[1]
A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2007.
[2]
H. T. Nguyen, W. Zhao, and J. Yang, A trust and reputation model based on Bayesian network for web services, in Proc. 8th IEEE Int. Conf. on Web Services (ICWS), Miami, Florida, USA, 2010, pp. 251-258.
[3]
E. Gerding, K. Larson, and N. Jennings, Mechanism design for eliciting probabilistic estimates from multiple suppliers with unknown costs and limited precision, in Proc. 11th Int. Workshop on Agent-Mediated Electronic Commerce, 2009, pp. 1-124.
[4]
J. Miller, Game Theory at Work: How to Use Game Theory to Outthink and Outmaneuver Your Competition. McGraw-Hill, 2003.
[5]
M. Yang, Q. Feng, Y. Dai, and Z. Zhang, A multi-dimensional reputation system combined with trust and incentive mechanism in P2P file sharing systems, in Proc. 27th Int. Conf. on Distributed Computing Systems Workshops, Toronto, Canada, 2007, pp. 29-35.
[7]
S. Shetty, P. Padala, and M. P. Frank, A survey of market-based approaches to distributed computing, Technical report, no. TR03013, 2003.
[8]
P. Klemperer, Auctions: Theory and Practice. Princeton University Press, New Jersey, USA, 2004.
[9]
W. Vickrey, Counterspeculation, auctions, and competitive sealed tenders, Journal of Finance, vol. 16, no. 1, pp. 8-37, 1961.
[10]
A. Clayphan and T. Min’an, Mechanism simulation framework for large distributed systems, Captone project report, The University of New South Wales, Sydney, Australia, 2008.
[11]
M. P. Papazoglou, P. Traverso, S. Dustdar, and F. Leymann, Service-oriented computing: State of the art and research challenges, IEEE Computer, vol. 40, no 11, pp. 38-45, 2007.
[12]
D. Wu, S. Ye, X. Wu, and J. Wei, Implementing service-correlation aware service selection, in Int. Conf. on Service Sciences (ICSS), Hangzhou, China, 2010, pp. 383-387.
[13]
G. Urdaneta, G. Pierre, and M. V. Steen, A survey of DHT security techniques, ACM Computing Surveys, vol. 43, no. 2, 2011.
[14]
K. Karta, An investigation on personalized collaborative filtering for web service selection, Master degree dissertation, The University of Western Australia, Perth, Australia, 2005.
[15]
Z. Li, S. Su, and F. Yang, WSrep: A novel reputation model for web services selection, in Agent and Multi-Agent Systems: Technologies and Applications, N.T. Nguyen, A. Grzech, R. J. Howlett, L. C. Jain, Eds., Springer-Verlag, 2008, pp. 199-208.
[16]
Z. Malik and A. Bouguettaya, A rater credibility assessment in web services interactions, World Wide Web Journal, vol. 12, no. 1, pp. 3-25, 2009.
[17]
R. Jurca and B. Faltings, An incentive-compatible reputation mechanism, in Proc. the IEEE Conference on E-Commerce, Newport Beach, CA, USA, 2003.
[18]
C. Wan, C. Ullrich, L. Chen, R. Huang, J. Luo, and Z. Shi, On solving QoS-aware service selection problem with service composition, in Proc. 7th Int. Conf. on Grid and Cooperative Computing, 2008, pp. 467-474.
[19]
Y. Wang and J. Vassileva, Towards trust and reputation based web service selection: A survey, International Transactions on Systems Science and Applications, vol. 3, no. 2, pp. 118-132, 2007.
[20]
Y. Liu, A. Ngu, and L. Zheng, QoS computation and policing in dynamic web service selection, in Proc. 13th Int. World Wide Web Conference, 2004, pp. 66-73.
[21]
L-H. Vu, M. Hauswirth, and K. Aberer, Towards P2P-based semantic web service discovery with QoS support, in Proc. Business Process Management Workshops, 2005, pp. 18-31.
[22]
Y. Wang, Y. Hori, and K. Sakurai, Characterizing economic and social properties of trust and reputation systems in P2P environment, Journal of Computer Science and Technology, vol. 23, no. 1, pp. 129-140, 2008.
[23]
J. Witkowski, Elicit honest reputation feedback in a Markov setting, in Proc. 21st Int. Joint Conf. on Uncertainty in Artificial Intelligence, Pasadena, California, USA, 2009, pp. 330-335.
[24]
H. Zhao, X. Yang, and X. Li, An incentive mechanism to reinforce truthful reports in reputation systems, Journal of Network and Computer Applications (JNCA), vol. 35, no 3, pp. 951-961, 2012.
[25]
T. Moscibroda and S. Schmid, On mechanism design without payments for throughput maximization, in Proc. 28th IEEE Conf. on Computer Communications (INFOCOM ‘09), Rio de Janeiro, Brazil, 2009.
[26]
F. Brandt and T. Sandholm, Efficient privacy-preserving protocols for multi-unit auctions, in Financial Cryptography and Data Security, A. Patrick, and M. Yung, Eds., Springer-Verlag, 2005, pp. 298-312.