메뉴 건너뛰기




Volumn 2, Issue 1, 2013, Pages

Trust mechanisms for cloud computing

Author keywords

Attribute certification; Cloud audit; Cloud computing; Evidence based trust; Formal accreditation; Policy based trust; QoS; Reputation; SLA; Transparency based trust; Trust; Trust mechanisms

Indexed keywords

CLOUD COMPUTING; QUALITY OF SERVICE;

EID: 84926427038     PISSN: None     EISSN: 2192113X     Source Type: Journal    
DOI: 10.1186/2192-113X-2-9     Document Type: Article
Times cited : (210)

References (38)
  • 1
    • 70350139817 scopus 로고    scopus 로고
    • In clouds shall we trust?
    • Michael B (2009) In clouds shall we trust? IEEE Security and Privacy 7(5):3-3. http://dx.doi.org/ 10.1109/MSP.2009.124
    • (2009) IEEE Security and Privacy , vol.7 , Issue.5 , pp. 3
    • Michael, B.1
  • 2
    • 70749146372 scopus 로고    scopus 로고
    • Cloud computing: A question of trust
    • Everett C (2009) Cloud computing: A question of trust. Computer Fraud Security 2009(6):5-7. http://dx.doi.org/10.1016/S1361-3723(09)70071-5
    • (2009) Computer Fraud Security , vol.2009 , Issue.6 , pp. 5-7
    • Everett, C.1
  • 3
    • 84865644090 scopus 로고    scopus 로고
    • Success factors for deploying cloud computing
    • Garrison G, Kim S, Wakefield RL (2012) Success factors for deploying cloud computing. Commun ACM 55(9):62-68. http://doi.acm.org/10.1145/2330667.2330685
    • (2012) Commun ACM , vol.55 , Issue.9 , pp. 62-68
    • Garrison, G.1    Kim, S.2    Wakefield, R.L.3
  • 4
    • 78650042649 scopus 로고    scopus 로고
    • Guest editors' introduction: In cloud computing we trust-but should we?
    • doi:10.1109/MSP.2010.177
    • Ghosh A, Arce I (2010) Guest editors' introduction: In cloud computing we trust-but should we? Secur Privacy, IEEE 8(6):14-16. doi:10.1109/MSP.2010.177
    • (2010) Secur Privacy, IEEE , vol.8 , Issue.6 , pp. 14-16
    • Ghosh, A.1    Arce, I.2
  • 5
    • 84926426306 scopus 로고    scopus 로고
    • Trust as a facilitator in cloud computing: A survey
    • doi:10.1186/2192-113X-1-19
    • Habib S, Hauke S, Ries S, Muhlhauser M (2012) Trust as a facilitator in cloud computing: a survey. J Cloud Comput Adv Syst Appl 1(1):19. doi:10.1186/2192-113X-1-19, http://www. journalofcloudcomputing.com/content/1/1/19
    • (2012) J Cloud Comput Adv Syst Appl , vol.1 , Issue.1 , pp. 19
    • Habib, S.1    Hauke, S.2    Ries, S.3    Muhlhauser, M.4
  • 6
    • 77957700442 scopus 로고    scopus 로고
    • Establishing trust in cloud computing
    • doi:10.1109/MITP.2010.128
    • Khan K, Malluhi Q (2010) Establishing trust in cloud computing. IT Prof 12(5):20-27. doi:10.1109/MITP.2010.128
    • (2010) IT Prof , vol.12 , Issue.5 , pp. 20-27
    • Khan, K.1    Malluhi, Q.2
  • 7
    • 77958528388 scopus 로고    scopus 로고
    • Establishing trust in cloud computing
    • Michael B, Dinolt G (2010) Establishing trust in cloud computing. IANewsletter 13(2):4-8. http: //iac.dtic.mil/iatac/download/Vol13_No2.pdf
    • (2010) IANewsletter , vol.13 , Issue.2 , pp. 4-8
    • Michael, B.1    Dinolt, G.2
  • 9
    • 79959961301 scopus 로고    scopus 로고
    • Toward accountability in the cloud
    • doi:10.1109/MIC.2011.98
