Trust Based Access Control Policy in Multi-domain of Cloud Computing
暂无分享,去创建一个
[1] Su Cheng. Using trust in access control mechanism , 2007 .
[2] Roy H. Campbell,et al. IRBAC 2000: Secure Interoperability Using Dynamic Role Translation , 2000, International Conference on Internet Computing.
[3] Krishna P. Gummadi,et al. Towards Trusted Cloud Computing , 2009, HotCloud.
[4] Sai Liu,et al. A Robust Collaborative Filtering Recommendation Algorithm Based on Multidimensional Trust Model , 2013, J. Softw..
[5] Lang Bo. Access control oriented quantified trust degree representation model for distributed systems , 2010 .
[6] Dengguo Feng,et al. Study on Cloud Computing Security: Study on Cloud Computing Security , 2011 .
[7] Chen Xu-ri. Trustworthiness-Based Dynamic Access Control for Grid Application , 2008 .
[8] Zhang Hong,et al. TRBAC: Trust Based Access Control Model , 2011 .
[9] Zhang Min,et al. Study on Cloud Computing Security , 2011 .
[10] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[11] Vijay Varadharajan,et al. General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing , 2006, J. Comput..
[12] A. Sadeghi,et al. Token-Based Cloud Computing Secure Outsourcing of Data and Arbitrary Computations with Lower Latency , 2010 .
[13] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[14] Liu Yang,et al. Research on trust-based access control model in cloud computing , 2011, 2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference.
[15] Junzhou Luo,et al. A trust degree based access control in grid environments , 2009, Inf. Sci..
[16] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[17] Meina Song,et al. The design of a trust and role based access control model in cloud computing , 2011, 2011 6th International Conference on Pervasive Computing and Applications.
[18] Liangmin Guo,et al. A Recommendation Trust Method Based on Fuzzy Clustering in P2P Networks , 2013, J. Softw..
[19] Tong Wang,et al. Recent Advances in Cloud Security , 2011, J. Comput..