-
1
-
-
70350139817
-
In clouds shall we trust?
-
Michael B (2009) In clouds shall we trust? IEEE Security and Privacy 7(5):3-3. http://dx.doi.org/ 10.1109/MSP.2009.124
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.5
, pp. 3
-
-
Michael, B.1
-
2
-
-
70749146372
-
Cloud computing: A question of trust
-
Everett C (2009) Cloud computing: A question of trust. Computer Fraud Security 2009(6):5-7. http://dx.doi.org/10.1016/S1361-3723(09)70071-5
-
(2009)
Computer Fraud Security
, vol.2009
, Issue.6
, pp. 5-7
-
-
Everett, C.1
-
3
-
-
84865644090
-
Success factors for deploying cloud computing
-
Garrison G, Kim S, Wakefield RL (2012) Success factors for deploying cloud computing. Commun ACM 55(9):62-68. http://doi.acm.org/10.1145/2330667.2330685
-
(2012)
Commun ACM
, vol.55
, Issue.9
, pp. 62-68
-
-
Garrison, G.1
Kim, S.2
Wakefield, R.L.3
-
4
-
-
78650042649
-
Guest editors' introduction: In cloud computing we trust-but should we?
-
doi:10.1109/MSP.2010.177
-
Ghosh A, Arce I (2010) Guest editors' introduction: In cloud computing we trust-but should we? Secur Privacy, IEEE 8(6):14-16. doi:10.1109/MSP.2010.177
-
(2010)
Secur Privacy, IEEE
, vol.8
, Issue.6
, pp. 14-16
-
-
Ghosh, A.1
Arce, I.2
-
5
-
-
84926426306
-
Trust as a facilitator in cloud computing: A survey
-
doi:10.1186/2192-113X-1-19
-
Habib S, Hauke S, Ries S, Muhlhauser M (2012) Trust as a facilitator in cloud computing: a survey. J Cloud Comput Adv Syst Appl 1(1):19. doi:10.1186/2192-113X-1-19, http://www. journalofcloudcomputing.com/content/1/1/19
-
(2012)
J Cloud Comput Adv Syst Appl
, vol.1
, Issue.1
, pp. 19
-
-
Habib, S.1
Hauke, S.2
Ries, S.3
Muhlhauser, M.4
-
6
-
-
77957700442
-
Establishing trust in cloud computing
-
doi:10.1109/MITP.2010.128
-
Khan K, Malluhi Q (2010) Establishing trust in cloud computing. IT Prof 12(5):20-27. doi:10.1109/MITP.2010.128
-
(2010)
IT Prof
, vol.12
, Issue.5
, pp. 20-27
-
-
Khan, K.1
Malluhi, Q.2
-
7
-
-
77958528388
-
Establishing trust in cloud computing
-
Michael B, Dinolt G (2010) Establishing trust in cloud computing. IANewsletter 13(2):4-8. http: //iac.dtic.mil/iatac/download/Vol13_No2.pdf
-
(2010)
IANewsletter
, vol.13
, Issue.2
, pp. 4-8
-
-
Michael, B.1
Dinolt, G.2
-
8
-
-
84860763608
-
Near-real-time cloud auditing for rapid response
-
In: pp. doi:10.1109/WAINA.2012.78
-
Park J, Spetka E, Rasheed H, Ratazzi P, Han K (2012) Near-real-time cloud auditing for rapid response. In: 26th International conference on advanced information networking and applications workshops (WAINA), pp 1252-1257. doi:10.1109/WAINA.2012.78
-
(2012)
26th International conference on advanced information networking and applications workshops (WAINA)
, pp. 1252-1257
-
-
Park, J.1
Spetka, E.2
Rasheed, H.3
Ratazzi, P.4
Han, K.5
-
9
-
-
79959961301
-
Toward accountability in the cloud
-
doi:10.1109/MIC.2011.98
-
Pearson S (2011) Toward accountability in the cloud. Internet Comput IEEE 15(4):64-69. doi:10.1109/MIC.2011.98
-
(2011)
Internet Comput IEEE
, vol.15
, Issue.4
, pp. 64-69
-
-
Pearson, S.1
-
10
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
doi:10.1109/MSP.2010.186
-
Takabi H, Joshi J, Ahn G (2010) Security and privacy challenges in cloud computing environments. Secur Privacy IEEE 8(6):24-31. doi:10.1109/MSP.2010.186
-
(2010)
Secur Privacy IEEE
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.2
Ahn, G.3
-
11
-
-
84856193158
-
