M. Blaze, J. Feigenbaum, J. Ioannidis, et al., “The role of trust management in distributed systems security,” Secure Internet Programming: Issues for Mobile and Distributed Objects, Berlin: Springer-Verlag, pp. 185-210, 1999.
 R. Khare and A. Rifkin, “Trust management on World Wide Web,” World Wide Web Journal (S1085-2298), Vol. 2, No. 3, pp. 77-112, 1997.
 B. Yu and M. P. Singh, “An evidential model of distributed reputation management,” International Conference on Autonomous Agents, Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1, pp. 294-301, 2002.
 S. B. Sitkin, D. M. Rousseau, R. S. Burt, and Camerer, “Trust in and between organizations,” Academy of Management Review, Vol. 20, No. 3, pp. 387-620, 1998.
 T. Wen and C. Zhong, “Research of subjective trust management model based on the fuzzy set theory,” Journal of Software, Vol. 14, No. 8, pp. 1401-1408, 2003.
 T. Wen, H. Jianbin, and C. Zhong, “Research on a fuzzy logic-based subjective trust management model,” Computer Research and Development, Vol. 42, No. 10 pp. 1654-1659, 2005.
 M. Burrows, M. Abadi, and R. M. Needham, “A logic of authentication,” The Royal Society of London, DEC Systems Research Center, Technical Report, pp. 39, 1989.
 M. Blaze, J. Ioannidis, and A. D. Keromytis, “Experience with the keynote trust management system: Applications and future directions,” iTrust, New York: Springer, pp. 284-300, 2003.
 M. Blaze, J. Feigenbaum, and A. D. Keromytis, “KeyNote: trust management for public-key infrastructures,” B. Christianson, B. Crispo, S. William, et al., eds, Cambridge 1998 Security Protocols Intl. Workshop, 1998.
 T. Beth, M. Borcherding, and B. Klein, “Valuation of trust in open networks,” Proceedings 1 European Symposium on Research in Security (ESORICS), Berlin: Springer-Verlag, pp. 3-18, 1994.
 R. Yahalom, B. Klein, and T. H. Beth, “Trust relationships in secure systems-A distributed authentication perspective. Proceedings 1993 IEEE Symposium on Research in Security and Privacy 1. Los Alamitos: IEEE Computer Society Press, pp. 150-164, 1993.
 S. K. Liu and X. T. Liu, “A new method of elevation of confidence level of large-scale perplexing simulation system,” Journal of System Simulation, Vol. 13, No. 5, pp. 666-669, 2001.
  A Josang, “A logic for uncertain probabilities,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (S0218-4885), Vol. 9, No. 3, pp. 279-311, 2001.
 Y. Wei, J. S Li, and P. L. Hong, “Distributed peer-to-peer trust model and computer simulation,” Journal of System Simulation, Vol. 18, No. 4, pp. 938-942, 2006.
 X. Y. Meng, “Research and implement on trust model and trust evaluation system based on cloud model [MS. Thesis],” BeiHang University, 2007.
 X. Y. Meng, Zhang Guang-Wei, et al., “Research on subjective trust management model based on cloud model,” Journal of System Simulation, Vol. 19, No. 14, pp. 3310-3317, 2007.
 G. W. Zhang, D. Y. Li, et al., “A collaborative filtering recommendation algorithm based on cloud model,” Journal of Software, Vol. 18, No. 10, pp. 2403-2411, 2007.
 G. W. Zhang, J. C. Kang, et al., “Context based collaborative filtering recommendation algorithm,” Journal of System Simulation, Vol. 18, No. 2, pp. 595-601, 2006.
 H. Zan, C. Hsinchun, and Z. Daniel, “Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering,” ACM Transactions on Information Systems, Vol. 22, No. 1, pp. 116-142, 2004.
 B. Thiesson, C. Meek, D. M. Chickering, and D. Heckerman, “Learning mixture of DAG models1 microsoft research,” Technical Report, MSR2TR297230, 1997.
 B. Sarwar, G. Karypis, J. Konstan and J. Riedl, “Analysis of recommendation algorithms for E-commerce,” In: Proceedings of the 2nd ACM Conference on Electronic Commerce,” New York: ACM Press, pp. 158-167, 2001 http://www.research. ibm.com/iac/ec00/.
 C. C. Aggarwal, J. Wolf, K. L. Wu and P. S. Yu, 揌orting hatches an egg: A new graph-theoretic approach to collaborative filtering,?In: Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM Press, pp. 201−212, 1999.
 D. Y. Li, C. Y Liu et al., “Artificial intelligence with uncertainty,” Journal of Software, Vol. 15, No. 9, pp. 1583-1594, 2004.
 D. Y. Li and Y. Du, “Artificial intelligence with uncertainty,” Chapman & Hall/CRC Taylor & Francis Group, 2008.
 D. Y. Li and C. Y. Liu, “The universality of normal cloud model,” Engineering Science, Vol. 6, No. 8, pp. 28-34, 2004.
 G. Zacharia and P. Maes, “Trust management through reputation mechanisms,” Applied Artificial lntelligence, Vol. 14, pp. 881-907, 2000.
 E. M. Maximillen and M. P. Singh, “Conceptual model of web services reputation,” ACM SIGMOD, Special section on semantic web and data management, Vol. 31, No. 4, pp. 36-41, 2002.
 L. Z. Zeng, B. Benatallah, M. Dumas, J. Kalagnanam, and Q. Z. Sheng, “Web engineering: Quality driven web service composition,” ACM Press Proceedings of the twelfth international conference on World Wide Web, May 2003.
 S. Majithia, A. S. Ali, O. F. Rana, and D. W. Walker, “Reputation-Based Semantic Service Discovery,” Enabling Technologies: Infrastructure for Collaborative Enterprises, 2004, WET ICE 2004, 13th IEEE International Workshops on, pp. 297-302, 2004.
 L. Z. Zeng, B. Benatallah, et al., “QoS-Aware middleware for web services composition,” IEEE Transactions on Software Engineering, Vol. 30, No. 5, pp. 311-327, 2004.