Trusted Cloud Computing with Secure Resources and Data Coloring
暂无分享,去创建一个
[1] Shanshan Song,et al. Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.
[2] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[3] Kai Hwang,et al. Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[4] Kai Hwang,et al. Collusive Piracy Prevention in P2P Content Delivery Networks , 2009, IEEE Transactions on Computers.
[5] Deyi Li,et al. A new cognitive model: Cloud model , 2009, Int. J. Intell. Syst..
[6] Kai Hwang,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[7] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[8] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[9] Akbar Ghaffarpour Rahbar,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007 .
[10] Andrew Warfield,et al. Live migration of virtual machines , 2005, NSDI.
[11] John W. Rittinghouse,et al. Cloud Computing: Implementation, Management, and Security , 2009 .
[12] Deyi Li,et al. Artificial Intelligence with Uncertainty , 2007, CIT.