Security Framework of Cloud Data Storage Based on Multi Agent System Architecture: Semantic Literature Review
暂无分享,去创建一个
Rusli Abdullah | A. M. Talib | Masrah Azrifah Azmi Murad | Amir Mohamed Talib | Rodziah Binti Atan | R. Abdullah | R. Atan
[1] A. Poggi,et al. Multi-User and Security Support for Multi-Agent Systems , 2001, WOA.
[2] Timothy W. Finin,et al. Developing Secure Agent Systems Using Delegation Based Trust Management , 2002, AAMAS 2002.
[3] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[4] David Wright,et al. Towards Operational Measures of Computer Security , 1993, J. Comput. Secur..
[5] Somesh Jha,et al. Minimization and Reliability Analyses of Attack Graphs , 2002 .
[6] Rusli Abdullah,et al. A framework of multi-agent system to facilitate security of cloud data storage , 2010 .
[7] Roberto Di Pietro,et al. Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..
[8] Reza Curtmola,et al. Provable data possession at untrusted stores , 2007, CCS '07.
[9] Reza Curtmola,et al. MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[10] George Cybenko,et al. D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.
[11] Daniel W. Manchala. E-Commerce Trust Metrics and Models , 2000, IEEE Internet Comput..
[12] John W. Rittinghouse,et al. Cloud Computing: Implementation, Management, and Security , 2009 .
[13] José M. Vidal,et al. Multiagent network security system using FIPA-OS , 2002, Proceedings IEEE SoutheastCon 2002 (Cat. No.02CH37283).
[14] Idit Keidar,et al. Trusting the cloud , 2009, SIGA.
[15] William J. Buchanan,et al. An intelligent agent security intrusion system , 2002, Proceedings Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems.
[16] Ami Marowka,et al. The GRID: Blueprint for a New Computing Infrastructure , 2000, Parallel Distributed Comput. Pract..
[17] Ian T. Foster,et al. GangSim: a simulator for grid scheduling studies , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..
[18] Hovav Shacham,et al. Compact Proofs of Retrievability , 2008, Journal of Cryptology.
[19] Ian Foster,et al. The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.
[20] Aladdin Ayesh,et al. Framework of multi-agents internet security system , 2000 .
[21] Henri Casanova,et al. Scheduling distributed applications: the SimGrid simulation framework , 2003, CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings..
[22] Pierre Bieber,et al. Design and implementation of a distributed interactive simulation security architecture , 1999, Proceedings 3rd IEEE International Workshop on Distributed Interactive Simulation and Real-Time Applications.
[23] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[24] Paulo S. L. M. Barreto,et al. Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..
[25] Laura Painton Swiler,et al. A graph-based network-vulnerability analysis system , 1997, S&P 1998.
[26] Ari Juels,et al. HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.
[27] Denis Gracanin,et al. Security issues in High Level Architecture based distributed simulation , 2001, Proceeding of the 2001 Winter Simulation Conference (Cat. No.01CH37304).
[28] Edmund H. Durfee,et al. Trends in Cooperative Distributed Problem Solving , 1989, IEEE Trans. Knowl. Data Eng..
[29] Rajkumar Buyya,et al. GridSim: a toolkit for the modeling and simulation of distributed resource management and scheduling for Grid computing , 2002, Concurr. Comput. Pract. Exp..
[30] James E. Smith,et al. Virtual machines - versatile platforms for systems and processes , 2005 .
[31] Nicolas Lhuillier,et al. FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS , 2003 .
[32] Cong Wang,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[33] Pedro A. C. Sousa,et al. Dealing with Security within the DEEPSIA Project , 2002 .
[34] Mary Baker,et al. Auditing to Keep Online Storage Services Honest , 2007, HotOS.
[35] Leonid Sheremetov,et al. An authentication protocol for agent platform security manager , 2003, EFTA 2003. 2003 IEEE Conference on Emerging Technologies and Factory Automation. Proceedings (Cat. No.03TH8696).
[36] Stuart McClure,et al. Hacking Exposed; Network Security Secrets and Solutions , 1999 .
[37] Michael N. Huhns,et al. Making Agents Secure on the Semantic Web , 2002, IEEE Internet Comput..
[38] Stefan Poslad,et al. Towards improved trust and security in FIPA agent platforms , 2004 .
[39] Ethan L. Miller,et al. Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[40] Rusli Abdullah,et al. Formulating a security layer of cloud data storage framework based on multi agent system architecture. , 2010 .
[41] Richard M. Fujimoto,et al. The DoD High Level Architecture: an update , 1998, 1998 Winter Simulation Conference. Proceedings (Cat. No.98CH36274).