Cloud Computing Threats and Provider Security Assessment
暂无分享,去创建一个
[1] Yu-Cheng Lee,et al. A new fuzzy concept approach for Kano's model , 2009, Expert Syst. Appl..
[2] Qing Tan,et al. Benefits and challenges of three cloud computing service models , 2012, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).
[3] M. H. Supriya,et al. Estimating Trust Value for Cloud Service Providers using Fuzzy Logic , 2012 .
[4] Bhavna Bharadwaj. Development of a fuzzy Likert scale for the WHO ICF to include categorical definitions on the basis of a continuum , 2007 .
[5] Mark Ryan,et al. Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..
[6] Ahmad Hedayatpanah. Fuzzy approach to Likert Spectrum in Classified levels in Surveying researches , 2011 .
[7] Chuen-Chien Lee. FUZZY LOGIC CONTROL SYSTEMS: FUZZY LOGIC CONTROLLER - PART I , 1990 .
[8] Nazanin Pilevari,et al. FUZZY LOGIC CLOUD COMPUTING USER’S SATISFACTION ASSESSMENT METHODOLOGY , 2011 .