    • Pearson S (2011) Toward accountability in the cloud. Internet Comput IEEE 15(4):64-69. doi:10.1109/MIC.2011.98
    • (2011) Internet Comput IEEE , vol.15 , Issue.4 , pp. 64-69
    • Pearson, S.1
  • 10
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • doi:10.1109/MSP.2010.186
    • Takabi H, Joshi J, Ahn G (2010) Security and privacy challenges in cloud computing environments. Secur Privacy IEEE 8(6):24-31. doi:10.1109/MSP.2010.186
    • (2010) Secur Privacy IEEE , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.2    Ahn, G.3
  • 11
  • 13
    • 84862730520 scopus 로고    scopus 로고
    • Trust Management VI, IFIP Advances in Information and Communication Technology
    • In: Dimitrakos T, Moona R, Patel D, McKnight D (eds) vol, Springer Berlin Heidelberg
    • Pawar P, Rajarajan M, Nair S, Zisman A (2012) Trust model for optimized cloud services. In: Dimitrakos T, Moona R, Patel D, McKnight D (eds) Trust Management VI, IFIP Advances in Information and Communication Technology, vol 374, Springer Berlin Heidelberg, pp 97-112. http://dx.doi.org/10.1007/978-3-642-29852-3_7
    • (2012) , vol.374 , pp. 97-112
    • Pawar, P.1    Rajarajan, M.2    Nair, S.3    Zisman, A.4
  • 14
    • 84857168731 scopus 로고    scopus 로고
    • NIST NIST CCSRWG-092, first edition. NIST
    • NIST (2011) NIST cloud computing standards roadmap, NIST CCSRWG-092, first edition. NIST. http://www.nist.gov/itl/cloud/upload/NIST_SP-500-291_Jul5A.pdf
    • (2011) NIST cloud computing standards roadmap
  • 15
    • 0031231899 scopus 로고    scopus 로고
    • The many faces of trust
    • Blomqvist K (1997) The many faces of trust. Scand J Manage 13(3):271-286
    • (1997) Scand J Manage , vol.13 , Issue.3 , pp. 271-286
    • Blomqvist, K.1
  • 16
    • 0042495505 scopus 로고
    • An integrative model of organizational trust: Past, present, and future
    • Mayer R, Davis J, Schoorman F (1995) An integrative model of organizational trust: Past, present, and future. Acad Manage Rev 20(3):709-734
    • (1995) Acad Manage Rev , vol.20 , Issue.3 , pp. 709-734
    • Mayer, R.1    Davis, J.2    Schoorman, F.3
  • 17
    • 77956378278 scopus 로고    scopus 로고
    • A formal-semantics-based calculus of trust
    • doi:10.1109/MIC.2010.83
    • Huang J, Nicol D (2010) A formal-semantics-based calculus of trust. Internet Comput IEEE 14(5):38-46. doi:10.1109/MIC.2010.83
    • (2010) Internet Comput IEEE , vol.14 , Issue.5 , pp. 38-46
    • Huang, J.1    Nicol, D.2
  • 18
    • 0023421571 scopus 로고
    • Temporal logics in ai: Semantical and ontological considerations
    • Shaoham Y (1987) Temporal logics in ai: Semantical and ontological considerations. Artif Intell 33:89-104
    • (1987) Artif Intell , vol.33 , pp. 89-104
    • Shaoham, Y.1
  • 19
    • 70450214119 scopus 로고    scopus 로고
    • An ontology of trust: Formal semantics and transitivity
    • In:, ACM, New York, NY, USA, ICEC '06 http://doi.acm.org/10.1145/1151454.1151499
    • Huang J, Fox MS (2006) An ontology of trust: formal semantics and transitivity. In: Proceedings of the ICEC'06, ACM, New York, NY, USA, ICEC '06, pp 259-270. http://doi.acm.org/10.1145/ 1151454.1151499, http://dl.acm.org/ft_gateway.cfm?id=1151499
    • (2006) Proceedings of the ICEC'06 , pp. 259-270
