Analysing and evaluating malicious trust in cloud computing environments from a statistical perspective
暂无分享,去创建一个
[1] Rajkumar Buyya,et al. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..
[2] Vijay Varadharajan,et al. MobileTrust: a trust enhanced security architecture for mobile agent systems , 2010, International Journal of Information Security.
[3] Chuang Lin,et al. Model-Driven Dependability Analysis of Virtualization Systems , 2009, 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science.
[4] Wen-Chen Hu,et al. Trust Computing for Social Networking , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[5] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[6] Baomin Xu,et al. Job scheduling algorithm based on Berger model in cloud environment , 2011, Adv. Eng. Softw..
[7] Ghalem Belalem,et al. Approaches to Improve the Resources Management in the Simulator CloudSim , 2010, ICICA.
[8] Félix Gómez Mármol,et al. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems , 2010, Comput. Stand. Interfaces.
[9] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[10] Feniosky Peña-Mora,et al. A Decentralized Trust Model to Reduce Information Unreliability in Complex Disaster Relief Operations , 2006, EG-ICE.
[11] Dhananjay S. Phatak,et al. Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing , 2010, TRUST.
[12] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[13] Indrajit Ray,et al. An interoperable context sensitive model of trust , 2009, Journal of Intelligent Information Systems.
[14] Subhajyoti Bandyopadhyay,et al. Cloud computing - The business perspective , 2011, Decis. Support Syst..
[15] Naima Iltaf,et al. A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment , 2009, ISA.
[16] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[17] Dan Xing,et al. A P2P Trust Model Based on Multi-Dimensional Trust Evaluation , 2007, LSMS.
[18] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[19] Saeedeh Shekarpour,et al. Modeling and evaluation of trust with an extension in semantic web , 2010, J. Web Semant..