Establishing trust in hybrid cloud computing environments
-
In: IEEE Computer Society, Washington, DC, USA, TRUSTCOM '11, pp doi:10.1109/TrustCom.2011.18
-
Abawajy J (2011) Establishing trust in hybrid cloud computing environments. In: Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE Computer Society, Washington, DC, USA, TRUSTCOM '11, pp 118-125. doi:10.1109/TrustCom.2011.18, http://dx.doi.org/10.1109/TrustCom.2011.18
-
(2011)
Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
, pp. 118-125
-
-
Abawajy, J.1
-
12
-
-
84856161999
-
Distributed trust management for validating sla choreographies
-
In: Wieder P, Yahyapour R, Ziegler W (eds), Springer US
-
Haq IU, Alnemr R, Paschke A, Schikuta E, Boley H, Meinel C (2010) Distributed trust management for validating sla choreographies. In: Wieder P, Yahyapour R, Ziegler W (eds) Grids and serviceoriented architectures for service level agreements, Springer US, pp 45-55. http://dx.doi.org/10. 1007/978-1-4419-7320-7_5
-
(2010)
Grids and serviceoriented architectures for service level agreements
, pp. 45-55
-
-
Haq, I.U.1
Alnemr, R.2
Paschke, A.3
Schikuta, E.4
Boley, H.5
Meinel, C.6
-
13
-
-
84862730520
-
Trust Management VI, IFIP Advances in Information and Communication Technology
-
In: Dimitrakos T, Moona R, Patel D, McKnight D (eds) vol, Springer Berlin Heidelberg
-
Pawar P, Rajarajan M, Nair S, Zisman A (2012) Trust model for optimized cloud services. In: Dimitrakos T, Moona R, Patel D, McKnight D (eds) Trust Management VI, IFIP Advances in Information and Communication Technology, vol 374, Springer Berlin Heidelberg, pp 97-112. http://dx.doi.org/10.1007/978-3-642-29852-3_7
-
(2012)
, vol.374
, pp. 97-112
-
-
Pawar, P.1
Rajarajan, M.2
Nair, S.3
Zisman, A.4
-
14
-
-
84857168731
-
-
NIST NIST CCSRWG-092, first edition. NIST
-
NIST (2011) NIST cloud computing standards roadmap, NIST CCSRWG-092, first edition. NIST. http://www.nist.gov/itl/cloud/upload/NIST_SP-500-291_Jul5A.pdf
-
(2011)
NIST cloud computing standards roadmap
-
-
-
15
-
-
0031231899
-
The many faces of trust
-
Blomqvist K (1997) The many faces of trust. Scand J Manage 13(3):271-286
-
(1997)
Scand J Manage
, vol.13
, Issue.3
, pp. 271-286
-
-
Blomqvist, K.1
-
16
-
-
0042495505
-
An integrative model of organizational trust: Past, present, and future
-
Mayer R, Davis J, Schoorman F (1995) An integrative model of organizational trust: Past, present, and future. Acad Manage Rev 20(3):709-734
-
(1995)
Acad Manage Rev
, vol.20
, Issue.3
, pp. 709-734
-
-
Mayer, R.1
Davis, J.2
Schoorman, F.3
-
17
-
-
77956378278
-
A formal-semantics-based calculus of trust
-
doi:10.1109/MIC.2010.83
-
Huang J, Nicol D (2010) A formal-semantics-based calculus of trust. Internet Comput IEEE 14(5):38-46. doi:10.1109/MIC.2010.83
-
(2010)
Internet Comput IEEE
, vol.14
, Issue.5
, pp. 38-46
-
-
Huang, J.1
Nicol, D.2
-
18
-
-
0023421571
-
Temporal logics in ai: Semantical and ontological considerations
-
Shaoham Y (1987) Temporal logics in ai: Semantical and ontological considerations. Artif Intell 33:89-104
-
(1987)
Artif Intell
, vol.33
, pp. 89-104
-
-
Shaoham, Y.1
-
19
-
-
70450214119
-
An ontology of trust: Formal semantics and transitivity
-
In:, ACM, New York, NY, USA, ICEC '06 http://doi.acm.org/10.1145/1151454.1151499
-
Huang J, Fox MS (2006) An ontology of trust: formal semantics and transitivity. In: Proceedings of the ICEC'06, ACM, New York, NY, USA, ICEC '06, pp 259-270. http://doi.acm.org/10.1145/ 1151454.1151499, http://dl.acm.org/ft_gateway.cfm?id=1151499
