|
M. Alhamad, T.S. Dillon, T.S. Change. “Conceptual SLA Framework for Cloud Computing,” Proceedings of the 4th IEEE International Conference on Digital Ecosystems and Technologies. Piscataway: IEEE,2010:606-610
|
|
T. Beth, M. Borcherding, B. Kein . “Open Net Works,” Proceedings European Symposium Security(ESORICS), Brighton:Springer-Vergag,l999:59~63
|
|
A. M. Dillon, T. S. CHANG . “ SLA-based Trust Model for Cloud Computing,” Proceedings of 2010 13th International Conference on Network-Based Information Systems. pp.321-324, 2010.
|
|
D.G. Feng, M. Zhang, Y. Zhang. “Cloud Computing Security Research,” Journal of Software. 2011,22(1):71-83.
|
|
I. Foster, “The Anatomy of the Grid: Enabling Scalable Virtual Organizations,” International Journal of High Performance Computing Applications, vol.15, pp.200-222, Aug. 2001
|
|
S.K. Guo, L.Q .Tian, X.L. Shen. “Research on FAHP Method in User Behavior Trust Computation,” Computer Engineering and Application. Vol. 47. pp.59-61, Dec,2011.
|
|
T. Hassan B.D. James. A. Joshi,. “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Security& Privacy,vol.8.pp.24-31, Jun,2010
|
|
H. Jameel. “A Trust Model for Ubiquitous Systems based on Vectors of Trust Values,” In: The 7th IEEE Int’1 Symp. on Multimedia, IEEE Computer Society Press, Washington. pp.674–679, 2005
|
|
A. Josang , R. Ismail, C. Body. “A Survey of Trust and Reputation Systems for Online Service Provision,” Decision Support Systems, 2007, 43(2): 618-644.
|
|
X. Y. Li, X. L. Gui. “Trust Quantitative Model with Multiple Decision Factors in Trusted Network,” Chinese Journal of Computers, vol.32, pp. 405-416, May. 2009.
|
|
Q. Li, X. Zheng. “Research Survey of Cloud Computing,” Computer Science,2011,38(4):32-37
|
|
S. Song ,H. Wang , H. Mac, M. wan. “Fuzzy Trust Integration for Security Enforcement in Grid Computing,” Lecture Notes in Computer Science, vol.3. pp. 9-21.Jan, 2004.
|
|
Y.S. Tan, C. Wang. “Trust Evaluation Based on User Behavior in Cloud Computing,” Microelectronics & Computer vol.11.pp.147-151. Nov, 2015
|
|
W. Tang, J.B. Hu, Z. Chen. “Research on a Fuzzy Logic-Based Subjective Trust Management Model,” Journal of Computer Research and Development. vol.42. pp. 1654-1659, Oct, 2005
|
|
L.Q. Tian, C. Lin. “User Behavior Trust Evaluation Mechanism based on Double Sliding Window ,” Journal of Tsinghua University(Science and Technology) .2010(5): 763-767.
|
|
Z.H. Wang, H.B. Pang, Z.B. Li. “An Access Control Scheme for Hadoop Cloud Platform,” Journal of Tsinghua University(Science and Technology). Vol.54.pp.53-59, Jan, 2014.
|
|
H. Xia, Z.P. Jia, H.M. Edwin. “Research of Trust Model based on Fuzzy Theory in Mobile ad Hoc Networks,” IET information security,2014,8(2).
|
|
X. Zhou, J. Yu. “Defense System Model based on Trust for Cloud Computing,” Journal of Computer Applications, vol. 31.pp.1531-1535, Jun, 2011
|