Improved TOPSIS Method Based Trust Evaluation Framework for Determining Trustworthiness of Cloud Service Providers
暂无分享,去创建一个
[1] Jie Wu,et al. Consistency as a Service: Auditing Cloud Consistency , 2014, IEEE Transactions on Network and Service Management.
[2] Matthias Ehrgott,et al. Multiple criteria decision analysis: state of the art surveys , 2005 .
[3] Rajkumar Buyya,et al. A framework for ranking of cloud computing services , 2013, Future Gener. Comput. Syst..
[4] Catherine Everett,et al. Cloud computing – A question of trust , 2009 .
[5] David M. Nicol,et al. Trust mechanisms for cloud computing , 2013, Journal of Cloud Computing: Advances, Systems and Applications.
[6] Christoph Meinel,et al. Distributed Trust Management for Validating SLA Choreographies , 2010 .
[7] Khaled M. Khan,et al. Establishing Trust in Cloud Computing , 2010, IT Professional.
[8] Gary Garrison,et al. Success factors for deploying cloud computing , 2012, CACM.
[9] Elisa Bertino,et al. Privacy-preserving Digital Identity Management for Cloud Computing , 2009, IEEE Data Eng. Bull..
[10] Shanlin Yang,et al. A novel two-stage model for cloud service trustworthiness evaluation , 2014, Expert Syst. J. Knowl. Eng..
[11] Ching-Lai Hwang,et al. Multiple Attribute Decision Making: Methods and Applications - A State-of-the-Art Survey , 1981, Lecture Notes in Economics and Mathematical Systems.
[12] Changyong Liang,et al. Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems , 2014, Knowl. Based Syst..
[13] Martin Knahl,et al. Validating Cloud Infrastructure Changes by Cloud Audits , 2012, 2012 IEEE Eighth World Congress on Services.
[14] Subhajyoti Bandyopadhyay,et al. Cloud Computing - The Business Perspective , 2011, 2011 44th Hawaii International Conference on System Sciences.
[15] Quan Z. Sheng,et al. Trust as a Service: A Framework for Trust Management in Cloud Environments , 2011, WISE.
[16] Sachin Shetty,et al. Auditing and Analysis of Network Traffic in Cloud Environment , 2013, 2013 IEEE Ninth World Congress on Services.
[17] Kai Hwang,et al. Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[18] C. Hwang. Multiple Objective Decision Making - Methods and Applications: A State-of-the-Art Survey , 1979 .
[19] Shanshan Song,et al. Trusted Grid Computing with Security Binding and Trust Integration , 2005, Journal of Grid Computing.
[20] Thomas L. Saaty,et al. Theory and Applications of the Analytic Network Process: Decision Making With Benefits, Opportunities, Costs, and Risks , 2005 .
[21] Max Mühlhäuser,et al. Trust as a facilitator in cloud computing: a survey , 2012, Journal of Cloud Computing: Advances, Systems and Applications.
[22] Muthucumaru Maheswaran,et al. Trust Brokering and Its Use for Resource Matchmaking in Public-Resource Grids , 2006, Journal of Grid Computing.
[23] Yuqiong Sun,et al. Cloud Verifier: Verifiable Auditing Service for IaaS Clouds , 2013, 2013 IEEE Ninth World Congress on Services.
[24] Yong Zhao,et al. Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.
[25] Joon S. Park,et al. Near-Real-Time Cloud Auditing for Rapid Response , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[26] Kaliappa Nadar Ravindran. QoS Auditing for Evaluation of SLA in Cloud-based Distributed Services , 2013, 2013 IEEE Ninth World Congress on Services.
[27] Jin Tong,et al. NIST cloud computing standards roadmap :: version 1.0 , 2011 .
[28] Borja Sotomayor,et al. Virtual Infrastructure Management in Private and Hybrid Clouds , 2009, IEEE Internet Computing.
[29] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[30] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[31] Siani Pearson,et al. Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[32] Iván Arce,et al. Guest Editors' Introduction: In Cloud Computing We Trust - But Should We? , 2010, IEEE Secur. Priv..
[33] John Viega,et al. Cloud Computing and the Common Man , 2009, Computer.
[34] Sally I. McClean,et al. Cache performance models for quality of service compliance in storage clouds , 2013, Journal of Cloud Computing: Advances, Systems and Applications.
[35] Harry G. Perros,et al. A novel trust management framework for multi-cloud environments based on trust service providers , 2014, Knowl. Based Syst..
[36] Lukas Kencl,et al. CLAudit: Planetary-scale cloud latency auditing platform , 2013, 2013 IEEE 2nd International Conference on Cloud Networking (CloudNet).
[37] Andrés García-García,et al. Cloud Services Representation using SLA Composition , 2014, Journal of Grid Computing.
[38] Michael D. Hogan,et al. NIST Cloud Computing Standards Roadmap , 2013 .
[39] R. Venkata Rao,et al. Decision Making in Manufacturing Environment Using Graph Theory and Fuzzy Multiple Attribute Decision Making Methods , 2013 .
[40] Muttukrishnan Rajarajan,et al. Trust Model for Optimized Cloud Services , 2012, IFIPTM.
[41] Kai Hwang,et al. Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.
[42] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[43] Zhixiong Chen,et al. IT Auditing to Assure a Secure Cloud Computing , 2010, 2010 6th World Congress on Services.
[44] Salvatore Venticinque,et al. An SLA-based Broker for Cloud Infrastructures , 2013, Journal of Grid Computing.
[45] Jihong Yan,et al. Understanding the Approach for Auditing of Cloud Computing System , 2010, 2010 Second International Conference on Information Technology and Computer Science.
[46] R Ramanathan,et al. A note on the use of the analytic hierarchy process for environmental impact assessment. , 2001, Journal of environmental management.
[47] Jemal H. Abawajy,et al. Establishing Trust in Hybrid Cloud Computing Environments , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[48] Dave Cliff,et al. A financial brokerage model for cloud computing , 2011, Journal of Cloud Computing: Advances, Systems and Applications.
[49] M. Roberts Masillamani,et al. Design and auditing of Cloud computing security , 2010, 2010 Fifth International Conference on Information and Automation for Sustainability.
[50] Sherali Zeadally,et al. Trust management of services in cloud environments: Obstacles and solutions , 2013, CSUR.