共 19 条
[1]
Abbadi Imad M., 2011, Information Security Technical Report, V16, P108, DOI 10.1016/j.istr.2011.08.006
[2]
Archana P, 2014, International Journal of Computer Applications, V108, P1
[3]
Trust evaluation model of cloud user based on behavior data
[J].
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS,
2018, 14 (05)
[4]
Chiregi Matin, 2018, Journal of Electrical Systems and Information Technology, V5, P608, DOI 10.1016/j.jesit.2017.09.001
[5]
Gilman even, 2017, PREPRINT
[6]
Horvath A.S., 2015, PREPRINT, DOI [10.1109/secon.2015.7132885, DOI 10.1109/SECON.2015.7132885]
[7]
A Method for Trust Quantification in Cloud Computing Environments
[J].
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS,
2016,
[8]
Establishing a Zero Trust Strategy in Cloud Computing Environment
[J].
2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020),
2020,
:248-+
[9]
Prakash P., 2018, INT C INT DAT COMM T, P1345, DOI [10.1007/978-3-030-03146-6 157, DOI 10.1007/978-3-030-03146-6157]
[10]
A Comprehensive Survey on Security in Cloud Computing
[J].
14TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2017) / 12TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2017) / AFFILIATED WORKSHOPS,
2017, 110
:465-472