Computer Science ›› 2016, Vol. 43 ›› Issue (8): 105-109.doi: 10.11896/j.issn.1002-137X.2016.08.022
Previous Articles Next Articles
SHU Jian and LIANG Chang-yong
[1] Lin C,Su W B,Meng K,et al.Cloud Computing Security:Architecture Mechanism and Modeling [J].Chinese Journal of Computer,2013,36(9):1765-1784(in Chinese) 林闯,苏文博,孟坤,等.云计算安全:架构,机制与模型评价[J].计算机学报,2013,36(9):1765-1784 [2] Kirthica S,Sridhar R.Solution for Traversal Vulnerability and an Encryption-Based Security Solution for an Inter-cloud Environment [M]∥Computational Intelligence in Data Mining.Vo-lume 2,Springer India,2015:283-291 [3] Yu Neng-hai,et al.Review of cloud computing security[J].Acta Electronica Sinica,2013,1(2):371-381(in Chinese) 俞能海,等.云安全研究进展综述[J].电子学报,2013,1(2):371-381 [4] Feng Chao-sheng,et al.Key Techniques of Access Control for Cloud Computing[J].Acta Electronica Sinica,2015,43(2):312-319(in Chinese) 冯朝胜,等.云计算环境下访问控制关键技术[J].电子学报,2015,3(2):312-319 [5] Zacharia G,Moukas A,Maes P.Collaborative reputation mechanisms for electronic market places[J].Decision Support Systems,2000,9(4):371-388 [6] Li Xiao-yong,Gui Xiao-lin.Research on Dynamic Trust Model for Large Scale Distributed Environment[J].Journal of Software,2007(6):1510-1521(in Chinese) 李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007(6):1510-1521 [7] Blaze M,et al.Decentralized Trust Management[C]∥Procee-dings of 1996 IEEE Symposium on Security and Privacy.IEEE,1996:164-173 [8] Yang M H,Wang Z P,Yao J J.Research on a new cloud trust model and its defense abilities [J].Manufacturing and Enginee-ring Technology,2014,1(1):399-405 [9] Jaiganesh M,Aarthi M,Kumar A V A.Fuzzy ART-Based User Behavior Trust in Cloud Computing[M]∥Artificial Intelligence and Evolutionary Algorithms in Engineering Systems.Springer India,2015:341-348 [10] Kumar T S,Pandey S.Customization of Recommendation System Using Collaborative Filtering Algorithm on Cloud Using Mahout[M]∥Intelligent Distributed Computing.Springer International Publishing,2015:1-10 [11] Zhu Rui,Wang Huai-min,Feng Da-wei.Trustworthy ServicesSelection Based on Preference Recommendation[J].Journal of Software,2011(5):852-864(in Chinese) 朱锐,王怀民,冯大为.基于偏好推荐的可信服务选择[J].软件学报,2011(5):852-864 [12] Moghaddam M G,Mustapha N.AgeTrust:A New TemporalTrust-Based Collaborative Filtering Approach[C]∥Preceedings of 2014 International Conference on Information Science and Applications(ICISA).2014:1-4 [13] Song Guo-feng,Liang Chang-yong.A cloud security access control model based on user behavior trust[C]∥The 15th China Management Science Academic Essays.2013(in Chinese) 宋国峰,梁昌勇.一种基于用户行为信任的云安全访问控制模型[C]∥第十五届中国管理科学学术年会论文集 (下).2013 [14] Dempster A P.Upper and lower probabilities induced by a multiple valued mapping[J].The Annals of Mathematical Statistics,1967,38(2):325-339 [15] Shafer G.A mathematical theory of evidence[M].Princeton:Princeton University Press,1976 [16] 段新生.证据理论与决策、人工智能[M].北京:中国人民大学出版社,1990:13-35 [17] Sevastianov P,Dymova L,Bartosiewicz P.A framework for rule-base evidential reasoning in the interval setting applied to diagnosing type 2 diabetes[J].Expert Systems with Applications,2012,39(4):4190-4200 [18] Dempster A.Upper and Lower Probabilities Induced by Multivalued Mapping [J].Annalys of Mathematical Statistics,1967,38(2):325-339 [19] Shafer G.A mathematical theory of evidence[M].Princeton:Princeton university press,1976 [20] Zhu Jun-mao,et al.A Grid & P2P trust model based on recommendation evidence reasoning.Journal of Computer Research and Development,2005,42(5):797-803(in Chinese) 朱唆茂,等.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803 |
No related articles found! |
|