메뉴 건너뛰기




Volumn 18, Issue 4, 2013, Pages 321-341

A framework for enabling trust requirements in social cloud applications

Author keywords

Architecture; Framework; Social cloud; Trust and reputation requirements

Indexed keywords

COMPUTATIONAL MODEL; COMPUTATIONAL RESOURCES; DEVELOPMENT FRAMEWORKS; FRAMEWORK; GEOGRAPHICALLY DISTRIBUTED RESOURCES; SOCIAL CLOUDS; TRUST AND REPUTATION; TRUST RELATIONSHIP;

EID: 84886600253     PISSN: 09473602     EISSN: 1432010X     Source Type: Journal    
DOI: 10.1007/s00766-013-0171-x     Document Type: Article
Times cited : (20)

References (40)
  • 4
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility
    • Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6): 599-616.
    • (2009) Future Gener Comput Syst , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 5
    • 84886585504 scopus 로고    scopus 로고
    • Making better security standards: a review of the security update to MBS and a new ETSI deliverable
    • Cadzow S (2008) Making better security standards: a review of the security update to MBS and a new ETSI deliverable. Technical report, ETSI TISPAN.
    • (2008) Technical report, ETSI TISPAN
    • Cadzow, S.1
  • 13
    • 0009481412 scopus 로고    scopus 로고
    • A survey of trust in internet applications
    • Grandison T, Sloman M (2000) A survey of trust in internet applications. Commun Surv Tutor IEEE 3(4): 2-16.
    • (2000) Commun Surv Tutor IEEE , vol.3 , Issue.4 , pp. 2-16
    • Grandison, T.1    Sloman, M.2
  • 18
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2): 618-644.
    • (2007) Decis Support Syst , vol.43 , Issue.2 , pp. 618-644
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 20
  • 21
    • 3042659976 scopus 로고    scopus 로고
    • PhD thesis, University of California at Berkeley
    • Levien R (2004) Attack resistant trust metrics. PhD thesis, University of California at Berkeley.
    • (2004) Attack resistant trust metrics
    • Levien, R.1
  • 22
    • 77955396860 scopus 로고    scopus 로고
    • Assessing software service quality and trustworthiness at selection time
    • Limam N, Boutaba R (2010) Assessing software service quality and trustworthiness at selection time. IEEE Trans Softw Eng 36(4): 559-574.
    • (2010) IEEE Trans Softw Eng , vol.36 , Issue.4 , pp. 559-574
    • Limam, N.1    Boutaba, R.2
  • 24
    • 84866037455 scopus 로고    scopus 로고
    • In: Fischer-Hübner S, Katsikas S, Quirchmayr G (eds) Proceedings of 9th international conference on trust, privacy and security in digital business (TrustBus 2012) Springer Verlag, Vienna
    • Moyano F, Fernandez-Gago C, Lopez J (2012) A conceptual framework for trust models. In: Fischer-Hübner S, Katsikas S, Quirchmayr G (eds) Proceedings of 9th international conference on trust, privacy and security in digital business (TrustBus 2012), vol 7449, pp 93-104. Springer Verlag, Vienna.
    • (2012) A conceptual framework for trust models , vol.7449 , pp. 93-104
    • Moyano, F.1    Fernandez-Gago, C.2    Lopez, J.3
  • 25
    • 0141862713 scopus 로고    scopus 로고
    • Technical report, University of Minnesota, Management Information Systems Research Center
    • McKnight DH, Chervany NL (1996) The meanings of trust. Technical report, University of Minnesota, Management Information Systems Research Center.
    • (1996) The meanings of trust
    • McKnight, D.H.1    Chervany, N.L.2
  • 27
    • 34249004734 scopus 로고    scopus 로고
    • Secure tropos: a security-oriented extension of the tropos methodology
    • Mouratidis H, Giorgini P (2007) Secure tropos: a security-oriented extension of the tropos methodology. Int J Softw Eng Knowl Eng 17(2): 285-309.
    • (2007) Int J Softw Eng Knowl Eng , vol.17 , Issue.2 , pp. 285-309
    • Mouratidis, H.1    Giorgini, P.2
  • 29
    • 84879876797 scopus 로고    scopus 로고
    • Modelling security using trust based concepts
    • Pavlidis M, Mouratidis H, Islam S (2012) Modelling security using trust based concepts. IJSSE 3(2): 36-53.
    • (2012) Ijsse , vol.3 , Issue.2 , pp. 36-53
    • Pavlidis, M.1    Mouratidis, H.2    Islam, S.3
  • 35
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Takabi H, Joshi JBD, Ahn G-J (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Privacy 8(6): 24-31.
    • (2010) IEEE Secur Priv , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.D.2    Ahn, G.-J.3
  • 36
    • 49149119622 scopus 로고    scopus 로고
    • Computing in the clouds
    • Weiss A (2007) Computing in the clouds. NetWorker 11(4): 16-25.
    • (2007) NetWorker , vol.11 , Issue.4 , pp. 16-25
    • Weiss, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.