메뉴 건너뛰기




Volumn 1, Issue , 2010, Pages

Use trust management module to achieve effective security mechanisms in cloud environment

Author keywords

Cloud computing; Security framework; Security mechanisms; Trust model

Indexed keywords

CLOUD COMPUTING; CLOUD PROVIDERS; CLOUD SERVICES; DISTRIBUTED SYSTEMS; RESOURCE NODES; SECURITY FRAMEWORK; SECURITY FRAMEWORKS; SECURITY MECHANISM; SECURITY MECHANISMS; SECURITY MODEL; SIMULATION EXPERIMENTS; TRUST DOMAIN; TRUST MANAGEMENT; TRUST MODELS; TRUST RELATIONSHIP; TRUST-BASED SECURITY;

EID: 78049392013     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICEIE.2010.5559829     Document Type: Conference Paper
Times cited : (38)

References (42)
  • 1
    • 0000212674 scopus 로고
    • On certain integrals of Lipschitz-Hankel type involving products of Bessel functions
    • April, (references)
    • G. Eason, B. Noble, and I. N. Sneddon, "On certain integrals of Lipschitz-Hankel type involving products of Bessel functions," Phil. Trans. Roy. Soc. London, vol. A247, pp. 529-551, April 1955. (references).
    • (1955) Phil. Trans. Roy. Soc. London , vol.A247 , pp. 529-551
    • Eason, G.1    Noble, B.2    Sneddon, I.N.3
  • 3
  • 4
    • 0003918059 scopus 로고    scopus 로고
    • The physiology of the grid: An open grid services architecture for distributed systems integration
    • Foster, I., Kesselman, C., Nick, J., Tuecke, S, "The Physiology of the Grid: an Open Grid Services Architecture for Distributed Systems Integration". Technical report, Global Grid Forum (2002).
    • (2002) Technical Report, Global Grid Forum
    • Foster, I.1    Kesselman, C.2    Nick, J.3    Tuecke, S.4
  • 13
    • 34447123164 scopus 로고    scopus 로고
    • Research on dynamic trust model for large scale distributed environment
    • Beijing
    • LI Xiao-Yong, GUI Xiao-Lin.: Research on Dynamic Trust Model for Large Scale Distributed Environment. Journal of Software, vol.18(6), pp.1510-1521.Beijing(2007).
    • (2007) Journal of Software , vol.18 , Issue.6 , pp. 1510-1521
    • Li, X.-Y.1    Gui, X.-L.2
  • 14
    • 35048858013 scopus 로고    scopus 로고
    • Fuzzy trust integration for security enforcement in grid computing
    • on March 22, Wuhan, China.Springer, Heidelberg (2004)
    • Shanshan Song, Kai Hwang, and Mikin Macwan.: Fuzzy Trust Integration for Security Enforcement in Grid Computing. the International Symposium on Network and Parallel Computing (NPC 2004) on March 22, 2004, Wuhan, China. pp.9-21.Springer, Heidelberg (2004).
    • (2004) The International Symposium on Network and Parallel Computing (NPC 2004) , pp. 9-21
    • Song, S.1    Hwang, K.2    Macwan, M.3
  • 15
    • 0344184104 scopus 로고    scopus 로고
    • PKI security for JXTA overlay network
    • TR-I2-03-06, Palo Alto
    • Altman J.: PKI Security for JXTA Overlay Network, Technical Report, TR-I2-03-06, Palo Alto;Sun Microsystem (2003).
    • (2003) Technical Report, Sun Microsystem
    • Altman, J.1
  • 16
    • 0033314753 scopus 로고    scopus 로고
    • An overview of PKI trust models
    • Radia Perlman, : An Overview of PKI Trust Models, IEEE Network, vol.13, pp.38-43 (1999).
    • (1999) IEEE Network , vol.13 , pp. 38-43
    • Perlman, R.1
  • 17
    • 3042525923 scopus 로고    scopus 로고
    • A recommendation- based peer-to-peer trust model
    • Beijing
    • Wen Dou, Huaimin Wang, Yan Jia, Peng Zou. A Recommendation- Based Peer-to-Peer Trust Model. Software Journal, vol.15(4), pp.571- 583.Beijing(200c4).
    • (2004) Software Journal , vol.15 , Issue.4 , pp. 571-583
    • Dou, W.1    Wang, H.2    Jia, Y.3    Zou, P.4
  • 18
    • 71749101889 scopus 로고    scopus 로고
    • A trust evaluation model based on behavior in grid environment
    • Chengdu
    • Zhiqin Gan, Guosun Zeng.: A Trust Evaluation Model Based on Behavior in Grid Environment. Computer Application and Software, vol.22(2), pp.63-64.Chengdu(2005).
    • (2005) Computer Application and Software , vol.22 , Issue.2 , pp. 63-64
    • Gan, Z.1    Zeng, G.2
  • 19
    • 20144377734 scopus 로고    scopus 로고
    • A grid&P2P trust model based on recommendation evidence reasoning
    • Beijing
    • Junmao Zhu, Shoubao Yang, Jianping Fan, Mingyu Chen.: A Grid&P2P Trust Model Based on Recommendation Evidence Reasoning. Journal of Computer Research and Development. vol.42(5), pp.797-803.Beijing(2005).
    • (2005) Journal of Computer Research and Development , vol.42 , Issue.5 , pp. 797-803
    • Zhu, J.1    Yang, S.2    Fan, J.3    Chen, M.4
  • 27
    • 70449483229 scopus 로고    scopus 로고
    • Modeling and simulation of scalable cloud computing environments and the cloudsim toolkit: Challenges and opportunities
    • IEEE Computer Society, June
    • Rajkumar Buyya, Rajiv Ranjan and Rodrigo N. Calheiros "Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities".In: Proc. of the 7th High Performance Computing and Simulation Conference (HPCS09), IEEE Computer Society, June 2009.
    • (2009) Proc. of the 7th High Performance Computing and Simulation Conference (HPCS09)
    • Buyya, R.1    Ranjan, R.2    Calheiros, R.N.3
  • 37
    • 34249080831 scopus 로고    scopus 로고
    • Service oriented architectures: Approaches, technologies and research issues
    • M. P. Papazoglou and W.-J. Heuvel, "Service oriented architectures: approaches, technologies and research issues," The VLDB Journal, vol. 16, no. 3, pp. 389-415, 2007.
    • (2007) The VLDB Journal , vol.16 , Issue.3 , pp. 389-415
    • Papazoglou, M.P.1    Heuvel, W.-J.2
  • 39
    • 33744949404 scopus 로고    scopus 로고
    • Perfsonar: A service oriented architecture for multi domain network monitoring
    • ser. Lecture Notes in Computer Science, B. B. et al. Ed., Springer
    • A. H. et al., "Perfsonar: A service oriented architecture for multi domain network monitoring," in ICSOC, ser. Lecture Notes in Computer Science, B. B. et al., Ed., vol. 3826.Springer, 2005, pp. 241-254.
    • (2005) ICSOC , vol.3826 , pp. 241-254


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.