Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection
暂无分享,去创建一个
Tong Li | Rui Liu | Yuli Yang | Yi Tang | Yongle Chen | Yongle Chen | Tong Li | Yi Tang | Yuli Yang | Rui Liu
[1] Zhaoquan Cai,et al. Towards secure and flexible EHR sharing in mobile health cloud under static assumptions , 2017, Cluster Computing.
[2] Jin Li,et al. Differentially private Naive Bayes learning over multiple data sources , 2018, Inf. Sci..
[3] Raymond K. Wong,et al. Cognitively Adjusting Imprecise User Preferences for Service Selection , 2017, IEEE Transactions on Network and Service Management.
[4] Fucai Zhou,et al. Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures , 2018, J. Netw. Comput. Appl..
[5] Desheng Dash Wu,et al. Multi-objective optimization based ranking prediction for cloud service recommendation , 2017, Decis. Support Syst..
[6] Niu Xiao,et al. Cloud Hierarchical Analysis for Educational Resources of Engineering Education Accreditation in China , 2013 .
[7] Keqin Li,et al. Toward trustworthy cloud service selection: A time-aware approach using interval neutrosophic set , 2016, J. Parallel Distributed Comput..
[8] Yanchun Zhang,et al. Cloud-FuSeR: Fuzzy ontology and MCDM based cloud service selection , 2016, Future Gener. Comput. Syst..
[9] Wei Fang,et al. CSDA: a novel cluster-based secure data aggregation scheme for WSNs , 2019, Cluster Computing.
[10] Kenli Li,et al. Partition Scheduling on Heterogeneous Multicore Processors for Multi-dimensional Loops Applications , 2017, International Journal of Parallel Programming.
[11] Xiao-Jun Yang,et al. How to handle uncertainties in AHP: The Cloud Delphi hierarchical analysis , 2013, Inf. Sci..
[12] Jian Shen,et al. An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain , 2018, IEEE Access.
[13] Jin Li,et al. Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics , 2017, Soft Comput..
[14] Jin Li,et al. DivORAM: Towards a practical oblivious RAM with variable block size , 2018, Inf. Sci..
[15] Xifan Yao,et al. A hybrid artificial bee colony algorithm for optimal selection of QoS-based cloud manufacturing service composition , 2017 .
[16] Jie Zhang,et al. Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds , 2017, Secur. Commun. Networks.
[17] Nor Badrul Anuar,et al. Cloud Service Selection Using Multicriteria Decision Analysis , 2014, TheScientificWorldJournal.
[18] Jin Li,et al. Multi-resource scheduling and power simulation for cloud computing , 2017, Inf. Sci..
[19] Christian Esposito,et al. Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory , 2016, IEEE Transactions on Computers.
[20] Sven Helmer,et al. A survey study on major technical barriers affecting the decision to adopt cloud services , 2015, J. Syst. Softw..
[21] Sarbjeet Singh,et al. Design and Comparative Analysis of MCDM-based Multi-dimensional Trust Evaluation Schemes for Determining Trustworthiness of Cloud Service Providers , 2017, Journal of Grid Computing.
[22] Farookh Khadeer Hussain,et al. User-side cloud service management: State-of-the-art and future directions , 2015, J. Netw. Comput. Appl..
[23] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[24] Achim Streit,et al. A utility-based approach for customised cloud service selection , 2015, Int. J. Comput. Sci. Eng..
[25] Jin Li,et al. Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..
[26] Jinjun Chen,et al. Weighted principal component analysis-based service selection method for multimedia services in cloud , 2014, Computing.
[27] Jane Siegel,et al. Cloud Services Measures for Global Use: The Service Measurement Index (SMI) , 2012, 2012 Annual SRII Global Conference.
[28] Yixiong Feng,et al. A Hybrid Energy-Aware Resource Allocation Approach in Cloud Manufacturing Environment , 2017, IEEE Access.
[29] Deyi Li,et al. A new cognitive model: Cloud model , 2009, Int. J. Intell. Syst..
[30] Sherali Zeadally,et al. Managing Trust in the Cloud: State of the Art and Research Challenges , 2016, Computer.
[31] Witawas Srisa-an,et al. Significant Permission Identification for Machine-Learning-Based Android Malware Detection , 2018, IEEE Transactions on Industrial Informatics.
[32] Jin Li,et al. Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..
[33] Weiwei Lin,et al. An Ensemble Random Forest Algorithm for Insurance Big Data Analysis , 2017, IEEE Access.
[34] Sangwon Lee,et al. A Hybrid Multi-Criteria Decision-Making Model for a Cloud Service Selection Problem Using BSC, Fuzzy Delphi Method and Fuzzy AHP , 2016, Wirel. Pers. Commun..
[35] Guoyin Wang,et al. A New Multi-Step Backward Cloud Transformation Algorithm Based on Normal Cloud Model , 2014, Fundam. Informaticae.
[36] Fei Tao,et al. A chaos control optimal algorithm for QoS-based service composition selection in cloud manufacturing system , 2014, Enterp. Inf. Syst..
[37] Xinguang Peng,et al. A framework of cloud service selection based on trust mechanism , 2017, Int. J. Ad Hoc Ubiquitous Comput..
[38] Jian Shen,et al. Anonymous and Traceable Group Data Sharing in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.
[39] Desheng Dash Wu,et al. Utilizing customer satisfaction in ranking prediction for personalized cloud service selection , 2017, Decis. Support Syst..