-
2
-
-
71749086572
-
-
Chinacloud.cn, http://www.chinacloud.cn
-
Chinacloud.cn
-
-
-
3
-
-
71749116104
-
-
Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The Physiology of the Grid: an Open Grid Services Architecture for Distributed Systems Integration. Technical report, Global Grid Forum (2002)
-
Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The Physiology of the Grid: an Open Grid Services Architecture for Distributed Systems Integration. Technical report, Global Grid Forum (2002)
-
-
-
-
4
-
-
33745733561
-
-
Publishing House of Electronics Industry, Beijing
-
Xu, Z., Feng, B., Li, W.: Cloud Computing Technology. Publishing House of Electronics Industry, Beijing (2004)
-
(2004)
Cloud Computing Technology
-
-
Xu, Z.1
Feng, B.2
Li, W.3
-
7
-
-
71749099883
-
Study on Several Trust Models in Grid Environment
-
Li, W., Wang, X., Fu, Y., Fu, Z.: Study on Several Trust Models in Grid Environment. Journal of Fuzhou University Natural Science Edition 34(2), 189-193 (2006)
-
(2006)
Journal of Fuzhou University Natural Science Edition
, vol.34
, Issue.2
, pp. 189-193
-
-
Li, W.1
Wang, X.2
Fu, Y.3
Fu, Z.4
-
8
-
-
35248873087
-
-
Blaze, M., loannidis, J., Keromytis, A.D.: Experience with the KeyNote Trust Management System. Applications and Future Directions. In: iTrust 2008, pp. 284-300 (2003)
-
Blaze, M., loannidis, J., Keromytis, A.D.: Experience with the KeyNote Trust Management System. Applications and Future Directions. In: iTrust 2008, pp. 284-300 (2003)
-
-
-
-
9
-
-
49249120535
-
A New Subjective Trust Model Based on Cloud Model
-
China, April 6-8, pp
-
Meng, X., Zhang, G., Kang, J., Li, H., Li, D.: A New Subjective Trust Model Based on Cloud Model. In: ICNSC 2008, 5th IEEE International Conference on Networking, Sensing and Control Sanya China, April 6-8, pp. 1125-1130 (2008)
-
(2008)
ICNSC 2008, 5th IEEE International Conference on Networking, Sensing and Control Sanya
, pp. 1125-1130
-
-
Meng, X.1
Zhang, G.2
Kang, J.3
Li, H.4
Li, D.5
-
10
-
-
34447123164
-
Research on Dynamic Trust Model for Large Scale Distributed Environment
-
Xiao-Yong, L.I., Xiao-Lin, G.U.I.: Research on Dynamic Trust Model for Large Scale Distributed Environment. Journal of Software 18(6), 1510-1521 (2007)
-
(2007)
Journal of Software
, vol.18
, Issue.6
, pp. 1510-1521
-
-
Xiao-Yong, L.I.1
Xiao-Lin, G.U.I.2
-
11
-
-
35048858013
-
-
Song, S., Hwang, K., Macwan, M.: Fuzzy Trust Integration for Security Enforcement in Grid Computing. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, 3222, pp. 9-21. Springer, Heidelberg (2004)
-
Song, S., Hwang, K., Macwan, M.: Fuzzy Trust Integration for Security Enforcement in Grid Computing. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol. 3222, pp. 9-21. Springer, Heidelberg (2004)
-
-
-
-
12
-
-
0344184104
-
PKI Security for JXTA Overlay Network
-
Technical Report,TR-I2-03-06, Palo Alto; Sun Microsystem
-
Altman, J.: PKI Security for JXTA Overlay Network, Technical Report,TR-I2-03-06, Palo Alto; Sun Microsystem (2003)
-
(2003)
-
-
Altman, J.1
-
13
-
-
0033314753
-
An Overview of PKI Trust Models
-
Perlman, R.: An Overview of PKI Trust Models. IEEE Network 13, 38-43 (1999)
-
(1999)
IEEE Network
, vol.13
, pp. 38-43
-
-
Perlman, R.1
-
14
-
-
3042525923
-
A Recommendation-Based Peer-to-Peer Trust Model
-
Dou, W., Wang, H., Jia, Y., Zou, P.: A Recommendation-Based Peer-to-Peer Trust Model. Software Journal 15(4), 571-583 (2004)
-
(2004)
Software Journal
, vol.15
, Issue.4
, pp. 571-583
-
-
Dou, W.1
Wang, H.2
Jia, Y.3
Zou, P.4
-
15
-
-
71749101889
-
A Trust Evaluation Model Based on Behavior in Grid Environment
-
Gan, Z., Zeng, G.: A Trust Evaluation Model Based on Behavior in Grid Environment. Computer Application and Software 22(2), 63-64 (2005)
-
(2005)
Computer Application and Software
, vol.22
, Issue.2
, pp. 63-64
-
-
Gan, Z.1
Zeng, G.2
-
16
-
-
20144377734
-
A Grid&P2P Trust Model Based on Recommendation Evidence Reasoning
-
Zhu, J., Yang, S., Fan, J., Chen, M.: A Grid&P2P Trust Model Based on Recommendation Evidence Reasoning. Journal of Computer Research and Development 42(5), 797-803 (2005)
-
(2005)
Journal of Computer Research and Development
, vol.42
, Issue.5
, pp. 797-803
-
-
Zhu, J.1
Yang, S.2
Fan, J.3
Chen, M.4
-
17
-
-
11244296240
-
A Trust Model Based Routing Protocol for Secure Ad Hoc Network
-
Li, X., Michael, R., Liu, J.: A Trust Model Based Routing Protocol for Secure Ad Hoc Network. In: Proceedings of the 2004 IEEE Aerospace Conference, vol. 2, pp. 1286-1295 (2004)
-
(2004)
Proceedings of the 2004 IEEE Aerospace Conference
, vol.2
, pp. 1286-1295
-
-
Li, X.1
Michael, R.2
Liu, J.3
-
18
-
-
4644323662
-
Enhancing Grid Security with Trust Management
-
Lin, C., Varadharajan, V., Wang, Y.: Enhancing Grid Security with Trust Management. In: Proceedings of the 2004 IEEE International Conference on Service Computing, pp. 303-310 (2004)
-
(2004)
Proceedings of the 2004 IEEE International Conference on Service Computing
, pp. 303-310
-
-
Lin, C.1
Varadharajan, V.2
Wang, Y.3
-
22
-
-
0032218229
-
A Security Architecture for Computational Grids
-
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: The 5th ACM Conference on Computer and Communication Security, pp. 83-92 (1998)
-
(1998)
The 5th ACM Conference on Computer and Communication Security
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
23
-
-
62949225623
-
Cloud Computing and Grid Computing 360-Degree Compared
-
IEEE, Los Alamitos
-
Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud Computing and Grid Computing 360-Degree Compared. In: Grid Computing Environments Workshop, GCE 2008. IEEE, Los Alamitos (2008)
-
(2008)
Grid Computing Environments Workshop, GCE
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
|