[1] S. C. Currall and A. C. Inkpen, "13 On the complexity of organizational trust: a multi-level co-evolutionary perspective and guidelines for future research," Handbook of trust research, p. 235, 2006.
[2] C. Offe, "How can we trust our fellow citizens?," Democracy and trust, pp. 42-87, 1999.
[3] R. Spanek, "SecGRID: model for maintaining trust in large-scale dynamic environments," International Journal of Grid and Utility Computing, vol. 1, pp. 146-158, 2009.
[4] M. Foddy and R. Dawes, "Group-based trust in social dilemmas," New Issues and Paradigms in Research on Social Dilemmas, pp. 57-71, 2008.
[5] M. Williams, "In whom we trust: Group membership as an affective context for trust development," Academy of Management Review, vol. 26, pp. 377-396, 2001.
[6] A. Basu and R. W. Blanning, Metagraphs and their applications: Springer, 2007.
[7] M. Yasutomi, Y. Mashimo, and H. Shigeno, "GRAT: Group Reputation Aggregation Trust for Unstructured Peer-to-Peer Networks," in Distributed Computing Systems Workshops (ICDCSW), 2010 IEEE 30th International Conference on, 2010, pp. 126-133.
[8] L. Wenzhi and L. Zhaobin, "Trust Assessment Model Based on Domain Group Collaboration," in 2009 First International Conference on Information Science and Engineering, 2009 pp. 3548-3551.
[9] X. Liu, A. Datta, K. Rzadca, and E. P. Lim, "Stereotrust: a group based personalized trust model," in Proceeding of the 18th ACM conference on Information and knowledge management, 2009, pp. 7-16.
[10] X. Tong and W. Zhang, "Group Trust and Group Reputation," in Fifth International Conference on Natural Computation, 2009, pp. 561-565.
[11] G. Dai, Y. Wang, Z. Jiang, and Y. Hou, "A Group Trust Model with Control Flow Constraint Based on Bayesian Method," in Computational Science and Optimization (CSO), 2010 Third International Joint Conference on, 2010, pp. 390-394.
[12] W. Yong and R. Xingtian, "A Group Trust Model with Control Flow Constraint Based on Subjective Logic," in Management and Service Science, 2009. MASS '09. International Conference on, 2009, pp. 1-6.
[13] R. A. Shaikh, H. Jameel, B. J. d'Auriol, H. Lee, S. Lee, and Y. J. Song, "Group-based trust management scheme for clustered wireless sensor networks," Parallel and Distributed Systems, IEEE Transactions on, vol. 20, pp. 1698-1712, 2009.
[14] G. H. Zhang and Z. G. Chen, "A Robust Trust Model Based on Group for P2P Environments," Key Engineering Materials, vol. 439, pp. 98-103, 2010.
[15] A. Ravichandran and J. Yoon, "Trust management with delegation in grouped peer-to-peer communities," in Proceedings of the eleventh ACM symposium on Access control models and technologies, 2006, pp. 71-80.
[16] A. Gummadi and J. P. Yoon, "Modeling group trust for peer-to-peer access control," in Database and Expert Systems Applications, 2004. Proceedings. 15th International Workshop on, 2004, pp. 971-978.
[17] S. Bistarelli and F. Santini, "SCLP for trust propagation in small-world networks," Recent Advances in Constraints, pp. 32-46, 2008.
[18] B. McEvily, V. Perrone, and A. Zaheer, "Trust as an organizing principle," Organization Science, vol. 14, pp. 91-103, 2003.
[19] R. Prada and A. Paiva, "Believable groups of synthetic characters," in Proceedings of the fourth international joint conference on Autonomous agents and multi-agent systems, 2005, pp. 37-43.
[20] Z.-H. Tan, "Fuzzy metagraph and its combination with the indexing approach in rule-based systems," Knowledge and Data Engineering, IEEE Transactions on, vol. 18, pp. 829-841, 2006.
[21] E.Mokhtari, Z. Noorian, B. Tork Ladani, and M. Nematbakhsh. "A context-aware reputation-based model of trust for open multi-agent environments." Advances in Artificial Intelligence, pp. 301-312. Springer Berlin Heidelberg, 2011.
[22] M. McPherson, L. Smith-Lovin, and J. M. Cook, "Birds of a feather: homophily in social networks," Annual Review of Sociology, vol. 27, no. 1, pp. 415-444, 2001.
[23] J.Han., and M. Kamber, "Data Mining: Concepts and Techniques". Elsevier, San Francisco. 2006.