-
(2006)
Proceedings of the ICEC'06
, pp. 259-270
-
-
Huang, J.1
Fox, M.S.2
-
20
-
-
77950601673
-
Cloud security with virtualized defense and reputation-based trust mangement
-
In: DASC '09. Eighth IEEE International Conference on, pp. doi:10.1109/DASC.2009.149
-
Hwang K, Kulkareni S, Hu Y (2009) Cloud security with virtualized defense and reputation-based trust mangement. In: Dependable, Autonomic and Secure Computing, 2009. DASC '09. Eighth IEEE International Conference on, pp 717-722. doi:10.1109/DASC.2009.149
-
(2009)
Dependable, Autonomic and Secure Computing, 2009
, pp. 717-722
-
-
Hwang, K.1
Kulkareni, S.2
Hu, Y.3
-
21
-
-
84926427741
-
-
CSA Cloud Security Alliance. accessed on 16 Oct. 2012
-
CSA (2011) STAR (security, trust and assurance registry) program. Cloud Security Alliance. https: //cloudsecurityalliance.org/star/. accessed on 16 Oct. 2012
-
(2011)
STAR (security, trust and assurance registry) program
-
-
-
23
-
-
84926427221
-
-
CSA Cloud Security Alliance. accessed on 16 Oct. 2012
-
CSA (2011) CSA: Security, trust and assurance registry. Cloud Security Alliance. https:// cloudsecurityalliance.org/research/initiatives/star-registry/, accessed on 16 Oct. 2012
-
(2011)
CSA: Security, trust and assurance registry
-
-
-
24
-
-
84901444748
-
-
CSC.COM
-
Knode R (2009) Digital trust in the cloud. CSC. COM. http://assets1.csc.com/lef/downloads/ Digital_Trust_in_the_Cloud.pdf
-
(2009)
Digital trust in the cloud
-
-
Knode, R.1
-
25
-
-
84882177880
-
-
CSC, Cloudtrust protocol (CTP). accessed on 16 Oct. 2012
-
CSC (2011) Cloudtrust protocol (CTP). Cloud Security Alliance. https://cloudsecurityalliance.org/ research/ctp/. accessed on 16 Oct. 2012
-
(2011)
Cloud Security Alliance
-
-
-
30
-
-
84926427739
-
-
AICPA., SSAE 16. AICPA. accessed on 16 Oct. 2012
-
AICPA. (2010) SSAE 16. AICPA. http://www.aicpa.org/Research/Standards/AuditAttest/Pages/ SSAE.aspx. accessed on 16 Oct. 2012
-
(2010)
-
-
-
31
-
-
84926427738
-
-
IAASB International Auditing and Assurance Standards Board. accessed on 16 Oct. 2012
-
IAASB (2009) ISAE 3402. International Auditing and Assurance Standards Board. http://www.ifac. org/sites/default/files/downloads/b014-2010-iaasb-handbook-isae-3402.pdf. accessed on 16 Oct. 2012
-
(2009)
ISAE 3402
-
-
-
34
-
-
51049122345
-
-
IETF
-
Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk W (2008) Internet x.509 public key infrastructure certificate and certificate revocation list (CRL) profile. IETF. http://www.ietf.org/rfc/ rfc5280.txt
-
(2008)
Internet x.509 public key infrastructure certificate and certificate revocation list (CRL) profile
-
-
Cooper, D.1
Santesson, S.2
Farrell, S.3
Boeyen, S.4
Housley, R.5
Polk, W.6
-
36
-
-
29844444091
-
Propagation models for trust and distrust in social networks
-
doi
-
Ziegler CN, Lausen G (2005) Propagation models for trust and distrust in social networks. Inf Syst Front 7(4-5):337-358. doi:http://dx.doi.org/10.1007/s10796-005-4807-3
-
(2005)
Inf Syst Front
, vol.7
, Issue.4-5
, pp. 337-358
-
-
Ziegler, C.N.1
Lausen, G.2
-
38
-
-
84926427735
-
-
Enomaly Inc., Enomaly Inc., accessed on 18 Jan. 2013
-
Enomaly Inc. (2010) SportCloud: Global market for cloud capacity. Enomaly Inc. http://spotcloud. com, accessed on 18 Jan. 2013
-
(2010)
SportCloud: Global market for cloud capacity
-
-
|