-
1
-
-
77957700442
-
Establishing trust in cloud computing
-
Khan KM, Malluhi Q: Establishing trust in cloud computing. IT Professional 2010, 12: 20-27.
-
(2010)
IT Professional
, vol.12
, pp. 20-27
-
-
Khan, K.M.1
Malluhi, Q.2
-
3
-
-
79952398158
-
Trust and cloud services - an interview study
-
Uusitalo I, Karppinen K, Juhola A, Savola R: Trust and cloud services - an interview study. In: Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on 2010, p. 712-720.
-
(2010)
In: Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on
, pp. 712-720
-
-
Uusitalo, I.1
Karppinen, K.2
Juhola, A.3
Savola, R.4
-
4
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Jøsang A, Ismail R, Boyd C: A survey of trust and reputation systems for online service provision. Decision Support Syst 2007, 43(2): 618-644.
-
(2007)
Decision Support Syst
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
5
-
-
70749146372
-
Cloud computing - a question of trust
-
Everett C: Cloud computing - a question of trust. Computer Fraud & Security 2009, 2009(6): 5-7.
-
(2009)
Computer Fraud & Security
, vol.2009
, Issue.6
, pp. 5-7
-
-
Everett, C.1
-
6
-
-
78651450468
-
Why assumptions about cloud performance can be dangerous to your business
-
Mouline I: Why assumptions about cloud performance can be dangerous to your business. Cloud Comp J 2009, 2(3): 24-28.
-
(2009)
Cloud Comp J
, vol.2
, Issue.3
, pp. 24-28
-
-
Mouline, I.1
-
7
-
-
78650065157
-
Security and privacy challenges in cloud computing environments. Security Privacy
-
Takabi H, Joshi J, Ahn G: Security and privacy challenges in cloud computing environments. Security Privacy. IEEE 2010, 8(6): 24-31.
-
(2010)
Ieee
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.2
Ahn, G.3
-
8
-
-
74049152260
-
Hey, you, get off of my cloud! exploring information leakage in third-party compute clouds
-
Newyork: ACM Press
-
Ristenpart et al: Hey, you, get off of my cloud! exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM CCS 2009. ACM Press, Newyork; 2009. p. 199-212.
-
(2009)
In: Proceedings of the 16th ACM CCS 2009
, pp. 199-212
-
-
Ristenpart1
-
9
-
-
74049093526
-
Controllingdata in the cloud: outsourcing computation without outsourcing control
-
ACM Press, p. 85-90
-
Chow R, Golle P, Jakobsson M, Shi E, Staddon J, Masuoka R, Molina J: Controllingdata in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM workshop on Cloud computing security. ACM Press; 2009. p. 85-90.
-
(2009)
In:Proceedings of the 2009 ACM Workshop on Cloud Computing Security
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
14
-
-
78649290366
-
The nist definition of cloud computing
-
Mell P, Grance T: The nist definition of cloud computing. Nat Inst Standards Technol 2009, 53(6): 50.
-
(2009)
Nat Inst Standards Technol
, vol.53
, Issue.6
, pp. 50
-
-
Mell, P.1
Grance, T.2
-
17
-
-
84926427572
-
-
OpenCrowd Cloud taxonomy, Accessed 30 July 2012
-
OpenCrowd Cloud taxonomy: OpenCrowd Web Portal. http://cloudtaxonomy. opencrowd. com/taxonomy/ 2012.
-
(2012)
OpenCrowd Web Portal
-
-
-
19
-
-
84856200376
-
-
CSAAccessed 15 July 2012
-
CSA: Cloud Controls Matrix. https://cloudsecurityalliance. org/ 2011.
-
(2011)
Cloud Controls Matrix
-
-
-
23
-
-
0141862713
-
-
USA: Management Information Systems Research Center, University of Minnesota
-
McKnight DH, Chervany NL: The meanings of trust. Management Information Systems Research Center, University of Minnesota, USA; 1996.
-
(1996)
The Meanings of Trust
-
-
McKnight, D.H.1
Chervany, N.L.2
-
25
-
-
24944524211
-
Can we manage trust?
-
Herrmann P, Issarny V, Shiu S (eds), Proceedings, Springer, Paris, France, May 23-26, 2005
-
Jøsang A, Keser C, Dimitrakos T: Can we manage trust? Herrmann P, Issarny V, Shiu S (eds) Trust Management, Third InternationalConference, iTrust 2005, 93-107. Proceedings, Springer, Paris, France, May 23-26, 2005.
-
Trust Management, Third InternationalConference, iTrust 2005
, pp. 93-107
-
-
Jøsang, A.1
Keser, C.2
Dimitrakos, T.3
-
27
-
-
72949119922
-
Extending bayesian trust models regarding context-dependence and user friendly representation
-
New York: ACM
-
Ries S: Extending bayesian trust models regarding context-dependence and user friendly representation. In Proceedings of the 2009 ACM Symposium on Applied Computing. ACM, New York; 2009. pp 1294-1301.
-
(2009)
In: Proceedings of the 2009 ACM Symposium on Applied Computing
, pp. 1294-1301
-
-
Ries, S.1
-
28
-
-
78651467453
-
-
Technische Universität Darmstadt: PhD thesis
-
Ries S: Trust in Ubiquitous Computing. PhD thesis, Technische Universität Darmstadt; 2009.
-
(2009)
Trust in Ubiquitous Computing
-
-
Ries, S.1
-
29
-
-
84856176080
-
-
CSAAccessed 15 July 2012
-
CSA: Consensus Assessments Initiative. https://cloudsecurityalliance. org/research/initiatives/consensusassessments-initiative/ 2011.
-
(2011)
Consensus Assessments Initiative
-
-
-
30
-
-
84867659941
-
-
CSAAccessed 25 July 2012
-
CSA: Security, Trust & amp; Assurance Registry. https://cloudsecurityalliance. org/research/initiatives/star-registry/ 2011.
