메뉴 건너뛰기




Volumn , Issue , 2010, Pages 540-544

Family gene based Cloud Trust model

Author keywords

Cloud family; Cloud trust; Family gene; Gene assignment; Gene identification

Indexed keywords

FAMILY GENE; FORMAL DEFINITION; GENE IDENTIFICATION; PUBLIC KEY INFRASTRUCTURE; REAL TIME PERFORMANCE; TRUST MODELS;

EID: 77956459638     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICENT.2010.5532096     Document Type: Conference Paper
Times cited : (10)

References (12)
  • 3
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing
    • Elsevier Science, Amsterdam, The Netherlands, June
    • R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing," in the 5th Utility. Future Generation Computer Systems, 25(6): 599-616, Elsevier Science, Amsterdam, The Netherlands, June 2009.
    • (2009) The 5th Utility. Future Generation Computer Systems , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 5
    • 0037362986 scopus 로고    scopus 로고
    • Role-based access control with X.509 attribute certificates
    • D.W. Chadwick, A. Otenko, E. Ball., "Role-based Access Control with X.509 Attribute Certificates," IEEE Internet Computing (2003) 62-69 2003.
    • (2003) IEEE Internet Computing , Issue.2003 , pp. 62-69
    • Chadwick, D.W.1    Otenko, A.2    Ball, E.3
  • 7
    • 0041429279 scopus 로고    scopus 로고
    • A mule cloned from fetal cells by nuclear transfer
    • G.L. Woods et al, "A mule cloned from fetal cells by nuclear transfer. Science, "vol. 301 (2003) 1063.
    • (2003) Science , vol.301 , pp. 1063
    • Woods, G.L.1
  • 8
    • 33744795217 scopus 로고    scopus 로고
    • An immune based dynamic intrusion detection model
    • DOI 10.1360/982005-62
    • T. Li, "An immune based dynamic intrusion detection model," Chinese Science Bulletin, vol. 50 (2005) 2650-2657. (Pubitemid 44561001)
    • (2005) Chinese Science Bulletin , vol.50 , Issue.22 , pp. 2650-2657
    • Li, T.1
  • 9
    • 33744816550 scopus 로고    scopus 로고
    • An immunity based network security risk estimation
    • T. Li, "An immunity based network security risk estimation," Science in China Ser. F Information Sciences, vol. 48 (2005) 557-578.
    • (2005) Science in China Ser. F Information Sciences , vol.48 , pp. 557-578
    • Li, T.1
  • 10
    • 0036728587 scopus 로고    scopus 로고
    • Improvement of nonviral gene therapy by Epstein-Barr virus (EBV)-based plasmid vectors
    • O. Mazda, "Improvement of nonviral gene therapy by Epstein-Barr virus (EBV)-based plasmid vectors," Curr Gene Ther, vol. 2 (2002) 379-392.
    • (2002) Curr Gene Ther , vol.2 , pp. 379-392
    • Mazda, O.1
  • 11
    • 70449483229 scopus 로고    scopus 로고
    • Modeling and simulation of scalable cloud computing environments and the CloudSim toolkit: Challenges and opportunities
    • (HPCS 2009, ISBN: 978-1-4244-4907-1, IEEE Press, New York, USA), Leipzig, Germany, June 21-24
    • Rajkumar Buyya, Rajiv Ranjan and Rodrigo N. Calheiros, "Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities," Proceedings of the 7th High Performance Computing and Simulation Conference (HPCS 2009, ISBN: 978-1-4244-4907-1, IEEE Press, New York, USA), Leipzig, Germany, June 21-24, 2009.
    • (2009) Proceedings of the 7th High Performance Computing and Simulation Conference
    • Buyya, R.1    Ranjan, R.2    Calheiros, R.N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.