An Effective Trust Based Access Control Services for Adaptive Monitoring in Cloud Computing
Abstract
Keywords
Full Text:
PDFReferences
Apu Kapadia, Jalal Al-Muhtadi, R. Campbell, et al. “IRBAC 2000: secure interoperability using dynamic role translation,” University of Illinois, Technical Report: UI-UCDCS-R-2000-2162, 2000.
Beth T., Borcherding M., Klein B. “Valuation of trust in open networks,” Proceedings of the Third European Symposium on Research in Computer Security, Brighton: Springer-Verlag, pp. 3-18, 1994.
Bo Lang, “Access control oriented quantified trust degree representation model for distributed systems,” Journal on Communications, Dec. 2010.
Chen Jincui, Jiang Liqun, “Role-based access controlmodel of cloud computing,” Energy Procedia 13, pp. 1056-1061, 2011.
Dengguo Feng, Min Zhang, Yan Zhang, “Study on cloud computing security,” Chinese Journal of Software, vol. 22, no. 1, pp. 71-83, 2011.
Dongyan Jia, Fuzhi Zhang, Sai Liu, “A robust collaborative filtering recommendation algorithm based on multidimensional trust model,” Journal of Software, vol. 8, no. 1, pp. 11-18, Jan. 2013.
Jiyi Wu, Qianli Shen, Tong Wang, “Recent advances in cloud security,” Journal of Computers, vol. 6, no. 10, 2011.
Junchang Song, Cheng Su, “Using trust in access control mechanism,” Computer Engineering and Design, Oct. 2007.
Junzhou Luo, Xudong Ni, Jianming Yong, “A trust degree based access control in grid environments,” Information Sciences, pp. 2618–2628, 2009.
Jφsang A. “A logic for uncertain probabilities,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 9, no. 3, pp. 279-311, 2001.
Liangmin Guo, Yonglong Luo, Zhengzhen Zhou, Meijing Ji, “A recommendation trust method based on fuzzy clustering in P2P networks,” Journal of Software, vol. 8, no. 2, pp. 357-360, Feb. 2013.
Sadeghi AR, Schneider T, Winandy M. “Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency,” In: Proc. Of the 3rd Int’1 Conf. on Trust and Trustworthy Computing. Berlin: Springer-Verlag, pp. 417-429, 2010.
Santos N, Gummadi KP, Rodrigues R. “Towards trusted cloud computing,”In: Sahu S, ed, USENIX Association Proc. of the Workshop on Hot Topics in Cloud Computing 2009. San Diego, 2009.
T. Grandison, M. Sloman, “A survey of trust in Internet applications,” IEEE Communications Surveys and Tutorials, 2000.
Weiliang Zhao, Varadharajan V, Bryan G. “General methodology for analysis and modeling of trust relationships in distributed computing. Journal of Computers, vol. 1, no. 2, pp. 42-53, 2006.
Wenhui Wang, Jing Han, Meina Song, Xiaohui Wang, “The design of a trust and role based access control model in cloud computing,” Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International.
Xuri Chen, Weimin Xu, Wenfeng Shen, “Trustworthiness-based dynamic access control for grid application,” Journal of Hunan University (Natural Sciences), vol. 35, no. 7, pp. 85-89, Jul. 2008.
Zhanjiang Tan, Zhuo Tang, Renfa Li, Ahmed Sallam, Liu Yang, “Research on trust-based access control model in cloud computing,” Proceedings of 6th ICPCA, 2011.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.