    • Huang, J.1    Fox, M.S.2
  • 20
    • 77950601673 scopus 로고    scopus 로고
    • Cloud security with virtualized defense and reputation-based trust mangement
    • In: DASC '09. Eighth IEEE International Conference on, pp. doi:10.1109/DASC.2009.149
    • Hwang K, Kulkareni S, Hu Y (2009) Cloud security with virtualized defense and reputation-based trust mangement. In: Dependable, Autonomic and Secure Computing, 2009. DASC '09. Eighth IEEE International Conference on, pp 717-722. doi:10.1109/DASC.2009.149
    • (2009) Dependable, Autonomic and Secure Computing, 2009 , pp. 717-722
    • Hwang, K.1    Kulkareni, S.2    Hu, Y.3
  • 21
    • 84926427741 scopus 로고    scopus 로고
    • CSA Cloud Security Alliance. accessed on 16 Oct. 2012
    • CSA (2011) STAR (security, trust and assurance registry) program. Cloud Security Alliance. https: //cloudsecurityalliance.org/star/. accessed on 16 Oct. 2012
    • (2011) STAR (security, trust and assurance registry) program
  • 23
    • 84926427221 scopus 로고    scopus 로고
    • CSA Cloud Security Alliance. accessed on 16 Oct. 2012
    • CSA (2011) CSA: Security, trust and assurance registry. Cloud Security Alliance. https:// cloudsecurityalliance.org/research/initiatives/star-registry/, accessed on 16 Oct. 2012
    • (2011) CSA: Security, trust and assurance registry
  • 24
    • 84901444748 scopus 로고    scopus 로고
    • CSC.COM
    • Knode R (2009) Digital trust in the cloud. CSC. COM. http://assets1.csc.com/lef/downloads/ Digital_Trust_in_the_Cloud.pdf
    • (2009) Digital trust in the cloud
    • Knode, R.1
  • 25
    • 84882177880 scopus 로고    scopus 로고
    • CSC, Cloudtrust protocol (CTP). accessed on 16 Oct. 2012
    • CSC (2011) Cloudtrust protocol (CTP). Cloud Security Alliance. https://cloudsecurityalliance.org/ research/ctp/. accessed on 16 Oct. 2012
    • (2011) Cloud Security Alliance
  • 30
    • 84926427739 scopus 로고    scopus 로고
    • AICPA., SSAE 16. AICPA. accessed on 16 Oct. 2012
    • AICPA. (2010) SSAE 16. AICPA. http://www.aicpa.org/Research/Standards/AuditAttest/Pages/ SSAE.aspx. accessed on 16 Oct. 2012
    • (2010)
  • 31
    • 84926427738 scopus 로고    scopus 로고
    • IAASB International Auditing and Assurance Standards Board. accessed on 16 Oct. 2012
    • IAASB (2009) ISAE 3402. International Auditing and Assurance Standards Board. http://www.ifac. org/sites/default/files/downloads/b014-2010-iaasb-handbook-isae-3402.pdf. accessed on 16 Oct. 2012
    • (2009) ISAE 3402
  • 36
    • 29844444091 scopus 로고    scopus 로고
    • Propagation models for trust and distrust in social networks
    • doi
    • Ziegler CN, Lausen G (2005) Propagation models for trust and distrust in social networks. Inf Syst Front 7(4-5):337-358. doi:http://dx.doi.org/10.1007/s10796-005-4807-3
    • (2005) Inf Syst Front , vol.7 , Issue.4-5 , pp. 337-358
    • Ziegler, C.N.1    Lausen, G.2
  • 38
    • 84926427735 scopus 로고    scopus 로고
    • Enomaly Inc., Enomaly Inc., accessed on 18 Jan. 2013
    • Enomaly Inc. (2010) SportCloud: Global market for cloud capacity. Enomaly Inc. http://spotcloud. com, accessed on 18 Jan. 2013
    • (2010) SportCloud: Global market for cloud capacity


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.