Risk Situation Assessment Model Based on Interdomain Interaction in Cloud Computing Environment
暂无分享,去创建一个
[1] Jiao Wang,et al. A Method for Information Security Risk Assessment Based on the Dynamic Bayesian Network , 2016, 2016 International Conference on Networking and Network Applications (NaNA).
[2] Hai Yan Chen,et al. Research on Information Security Risk Assessment Based on Discrete Dynamic Bayesian Network , 2014 .
[3] Eui-nam Huh,et al. mCSQAM: Service Quality Assessment Model in Mobile Cloud Services Environment , 2016, Mob. Inf. Syst..
[4] Kijoon Chae,et al. Non-redundant indirect trust search algorithm based on a cross-domain trust model in content delivery network , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[5] Claude Godart,et al. Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-Platforms , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[6] Xi Hai-lon. Simulation of Classification Optimization Model in Malicious Network Software Behavior Assessment , 2015 .
[7] Hongbin Zhang,et al. A Multi-Level Security Access Control Framework for Cross-Domain Networks , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[8] M. Sasikumar,et al. Trust Model for Measuring Security Strength of Cloud Computing Service , 2015 .
[9] Guo Yu-cui. Trust management model based on value-at-risk evaluation with changing time in P2P network , 2012 .
[10] Zhou Guo. Trust Evaluation Model Based on Role Separation , 2012 .
[11] Mohamed Cheriet,et al. Cloud Computing: A Risk Assessment Model , 2014, 2014 IEEE International Conference on Cloud Engineering.
[12] Zhan Zhang,et al. Research on a Risk Assessment Method considering Risk Association , 2016 .
[13] Jing Hu,et al. Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[14] Bin Zhao,et al. Towards more pro-active access control in computer systems and networks , 2015, Comput. Secur..
[15] Zou Xiang. Cross-domain role mapping method based on IRBAC , 2010 .
[16] Juan-Luis Gorricho,et al. Fuzzy System of Irrigation Applied to the Growth of Habanero Pepper (Capsicum chinense Jacq.) under Protected Conditions in Yucatan, Mexico , 2015, Int. J. Distributed Sens. Networks.
[17] Qiang Liu,et al. A Credible Bayesian-Based Trust Management Scheme for Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[18] Weisong Shi,et al. TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks , 2010, EWSN.
[19] Xiangjun Li,et al. Service Dynamic Trust Evaluation Model based on Bayesian Network in Distributed Computing Environment , 2015 .
[20] Qing-Kai Zeng,et al. Trust Evaluation Model Based on Role Separation: Trust Evaluation Model Based on Role Separation , 2014 .
[21] Fengli Zhang,et al. A Dynamic Access Control Model for Spatial Data , 2016, 2016 12th International Conference on Computational Intelligence and Security (CIS).
[22] Paul D. Manuel,et al. A trust model of cloud computing based on Quality of Service , 2015, Ann. Oper. Res..
[23] Zhao Bin,et al. Designs and Simulations of Multi-factor in Trust Evaluation , 2015 .
[24] Carla Merkle Westphall,et al. A framework and risk assessment approaches for risk-based access control in the cloud , 2016, J. Netw. Comput. Appl..
[25] Zhenyu Liu,et al. An Efficient Dynamic Trust Evaluation Model for Wireless Sensor Networks , 2017, J. Sensors.