References
- 김호원 (2014). "사물인터넷 환경에서의 보안/프라이버시 이슈." TTA 저널, 153: 35-39.
- 표철식.강호용.김내수.방효찬 (2013). "IoT(M2M) 기술동향 및 발전 전망." 한국통신학회지, 30(8): 3-10.
- ABC4Trust (2011). "ABC4Trust D2.1 Architecture for Attribute-based Credential Technologies - Version 1." https://abc4trust.eu/download/ABC4Trust-D2.1-Architecture-V1.2.pdf (Retrieved Oct 22, 2015).
- ABC4Trust (2012). "ABC4Trust D5.1 Scenario Definition for both Pilots: ABC4Trust." https://abc4trust.eu/download/ABC4Trust-D5.1-Scenario-Definition.pdf. (Retrieved Oct 22, 2015).
- ABC4Trust (2015a). "R2.1 Privacy-ABC Technologies, Personal Data Ecosystem, and Business Models: A feasibility study report: ABC4Trust." https://abc4trust.eu/download/R2.1%20-%20PDE%20and%20ABC%20Review%20V1.0.pdf (Retrieved Dec 4, 2015).
- ABC4Trust (2015b)." ABC4Trust." https://abc4trust.eu/(Retrieved Oct 18, 2015).
- Chaudhuri, A. & Holbrook, M. B. (2001). "The Chain of Effects from Brand Trust and Brand Affect to Brand Performance: The Role of Brand Loyalty." Journal of Marketing, 65(2): 81-93. https://doi.org/10.1509/jmkg.65.2.81.18255
- COMPOSE (2014a). "D1.2.2 Final COMPOSE architecture document: COMPOSE." http://www.compose-project.eu/sites/default/files/publications/D1.2.2%20-%20Final%20COMPOSE%20architecture.pdf (Retrieved Dec 10, 2015).
- COMPOSE (2014b). "D5.3.1 Reputation Management Report: COMPOSE." http://www.compose-project.eu/sites/default/files/publications/D5.3.1%20-%20Reputation%20management%20report.pdf (Retrieved Dec 12, 2015).
- COMPOSE (2014c). "D7.2.1 Business Modeling Analysis: COMPOSE." http://www.compose-project.eu/document/d721-business-modeling-analysis (Retrieved Dec 9, 2015).
- COMPOSE (2014d). "D7.3.2 Use Cases Implementation - Final Version: COMPOSE." http://www.compose-project.eu/document/d732-use-cases-implementation-%E2%80%93-final-version (Retrieved Nov 13, 2015).
- COMPOSE (2015). "COMPOSE." http://www.compose-project.eu/ (Retrieved Nov 11, 2015).
- Corbitt, B. J., Thanasankit, T. & Yi, H. (2003). "Trust and e-commerce: a study of consumer perceptions." Electronic Commerce Research and Applications, 2(3): 203-215. https://doi.org/10.1016/S1567-4223(03)00024-3
- Sirdeshmukh , D., Singh, J. & Sabol, B. (2002). Consumer Trust, Value, and Loyalty in Relational Exchanges. Journal of Marketing, 66(1): 15-37. https://doi.org/10.1509/jmkg.66.1.15.18449
- Dumortier, J. & Vandezande, N. (2012). "Trust in the proposed EU regulation on trust services?" Computer Law & Security Review, 28(5): 568-576. https://doi.org/10.1016/j.clsr.2012.07.010
- Hong, I. B. & Cho, H. (2011). "The impact of consumer trust on attitudinal loyalty and purchase intentions in B2C e-marketplaces: Intermediary trust vs. seller trust." International Journal of Information Management, 31(5): 469-479. https://doi.org/10.1016/j.ijinfomgt.2011.02.001
- Inter-Trust (2013a). "D.2.3.1 INTER-TRUST Approach and Framework Specification (first version)." http://inter-trust.lcc.uma.es/documents/10180/15714/INTER-TRUST-T2.3-IT-DELV-D2.3.1-ApproachAndFrameworkSpecification-First-V1.0/51c97210-be53-4e49-827f-d4e666ded4bf (Retrieved Dec 19, 2015).
- Inter-Trust (2013b). "D2.4.1. Market analysis (first version)." http://inter-trust.lcc.uma.es/deliverables (Retrieved Dec 3, 2015)
- Inter-Trust (2013c). "Inter-trust D2.2.1 Gap and Standards Analysis First Version." http://inter-trust.lcc.uma.es/documents/10180/15714/INTER-TRUST-T2.2-UMU-DELV-D2.2.1-GapStandardsAn-First-V1.00.pdf/dcc886d8-1824-4973-8e73-2a91c7a3f85e (Retrieved Nov 1, 2015).
- Inter-Trust (2014). "Inter-TRUST D3.3 Guidelines for Deployment." http://inter-trust.lcc.uma.es/documents/10180/15714/INTER-TRUST-T3.4-SCYTL-DELV-D3.3-GuideDeploy-V1.00.pdf/e4218bab-c76e-440e-9f9d-e4e1d96a510b (Retrieved Oct 21, 2015)
- Inter-Trust (2015). "Interoperable Trust Assurance Infrastructure" http://inter-trust.lcc.uma.es/ (Retrieved Oct 17, 2015).
- IoT-A (2011). "D1.2 - Initial Architectural Reference Model for IoT: IoT-A." http://www.iot-a.eu/public/public-documents/d1.2/view (Retrieved Dec 2, 2015)
- Mayer, R. C., Davis, J. H. & Schoorman, F. D. (1995). "An Integrative Model of Organizational Trust." The Academy of Management Review, 20(3): 709-734. https://doi.org/10.5465/amr.1995.9508080335
- Ranaweera, C. & Prabhu, J. (2003). "On the relative importance of customer satisfaction and trust as determinants of customer retention and positive word of mouth." Journal of Targeting, Measurement and Analysis for Marketing, 12(1): 82-90. https://doi.org/10.1057/palgrave.jt.5740100
- SMARTIE (2013). "SMARTIE D2.2 Requirements." http://www.smartie-project.eu/publication_deli.html. (Retrieved Oct 19, 2015).
- SMARTIE (2014a)." D2.1 Use Cases: SMARTIE." http://www.smartie-project.eu/download/D2.1-Use%20Cases.pdf (Retrieved Dec 8, 2015).
- SMARTIE (2014b). "D3.1 Components for secure information gathering and storage: SMARTIE." http://www.smartie-project.eu/download/D3.1-Components_for_secure_information_gathering_and_storage_Final.pdf (Retrieved Nov 14, 2015).
- SMARTIE (2015a). "D5.1 Integration and Validation Plan: SMATIE." http://www.smartie-project.eu/download/D5.1-Integration%20and%20Validation%20Plan.pdf (Retrieved Dec 9, 2015).
- SMARTIE (2015b). "Welcome to SMARTIE Project." http://www.smartie-project.eu/ (Retrieved Dec 9, 2015).
- uTRUSTit (2011). "D.2.2 Definition of User Scenarios: uTRUSTit." http://www.utrustit.eu/ (Retrieved Sep 3, 2015)
- uTRUSTit (2012a). "uTRUSTit D2.7 Updated Design Guidelines on the Security Feedback Provided by the Things." http://www.utrustit.eu/ (Retrieved Sep 4, 2015).
- uTRUSTit (2012b). "uTRUSTit Deliverables." http://www.utrustit.eu/ (Retrieved Sep 2, 2015).
- uTRUSTit (2013). "uTRUSTit D2.8 Final UI-Guidelines for the Trust Feedback Provided by the IoT." http://www.utrustit.eu/ (Retrieved Sep 1, 2015).