-
(2011)
Security, Trust & Assurance Registry
-
-
-
32
-
-
84856197926
-
-
3Tera ApplogicAccessed 11 Aug 2012
-
3Tera Applogic: 3tera's Cloud Computing SLA goes live. http://blog. 3tera. com/computing/175/ 2009.
-
(2009)
3tera's Cloud Computing SLA Goes Live
-
-
-
33
-
-
84865803077
-
-
Cloud Computing Use Cases Discussion GroupCloud Computing Use Cases Discussion Group
-
Cloud Computing Use Cases Discussion Group: Cloud computing use cases white paper Version 4. 0. Cloud Computing Use Cases Discussion Group; 2010.
-
(2010)
Cloud Computing Use Cases White Paper Version 4.0
-
-
-
35
-
-
84926427569
-
-
Cloud Commons
-
Cloud Commons: Cloud Commons Learn About SMI. http://betawww. cloudcommons. com/web/cc/about-smi 2011.
-
(2011)
Cloud Commons Learn About SMI
-
-
-
37
-
-
85005305538
-
A market for lemons
-
Akerlof G: A market for lemons. Q J Economics 1970, 84(3): 488-500.
-
(1970)
Q J Economics
, vol.84
, Issue.3
, pp. 488-500
-
-
Akerlof, G.1
-
39
-
-
84856161999
-
Distributed trust management for validating sla choreographies
-
US: Springer
-
Haq IU, Alnemr R, Paschke A, Schikuta E, Boley H, Meinel C: Distributed trust management for validating sla choreographies. In Grids and Service-Oriented Architectures for Service Level Agreements. Springer, US; 2010. pp 45-55.
-
(2010)
In: Grids and Service-Oriented Architectures for Service Level Agreements
, pp. 45-55
-
-
Haq, I.U.1
Alnemr, R.2
Paschke, A.3
Schikuta, E.4
Boley, H.5
Meinel, C.6
-
41
-
-
77949862450
-
Determining service trustworthiness in intercloud computing environments
-
Abawajy J: Determining service trustworthiness in intercloud computing environments. Int Symp Parallel Architectures, Algorithms, and Networks 2009, 0: 784-788.
-
(2009)
Int Symp Parallel Architectures, Algorithms, and Networks
, vol.0
, pp. 784-788
-
-
Abawajy, J.1
-
42
-
-
78650299224
-
A cloud-based trust model for evaluating quality of web services
-
Wang SX, Zhang L, Wang S, Qiu X: A cloud-based trust model for evaluating quality of web services. J Comput Sci Technol 2010, 25: 1130-1142.
-
(2010)
J Comput Sci Technol
, vol.25
, pp. 1130-1142
-
-
Wang, S.X.1
Zhang, L.2
Wang, S.3
Qiu, X.4
-
45
-
-
79951852502
-
Dynamic trust enhanced security model for trusted platform based services
-
Nagarajan A, Varadharajan V: Dynamic trust enhanced security model for trusted platform based services. Future Gener Comput Syst 2011, 27: 564-573.
-
(2011)
Future Gener Comput Syst
, vol.27
, pp. 564-573
-
-
Nagarajan, A.1
Varadharajan, V.2
-
54
-
-
84926426517
-
-
eBay IncAccessed 20 July 2012
-
eBay Inc: eBay homepage. http://www. ebay. com 2011.
-
(2011)
EBay Homepage
-
-
-
55
-
-
84926427564
-
-
Epinions
-
Epinions: Epinions homepage. http://www. epinions. com 2011.
-
(2011)
Epinions Homepage
-
-
-
62
-
-
44849093503
-
Reputation-based framework for high integrity sensor networks
-
Ganeriwal S, Balzano LK, Srivastava MB: Reputation-based framework for high integrity sensor networks. ACM Trans Sen Netw 2008, 4(3): 1-37.
-
(2008)
ACM Trans Sen Netw
, vol.4
, Issue.3
, pp. 1-37
-
-
Ganeriwal, S.1
Balzano, L.K.2
Srivastava, M.B.3
-
64
-
-
84976546709
-
Towards a Generic Trust Model Comparison of Various Trust Update Algorithms
-
France, May 23-26, 2005. Springer-Verlag, Berlin, Heidelberg
-
Kinateder M, Baschny E, Rothermel K: Towards a Generic Trust Model Comparison of Various Trust Update Algorithms. In Proceedings of the Third International Conference on Trust Management: iTrust'05; Rocquencourt, France, May 23-26, 2005. Springer-Verlag, Berlin, Heidelberg; pp 119-134.
-
In Proceedings of the Third International Conference on Trust Management: ITrust'05; Rocquencourt
, pp. 119-134
-
-
Kinateder, M.1
Baschny, E.2
Rothermel, K.3
-
66
-
-
33745900048
-
A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks
-
Buchegger S, Le Boudec J Y: A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks. In: P2PEcon 2004, 2004.
-
(2004)
In: P2PEcon
, pp. 2004
-
-
Buchegger, S.1
Le Boudec, J.Y.2
-
67
-
-
35248892017
-
Trust-based service provider selection in open environments
-
Newyork: ACM Symposium on Applied Computing. ACM Press
-
Billhardt H, Hermoso R, Ossowski S, Centeno R: Trust-based service provider selection in open environments. In SAC '07: Proceedings of the 2007. ACM Symposium on Applied Computing. ACM Press, Newyork; 2007. pp. 1375-1380.
-
(2007)
In: SAC '07: Proceedings of the 2007
, pp. 1375-1380
-
-
Billhardt, H.1
Hermoso, R.2
Ossowski, S.3
Centeno, R.4
|