How to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this paper, a trust management model based on a cloud model is proposed. The cloud model uses a specific computation operator to achieve the transformation from qualitative concepts to quantitative computation. Additionally, this can also be used to effectively express the fuzziness, randomness and the relationship between them of the subjective trust. The node trust is divided into reputation trust and transaction trust. In addition, evaluation methods are designed, respectively. Firstly, the two-dimension trust cloud evaluation model is designed based on node’s comprehensive and trading...
Cloud computing is the technology that provides the different types of services (Saas, Paas,and IaaS...
Abstract-Due to highly distributed, non-transparency and dynamic natures of cloud computing, cloud u...
Cloud computing is a model to enable the convenient access to the network request for sharing the gr...
Abstract—The recent advances in cloud computing have risen a number of unforeseen security related i...
Although cloud computing has some eminent advantages such as low cost, resource elasticity, yet the ...
Cloud computing is a new and promising technology in which cloud resources are provided as a service...
MSc (Computer Science), North-West University, Mafikeng Campus, 2013In recent times, coupled with th...
As online trade and interactions on the internet are on the rise, a key issue is how to use simple a...
Abstract: Recent years have witnessed the development of cloud computing. How-ever, there also come ...
This book describes the design and implementation of Cloud Armor, a novel approach for credibility-b...
Edited by Jaroslaw Watrobski, Wojciech Salabun, Carlos Toro, Cecilia Zanni-Merk, Robert J. Howlett, ...
In the last few years, due to the benefit of solving large-scale computational problems, researchers...
In this paper, we propose a novel trust computation framework (TCF) for cloud services. Trust is com...
Attacks launched from the inside of the cloud are threats not only to the cloud users but also to th...
Abstract The interconnected cloud computing paradigm is gaining considerable attentio...
Cloud computing is the technology that provides the different types of services (Saas, Paas,and IaaS...
Abstract-Due to highly distributed, non-transparency and dynamic natures of cloud computing, cloud u...
Cloud computing is a model to enable the convenient access to the network request for sharing the gr...
Abstract—The recent advances in cloud computing have risen a number of unforeseen security related i...
Although cloud computing has some eminent advantages such as low cost, resource elasticity, yet the ...
Cloud computing is a new and promising technology in which cloud resources are provided as a service...
MSc (Computer Science), North-West University, Mafikeng Campus, 2013In recent times, coupled with th...
As online trade and interactions on the internet are on the rise, a key issue is how to use simple a...
Abstract: Recent years have witnessed the development of cloud computing. How-ever, there also come ...
This book describes the design and implementation of Cloud Armor, a novel approach for credibility-b...
Edited by Jaroslaw Watrobski, Wojciech Salabun, Carlos Toro, Cecilia Zanni-Merk, Robert J. Howlett, ...
In the last few years, due to the benefit of solving large-scale computational problems, researchers...
In this paper, we propose a novel trust computation framework (TCF) for cloud services. Trust is com...
Attacks launched from the inside of the cloud are threats not only to the cloud users but also to th...
Abstract The interconnected cloud computing paradigm is gaining considerable attentio...
Cloud computing is the technology that provides the different types of services (Saas, Paas,and IaaS...
Abstract-Due to highly distributed, non-transparency and dynamic natures of cloud computing, cloud u...
Cloud computing is a model to enable the convenient access to the network request for sharing the gr...