Fine-Grain Trusted Storage and Transitivity Policy for Open Network Environment
暂无分享,去创建一个
[1] Stuart E. Schechter. Toward econometric models of the security risk from remote attacks , 2005, IEEE Security & Privacy.
[2] Chen Jian-gang. Authorization delegation mechanism based trust level in grid computing , 2008 .
[3] Sun Yu. Bayesian Decision-Making Based Recommendation Trust Revision Model in Ad Hoc Networks , 2009 .
[4] Munindar P. Singh,et al. An evidential model of distributed reputation management , 2002, AAMAS '02.
[5] Li-Jun Chen,et al. Bayesian Decision-Making Based Recommendation Trust Revision Model in Ad Hoc Networks: Bayesian Decision-Making Based Recommendation Trust Revision Model in Ad Hoc Networks , 2009 .
[6] Reza,et al. Authenticated Key Agreement Protocol , 2010 .
[7] Edward W. Felten,et al. Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks? , 2003, IEEE Secur. Priv..
[8] Shuai Wang,et al. An Evaluation Approach of Subjective Trust Based on Cloud Model , 2008, CSSE.
[9] Xiao-Yong Li,et al. Cognitive Model of Dynamic Trust Forecasting: Cognitive Model of Dynamic Trust Forecasting , 2010 .
[10] Haiyan Wang,et al. The extended RBAC model based on grid computing , 2006 .
[11] Mehmet Sahinoglu,et al. Security meter: a practical decision-tree model to quantify risk , 2005, IEEE Security & Privacy Magazine.
[12] Ruchuan Wang,et al. CPK-based grid authentication: a step forward , 2007 .
[13] Haiyan Wang,et al. Trusted Decision Mechanism Based on Fuzzy Logic for Open Network , 2008, J. Comput..
[14] Peng Xue. Research on Trustworthy Networks , 2005 .
[15] Li Xiao. Cognitive Model of Dynamic Trust Forecasting , 2010 .
[16] Wei-ling Wu,et al. Reduced-Complexity Turbo Equalization for Turbo Coded MIMO/OFDM Systems , 2006 .
[17] Li Zhang,et al. Evaluation Approach of Subjective Trust Based on Cloud Model: Evaluation Approach of Subjective Trust Based on Cloud Model , 2010 .