A Credible Cloud Service Model based on Behavior Graphs and Tripartite Decision-Making Mechanism
暂无分享,去创建一个
[1] S. Srinivasan,et al. Cloud Computing Security , 2014 .
[2] James A. Thom,et al. Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.
[3] Lin Chuang,et al. Quantitative Analysis of Trust Evidence in Internet , 2006, 2006 International Conference on Communication Technology.
[4] Walid Saad,et al. Game theoretic modeling of cooperation among service providers in mobile cloud computing environments , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[5] Ching-Hsien Hsu,et al. Cloud Computing Technology and Science , 2013, Int. J. Grid High Perform. Comput..
[6] Wei Jie,et al. Cloud Computing Security: Opportunities and Pitfalls , 2012, Int. J. Grid High Perform. Comput..
[7] Yang Yang. Model and Analysis of User Behavior Based on Dynamic Game Theory in Cloud Computing , 2011 .
[8] Jonathan T. Trostle,et al. Protecting Against Distributed Denial of Service (DDoS) Attacks Using Distributed Filtering , 2006, 2006 Securecomm and Workshops.
[9] Yin Cheng-guo. Evaluating network user behavior trust based on multiple decisions attributes , 2011 .
[10] Pan Ning. Research on behavior trust evaluation model of cloud services based on membership theory , 2013 .
[11] Sun Shan-shan. Trust Evaluation and Control Analysis of FANP-based User Behavior in Cloud Computing Environment , 2013 .
[12] Graça Bressan,et al. A Continuous Authentication System Based on User Behavior Analysis , 2010, 2010 International Conference on Availability, Reliability and Security.
[13] Markus Jakobsson,et al. Implicit Authentication through Learning User Behavior , 2010, ISC.
[14] Xiao De-bao,et al. Design and Implementation of Cloud Monitoring System Based on Server Clusters , 2012 .