-
1
-
-
77949862450
-
Determining service trustworthiness in intercloud computing environments
-
Washington, DC, USA, IEEE Computer Society
-
Abawajy J (2009) Determining service trustworthiness in intercloud computing environments. In: Proceedings of the 2009 10th international symposium on pervasive systems, algorithms, and networks, ISPAN '09. Washington, DC, USA, IEEE Computer Society, pp 784-788.
-
(2009)
Proceedings of the 2009 10th international symposium on pervasive systems, algorithms, and networks, ISPAN '09
, pp. 784-788
-
-
Abawajy, J.1
-
2
-
-
52149094285
-
A model for trust metrics analysis
-
Springer, Berlin
-
Agudo I, Fernandez-Gago C, Lopez J (2008) A model for trust metrics analysis. In: 5th international conference on trust, privacy and security in digital business (TrustBus'08), volume 5185 of LNCS. Springer, Berlin, pp 28-37.
-
(2008)
5th international conference on trust, privacy and security in digital business (TrustBus'08), volume 5185 of LNCS
, pp. 28-37
-
-
Agudo, I.1
Fernandez-Gago, C.2
Lopez, J.3
-
4
-
-
63649117166
-
Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility
-
Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6): 599-616.
-
(2009)
Future Gener Comput Syst
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
5
-
-
84886585504
-
Making better security standards: a review of the security update to MBS and a new ETSI deliverable
-
Cadzow S (2008) Making better security standards: a review of the security update to MBS and a new ETSI deliverable. Technical report, ETSI TISPAN.
-
(2008)
Technical report, ETSI TISPAN
-
-
Cadzow, S.1
-
6
-
-
2442549069
-
Using trust for secure collaboration in uncertain environments
-
Cahill V, Gray E, Seigneur J-M, Jensen CD, Chen Y, Shand B, Dimmock N, Twigg A, Jean B, Colin E, Waleed W, Sotirios T, Paddy N, Giovannadi MS, Ciaran B, Marco C, Karl K, Mogens N (2003) Using trust for secure collaboration in uncertain environments. IEEE Pervasive Comput 2(3): 52-61.
-
(2003)
IEEE Pervasive Comput
, vol.2
, Issue.3
, pp. 52-61
-
-
Cahill, V.1
Gray, E.2
Seigneur, J.-M.3
Jensen, C.D.4
Chen, Y.5
Shand, B.6
Dimmock, N.7
Twigg, A.8
Jean, B.9
Colin, E.10
Waleed, W.11
Sotirios, T.12
Paddy, N.13
Giovannadi, M.S.14
Ciaran, B.15
Marco, C.16
Karl, K.17
Mogens, N.18
-
13
-
-
0009481412
-
A survey of trust in internet applications
-
Grandison T, Sloman M (2000) A survey of trust in internet applications. Commun Surv Tutor IEEE 3(4): 2-16.
-
(2000)
Commun Surv Tutor IEEE
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
14
-
-
78651463159
-
Cloud computing landscape and research challenges regarding trust and reputation
-
Washington, DC, USA
-
Habib SM, Ries S, Muhlhauser M (2010) Cloud computing landscape and research challenges regarding trust and reputation. In: Proceedings of the 2010 symposia and workshops on ubiquitous, autonomic and trusted computing, UIC-ATC '10, IEEE Computer Society. Washington, DC, USA, pp 410-415.
-
(2010)
Proceedings of the 2010 symposia and workshops on ubiquitous, autonomic and trusted computing, UIC-ATC '10, IEEE Computer Society
, pp. 410-415
-
-
Habib, S.M.1
Ries, S.2
Muhlhauser, M.3
-
18
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2): 618-644.
-
(2007)
Decis Support Syst
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
19
-
-
84856606278
-
-
Technical Report 2011-2010, Universittsbibliothek der Universitt Augsburg, Universittsstr. 22, 86159 Augsburg
-
Kiefhaber R, Siefert F, Anders G, Ungerer T, Reif W (2011) The trust-enabling middleware: introduction and application. Technical Report 2011-2010, Universittsbibliothek der Universitt Augsburg, Universittsstr. 22, 86159 Augsburg, http://opus. bibliothek. uni-augsburg. de/volltexte/2011/1733/.
-
(2011)
The trust-enabling middleware: Introduction and application
-
-
Kiefhaber, R.1
Siefert, F.2
Anders, G.3
Ungerer, T.4
Reif, W.5
-
20
-
-
84255174001
-
-
In: Ferrari E, Li N, Bertino E, Karabulut Y (eds) IFIPTM, volume 300 of IFIP conference proceedings. Springer, Berlin
-
Lee AJ, Winslett M, Perano KJ (2009) TrustBuilder2: a reconfigurable framework for trust negotiation. In: Ferrari E, Li N, Bertino E, Karabulut Y (eds) IFIPTM, volume 300 of IFIP conference proceedings. Springer, Berlin, pp 176-195.
