메뉴 건너뛰기




Volumn , Issue , 2010, Pages 405-408

Application-oriented remote verification trust model in cloud computing

Author keywords

Belief; Remote verification; Trust; Trust model

Indexed keywords

APPLICATION-ORIENTED; BELIEF; COMPUTING RESOURCE; FEEDBACK MECHANISMS; FORMAL DESCRIPTION; REMOTE VERIFICATION; SECURITY CHALLENGES; SECURITY OF INFORMATION; SECURITY REQUIREMENTS; TRUST; TRUST MODEL; TRUST MODELS; TRUST VALUES; USERS ACCESS;

EID: 79952404933     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CloudCom.2010.86     Document Type: Conference Paper
Times cited : (8)

References (10)
  • 1
    • 24744467831 scopus 로고    scopus 로고
    • High Confidence Software Engineering Technologies
    • H. W. Chen, J, Wang, et al, High Confidence Software Engineering Technologies. ACTA Electronica SINICA, 2003, Vol.31, No.z1.
    • (2003) ACTA Electronica SINICA , vol.31 , Issue.Z1
    • Chen, H.W.1    Wang, J.2
  • 2
    • 20444411497 scopus 로고    scopus 로고
    • Research on Trustworthy Networks
    • C. Lin and X. H. Peng, Research on Trustworthy Networks. Chinese Journal of Computers, 2005, vol.28, No.3, pp. 751-758.
    • (2005) Chinese Journal of Computers , vol.28 , Issue.3 , pp. 751-758
    • Lin, C.1    Peng, X.H.2
  • 3
    • 77952410464 scopus 로고    scopus 로고
    • Researches and Development of Trusted Computing
    • C. X. Shen, H. G. Zhang, et al, Researches and Development of Trusted Computing, Sci China Ser F-Inf Sci, 2010, vol 40, pp.139-166.
    • (2010) Sci China Ser F-Inf Sci , vol.40 , pp. 139-166
    • Shen, C.X.1    Zhang, H.G.2
  • 4
    • 63749103850 scopus 로고    scopus 로고
    • DTM: A Dynamic Trust Management Model for Internet Computing Environments
    • J. X. Li, J. P. Huai, et al, DTM: A Dynamic Trust Management Model for Internet Computing Environments. Chinese Journal of Computers, 2009, Vol 32. No.3, pp.493-505.
    • (2009) Chinese Journal of Computers , vol.32 , Issue.3 , pp. 493-505
    • Li, J.X.1    Huai, J.P.2
  • 6
    • 0002863367 scopus 로고
    • Valuation of Trust in Open Network
    • Proceedings of the 3rd European Symposium on Research in Computer Security, Springer-Verlag, Brighton, UK
    • T. Beth, M Borcherding, et al, Valuation of Trust in Open Network. In Proceedings of the 3rd European Symposium on Research in Computer Security, LNCS 875, Springer-Verlag, Brighton, UK, pp.3-18, 1994.
    • (1994) LNCS , vol.875 , pp. 3-18
    • Beth, T.1    Borcherding, M.2
  • 9
    • 84957800809 scopus 로고    scopus 로고
    • Keynote: Trust Management for Public-Key Infrastructures. Security Protocols
    • 6th International Workshop, Springer-Verglag, Cambridge, UK
    • M. Blaze, J. Feigenbaum, et al, Keynote: Trust Management for Public-Key Infrastructures. Security Protocols, 6th International Workshop, LNCS 1550, Springer-Verglag, Cambridge, UK, pp. 59-63, 1999.
    • (1999) LNCS , vol.1550 , pp. 59-63
    • Blaze, M.1    Feigenbaum, J.2
  • 10
    • 0001843009 scopus 로고    scopus 로고
    • REFEREE: Trust Management for Web Applications
    • Y. H. Chu, J. Feigenbaum, et al, REFEREE: Trust Management for Web Applications. World Wide Web Journal, Vol.2, No.2, pp. 127-139, 1997.
    • (1997) World Wide Web Journal , vol.2 , Issue.2 , pp. 127-139
    • Chu, Y.H.1    Feigenbaum, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.