Configuring trust model for cloud computing: Decision exploration using fuzzy reasoning
暂无分享,去创建一个
[1] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[2] Gilles Grimaud,et al. Large-Scale Coordinated attacks: Impact on the Cloud Security , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[3] E. Michael Maximilien,et al. A Best Practice Model for Cloud Middleware Systems , 2009 .
[4] Issa M. Khalil,et al. Cloud Computing Security: A Survey , 2014, Comput..
[5] Doan B. Hoang,et al. Towards Scalable, Fine-Grained, Intrusion-Tolerant Data Protection Models for Healthcare Cloud , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[6] Michael D. Hogan,et al. NIST Cloud Computing Standards Roadmap , 2013 .
[7] Monjur Ahmed,et al. Cloud Computing and Security Issues in the Cloud , 2014, Trinity Journal of Management, IT & Media.
[8] Nils Gruschka,et al. Attack Surfaces: A Taxonomy for Attacks on Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[9] Te-Shun Chou,et al. SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES , 2013 .
[10] Issa M. Khalil. MCC: Mitigating Colluding Collision Attacks in Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[11] John Sharp,et al. Building Hybrid Applications in the Cloud on Windows Azure , 2013 .
[12] Cong Wang,et al. Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.
[13] Aarthi,et al. Towards Secure and Dependable Storage Services in Cloud Computing , 2014 .
[14] Yong Tang,et al. Cloud Computing: A Statistics Aspect of Users , 2009, CloudCom.
[15] Shufen Zhang,et al. Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.
[16] David M. Nicol,et al. Trust mechanisms for cloud computing , 2013, Journal of Cloud Computing: Advances, Systems and Applications.
[17] P. A. Ejegwa,et al. An Overview On Intuitionistic Fuzzy Sets , 2014 .
[18] Peter Desnoyers,et al. Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing , 2011, 2011 IEEE 10th International Symposium on Network Computing and Applications.
[19] G. Aghila,et al. A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[20] Shouzhen Zeng,et al. A Projection Method for Multiple Attribute Group Decision Making with Intuitionistic Fuzzy Information , 2013, Informatica.