To Trust or Not: A Security Signaling Game Between Service Provider and Client
暂无分享,去创建一个
[1] Rajkumar Buyya,et al. Interconnected Cloud Computing Environments , 2014, ACM Comput. Surv..
[2] R. S. Ponmagal,et al. Integration of Wireless Sensor Network with Cloud , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.
[3] Ming Zhao,et al. Game Theoretic Modeling of Security and Interdependency in a Public Cloud , 2014, 2014 IEEE 7th International Conference on Cloud Computing.
[4] Ashwini S Gulbhile,et al. Secure Radio Resource Management In Cloud Computing Based Cognitive Radio Network , 2014 .
[5] Yang Yang. Model and Analysis of User Behavior Based on Dynamic Game Theory in Cloud Computing , 2011 .
[6] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[7] Sumair Sunny,et al. HYDROSTATIC TRANSMISSION AS AN ALTERNATIVE TO CONVENTIONAL GEARBOX , 2014 .
[8] Carlos Cid,et al. Optimal Contracts for Outsourced Computation , 2014, GameSec.
[9] Hong Zhao,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[10] Sugata Sanyal,et al. Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques , 2012, ArXiv.
[11] Murat Kantarcioglu,et al. Contractual Agreement Design for Enforcing Honesty in Cloud Outsourcing , 2012, GameSec.