Attack-resistance of computational trust models | IEEE Conference Publication | IEEE Xplore