Mei, H., Huang, G. & Xie, T., 2012. Internetware: A
software paradigm for internet computing. IEEE
computer Society.
OPTET Consortium, 2012. Project 317631 OPerational
Trustworthiness Enabling Technologies, An. I DoW.
Patil, V. & Shyamansundar, R. K., 2005 . Trust
management for e-transactions.
Pazos-Revilla, M. & Siraj, A., 2008. Tools and techniques
for SSE-CMM implementation. The 12
th
World Multi-
Conference on Systemics, Cybernetics and
Informatics, Jointly with ISAS.
San-Martín, S. & Camarero, C., 2012. A CROSS-
NATIONAL STUDY ON ONLINE CONSUMER
PERCEPTIONS, TRUST, AND LOYALTY. Journal
of Organizational Computing and Electronic
Commerce.
S-Cube, 2008. Quality Reference Model for SBA: S-Cube
European Network of Excellence.
Shapiro, S. P., 1987. The Social Control of Impersonal
Trust. The American Journal of Sociology, p. 623.
Sommerville, I., 2011. Software engineering: Perarson.
Sommerville, I. & Dewsbury, G., 2007. Dependable
domestic systems design: A socio-technical approach.
Interacting with Computers.
Sztompka, P., 1999. Trust: A Sociological Theory:
Cambridge University Press.
Whitworth, B., 2009. A Brief Introduction to
Sociotechnical Systems. IGI Global.
Yan, Z. & Prehofer, C., 2007. An adaptive trust control
model for a trustworthy component software platform,
Autonomic and Trusted Computing. Lecture Notes in
Computer Science , pp. 226-238.
Yolum, P. & P. Singh, M., 2005. Engineering self-
organizing referral networks for trustworthy service
selection. IEEE Transactions on Systems, Man and
Cybernetics, Part A: Systems and Humans.
APPENDIX
Table 13: The Paper indices
Nr. Paper Reference
Nr
.
Paper Reference
1 (Song & Wang, 2010) 37 (Aßmann, et al., 2006)
2 (Audun Jøsang, 2007) 38 (Aikebaier, et al., 2012)
3 (Tyrone Grandison, 2000) 39 (Hasselbring & Reussner, 2006)
4 (Mei, et al., 2012) 40 (Ying & Jiang, 2010)
5 (S-Cube, 2008) 41 (Qureshi, et al., 2011)
6 (Zuo-Wen, et al., 2010) 42 (Irvine & Levit, 2007)
7 (Homeland Security, 2009) 43 (Patil & Shyamansundar, 2005 )
8 (ResiliNets, 2008) 44 (Verberne, et al., 2012)
9 (ANIKETOS, 2011) 45 (Harris & Goode, 2004)
10 (Corrittore, et al., 2003) 46 (Luarn & Lin, 2003)
11 (Wang & Emurian, 2005) 47 (Jing, et al., 2008)
12
(Scheffelmaier & Vinsonhaler,
2002)
48 (Shi, et al., 2012)
13 (Belanger, et al., 2002) 49 (Ding, et al., 2011)
14 (McKnight, et al., 2002) 50 (Gomez, et al., 2007)
15 (Lenzini, et al., 2010) 51 (Yolum & P. Singh, 2005)
16 (Chopra & Giorgini, 2011) 52 (Yan & Prehofer, 2007)
17 (Castelfranchi & Tan, 2002) 53 (Kuz, et al., 2012)
18 (Lipner, 2004) 54 (Avizienis, et al., 2004)
19
(Koufaris & Hampton-Sosa,
2004)
55 (Li-Ping, et al., 2009)
20 (Zheng, et al., 2009) 56 (Dai, et al., 2012)
21 (ISO/IEC 15408, 2009) 57 (Li, et al., 2009)
22 (Zhang & Zhang, 2005) 58 (Dewsbury, et al., 2003)
23 (DARPA, 2004) 59 (Paja, et al., 2013)
24 (Xiaoli, et al., 2007) 60 (Ba, 2001)
25 (Hussain, et al., 2006) 61 (Teler & Cristea, 2012)
26 (Limam & Boutaba, 2010) 62
(Sommerville & Dewsbury,
2007)
27 (Meng, et al., 2012) 63 (Schneider, 1999)
28 (Cassell & Timothy, 2000) 64 (Hall & McQuay, 2011)
29 (San-Martín & Camarero, 2012) 65 (Barber, 1998)
30 (Chen, et al., 2009) 66 (He, et al., 2009)
31 (Pavlidis, et al., 2009) 67 (Yang, 2011)
32 (Cofta, et al., 2011) 68 (Gefen, 2002)
33 (Reith, et al., 2007) 69 (Hussin, et al., 2007)
34 (Le-chang, et al., 2011) 70 (Yu, et al., 2010)
35 (Araújo Neto & Vieira, 2009) 71 (Ray & Chakraborty, 2004)
36 (Waluyo, et al., 2012) 72 (Yuan, et al., 2010)
CLOSER2013-3rdInternationalConferenceonCloudComputingandServicesScience
552