[1] ARMBRUST M, FOX A, GRIFFITH R, et al. A view of cloud computing [J]. Commune ACM, 2010, 53(4): 50-58.
[2] 冯登国,张敏,张研,等.云计算安全研究[J].软件学报,2011,22(1):71-83.
FENG Deng-guo, ZHANG Min, ZHANG Yan, et al. Study on cloud computing security [J]. Journal of Software, 2011, 22(1): 71-83.
[3] 谢琪,吴吉义,王贵林,等.云计算中基于可转换代理签密的可证安全的认证协议[J].中国科学,2012,42(3):303-313.
XIE Qi, WU Ji-yi, WANG Gui-lin, et al. Provably secure authentication protocol based on convertible proxy signcryption in cloud computing [J]. Scientia Sinica: Informationis,2012,42(3):303-313.
[4] 杨健,汪海航,王剑,等.云计算安全问题研究综述[J].小型微型计算机系统, 2012,33(3):472-478.
YANG Jian, WANG Haihang, WANG Jian, et al. Survey on some security issues of cloud computing [J]. Journal of Chinese Computer System, 2012,33(3):472-478.
[5] 卿斯汉.保障云安全,发展云计算[J].保密科学技术,2011, 2(12):69.
QING Sihan. Protect cloud security, develop cloud computing [J]. Secrecy Science and Technology, 2011, 2(12):69.
[6] 韦凯.网格环境下信任模型及其访问控制应用的研究[D].广州:华南理工大学,2011.
WEI Kai. A dissertation submitted for the degree of doctor of philosophy [D]. Guangzhou: South China University of Technology,2011.
[7] 胡春华,陈晓红,吴敏,等.云计算中基于SLA 的服务可信协商与访问控制策略[J].中国科学:信息科学,2012,42(3):314-332.
HU Chun-hua, CHEN Xiao-hong, WU Min, et al. A service trust negotiation and access control strategy based on SLA in cloud computing [J]. Scientia Sinica: Informationis, 2012,42(3):314-332.
[8] 张焕国,赵波.可信计算[M].武汉:武汉大学出版社,2011:454-457.
[9] ROGER C.User requirements for cloud computing architecture [C]∥International Conference on Cluster,Cloud and Grid Computing. Melboume:IEEE,2010: 625-630.
[10] 胡春华,刘济波,刘建勋.云计算环境下基于信任演化及集合的服务选择[J].通信学报,2011,32(7):71-79.
HU Chunhua, LIU Jibo, LIU Jianxun. Services selection based on trust evolution and union for cloud computing [J]. Journal on Communications,2011,32(7):71-79.
[11] 谢晓兰,刘亮,赵鹏.面向云计算基于双层激励和欺骗检测的信任模型[J].电子与信息学报,2012,34(4):812-817.
XIE Xiao-lan, LIU Liang, ZHAO Peng. Trust model based on double incentive and deception detection for cloud computing [J]. Journal of Electronics and Information Technology,2012,34(4):812-817.
[12] 周茜,于炯.云计算下基于信任的防御系统模型[J].计算机应用,2011, 31(6):1531-1535.
ZHOU Qian, YU Jiong. Defense system model based on trust for cloud computing [J]. Journal of Computer Applications,2011, 31(6):1531-1535.
[13] WANG Wei,ZENG Guo-sun,TANG Da-zhong,et al.Cloud-DLS:dynamic trusted scheduling for Cloud computing [J].Expert System with Applications,2012, 39(3):2321-2329.
[14] MOHEMED A, JOHN G, AMANI S. Collaboration-based Cloud computing security management framework [C]∥Proceedings of 2011 IEEE International Conference on Cloud Computing. Washington DC: IEEE, 2011: 364-371.
[15] 胡春华,罗新星,王四春,等.云计算环境下基于信任推理的服务评价方法[J].通信学报,2011,32(12):72-81.
HU Chunhua, LUO Xin-xing, WANG Si-chun, et al. Approach of service evaluation based on trust reasoning for cloud computing [J]. Journal on Communications,2011,32(12):72-81.
[16] 熊润群,罗军舟,宋爱波,等. 云计算环境下QoS偏好感知的副本选择策略[J]. 通信学报, 2011, 32(7):93-102.
XIONG Runqun, LUO Junzhou, SONG Aibo, et al. QoS preference-aware replica selection strategy in cloud computing [J]. Journal on Communications, 2011, 32(7):93-102.
[17] CHA M, KWAK H, RODRIGUEZ P, et al. I Tube, You Tube, everybody tubes: analyzing the worlds largest user generated content video system [C]∥ Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. San Diego: ACM, 2007:114.
[18] CHENG X, DALE C, LIU J. Statistics and social network of YouTube videos [C]∥Proceedings of the 16th International Workshop on the Quality of Service. Enschede: IEEE, 2008: 229-238.
[19] FOSTER I,KESSELMAN C,NICK J M,et al.The physiology of the grid: an open grid services architecture for distributed systems integration[EB/OL]. [2012-03-05].http:∥www.globus.org/research/papers/ ogsa.pdf.
[20] 田俊峰,杜瑞忠,刘玉玲.基于结点行为特征的可信性度量模型[J]. 计算机研究与发展, 2011,48(6): 934-944.
TIAN Jun-feng, DU Rui-zhong, LIU Yu-ling. Trust evaluation model based on node behavior character [J]. Journal of Computer Research and development, 2011, 48(6): 934-944. |