-
(2009)
TrustBuilder2: A reconfigurable framework for trust negotiation
, pp. 176-195
-
-
Lee, A.J.1
Winslett, M.2
Perano, K.J.3
-
21
-
-
3042659976
-
-
PhD thesis, University of California at Berkeley
-
Levien R (2004) Attack resistant trust metrics. PhD thesis, University of California at Berkeley.
-
(2004)
Attack resistant trust metrics
-
-
Levien, R.1
-
22
-
-
77955396860
-
Assessing software service quality and trustworthiness at selection time
-
Limam N, Boutaba R (2010) Assessing software service quality and trustworthiness at selection time. IEEE Trans Softw Eng 36(4): 559-574.
-
(2010)
IEEE Trans Softw Eng
, vol.36
, Issue.4
, pp. 559-574
-
-
Limam, N.1
Boutaba, R.2
-
24
-
-
84866037455
-
-
In: Fischer-Hübner S, Katsikas S, Quirchmayr G (eds) Proceedings of 9th international conference on trust, privacy and security in digital business (TrustBus 2012) Springer Verlag, Vienna
-
Moyano F, Fernandez-Gago C, Lopez J (2012) A conceptual framework for trust models. In: Fischer-Hübner S, Katsikas S, Quirchmayr G (eds) Proceedings of 9th international conference on trust, privacy and security in digital business (TrustBus 2012), vol 7449, pp 93-104. Springer Verlag, Vienna.
-
(2012)
A conceptual framework for trust models
, vol.7449
, pp. 93-104
-
-
Moyano, F.1
Fernandez-Gago, C.2
Lopez, J.3
-
25
-
-
0141862713
-
-
Technical report, University of Minnesota, Management Information Systems Research Center
-
McKnight DH, Chervany NL (1996) The meanings of trust. Technical report, University of Minnesota, Management Information Systems Research Center.
-
(1996)
The meanings of trust
-
-
McKnight, D.H.1
Chervany, N.L.2
-
27
-
-
34249004734
-
Secure tropos: a security-oriented extension of the tropos methodology
-
Mouratidis H, Giorgini P (2007) Secure tropos: a security-oriented extension of the tropos methodology. Int J Softw Eng Knowl Eng 17(2): 285-309.
-
(2007)
Int J Softw Eng Knowl Eng
, vol.17
, Issue.2
, pp. 285-309
-
-
Mouratidis, H.1
Giorgini, P.2
-
28
-
-
84867177932
-
Security and trust issues in semantic grids
-
Olmedilla D, Rana OF, Matthews B, Nejdl W (2005) Security and trust issues in semantic grids. In: Proceedings of the dagstuhl seminar, semantic grid: the convergence of technologies 5271.
-
(2005)
Proceedings of the dagstuhl seminar, semantic grid: The convergence of technologies
, pp. 5271
-
-
Olmedilla, D.1
Rana, O.F.2
Matthews, B.3
Nejdl, W.4
-
29
-
-
84879876797
-
Modelling security using trust based concepts
-
Pavlidis M, Mouratidis H, Islam S (2012) Modelling security using trust based concepts. IJSSE 3(2): 36-53.
-
(2012)
Ijsse
, vol.3
, Issue.2
, pp. 36-53
-
-
Pavlidis, M.1
Mouratidis, H.2
Islam, S.3
-
34
-
-
34247093189
-
Architectural support for trust models in decentralized applications
-
ACM Press, New York
-
Suryanarayana G, Diallo MH, Erenkrantz JR, Taylor RN (2006) Architectural support for trust models in decentralized applications. In: Proceeding of the 28th international conference. ACM Press, New York, pp 52-61.
-
(2006)
Proceeding of the 28th international conference
, pp. 52-61
-
-
Suryanarayana, G.1
Diallo, M.H.2
Erenkrantz, J.R.3
Taylor, R.N.4
-
35
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
Takabi H, Joshi JBD, Ahn G-J (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Privacy 8(6): 24-31.
-
(2010)
IEEE Secur Priv
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.-J.3
-
36
-
-
49149119622
-
Computing in the clouds
-
Weiss A (2007) Computing in the clouds. NetWorker 11(4): 16-25.
-
(2007)
NetWorker
, vol.11
, Issue.4
, pp. 16-25
-
-
Weiss, A.1
-
38
-
-
0036871183
-
Negotiating trust on the web
-
Winslett M, Yu T, Seamons KE, Hess A, Jacobson J, Jarvis R, Smith B, Yu L (2002) Negotiating trust on the web. IEEE Internet Comput 6(6): 30-37.
-
(2002)
IEEE Internet Comput
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
39
-
-
77955358419
-
Reputation-based QoS provisioning in cloud computing via dirichlet multinomial model
-
Xiao Y, Lin C, Jiang Y, Chu X, Shen X (2010) Reputation-based QoS provisioning in cloud computing via dirichlet multinomial model. In: IEEE international conference on communications. IEEE, pp 1-5.
-
(2010)
IEEE international conference on communications. IEEE
, pp. 1-5
-
-
Xiao, Y.1
Lin, C.2
Jiang, Y.3
Chu, X.4
Shen, X.5
|