1430. Boston, MA, USA, 2006.
[16] A. Jøsang and S. G. Knapskog. A metric for trusted systems. In Proceedings of the 21st National Security Conference, pages 16-29. Arlington, Virginia, USA, 1998.
[17] A. Josang and T. Bhuiyan. Optimal trust network analysis with subjective logic. In Proceedings of the 2nd International Conference on Emerging Security Information, Systems and Technologies, pages 179-184. Cap Esterel, France, 2008.
[18] A. Das and M. M. Islam. Secured Trust: A dynamic trust computation model for secured communication in multi-agent systems. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 9(2):261-274, 2012.
[19] J. Hu, Q. Wu, and B. Zhou., FCTrust: A robust and efficient feedback credibility-based distributed P2P trust model. In Proceedings of the 9th International Conference for Young Computer Scientists, pages 1963-1968. Zhang JiaJie, China, 2008.
[20] B. Khosravifar, J. Bentahar, M. Gomrokchi, and R. Alam. CRM: An efficient trust and reputation model for agent computing, Journal of Knowledge-Based Systems, 30:1-16, 2012.
[21] J. S. Chang and H. J. Wong. Selecting appropriate sellers in online auctions through a multi-attribute reputation calculation method. Journal of Electronic Commerce Research and Applications, 10:144-154, 2011.
[22] X. Qiu, L. Zhang, S.Wang, and G. Qian. A trust transitivity model based on Dempster-Shafer theory. Journal of Networks, 5(2): 1025-1032, 2010.
[23] Y. A. Kim and H. S. Song. Strategies for predicting local trust based on trust propagation in social networks. Journal of Knowledge-Based Systems, 24(8):1360-1371, 2011.
[24] J. Urbano, A. P. Rocha, and E. Oliveria. Computing confidence values: Does trust dynamics matter?. In Proceedings of EPIA’09, Portugal, 2009.
[25] J.Weng, Z. Shen, C. Miao, A. Goh, and C. Leung. Credibility: How agents can handle unfair third party testimonies in computational trust models. IEEE TKDE, 22(9):1286-1298, 2010.
[26] Y. Wang and L. Li. Two-dimensional trust rating aggregations in service-oriented applications, IEEE TRANSACTIONS ON SERVICES COMPUTING, 4(4):257-271, 2011.
[27] W. Ping, Q. Jing, and Q. Y. Hui. A computational trust model with confidence in unstructured P2P systems. In Proceedings of 2009 Joint Conferences on Pervasive Computing (JCPC 2009), pages 451-454. Tamkang University, Taipei, Taiwan, 2009.
[28] A. G. Bafghi and H. Shakeri. Improving iterative multiplication strategy in estimating propagated trust using similarity measure and ant colony optimization. In Proceedings of the 16th Annual CSI Computer Conference, pages 374-379. Sharif University, Tehran, Iran, 2011.