Analysis of the requirements of the information security of reputation systems and scenario of using reputation systems in the cloud computing environment

被引:0
|
作者
Abdullaeva F.D. [1 ]
机构
[1] Institute of Information Technologies of National Academy of Sciences of Azerbaijan, Baku
关键词
Application areas; Cloud computing environment; Management of identifications; Reputation systems; Scenario of using; Security requirements;
D O I
10.1615/JAutomatInfScien.v48.i7.80
中图分类号
学科分类号
摘要
The analysis of application areas of reputation systems, their role at management of identifications in the environment of cloud computing, and the works which are carried out in this direction is given. The main components of reputation systems, security requirements, needed while their design, are defined. © 2016 by Begell House Inc.
引用
收藏
页码:77 / 87
页数:10
相关论文
共 22 条
  • [1] A reference model for designing effective reputation information systems
    Rein, GL
    JOURNAL OF INFORMATION SCIENCE, 2005, 31 (05) : 365 - 380
  • [2] POSTER: On Trust Evaluation with Missing Information in Reputation Systems
    Gong, Xi
    Yu, Ting
    Lee, Adam J.
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 773 - 775
  • [3] Quantifying Satisfaction of Security Requirements of Cloud Software Systems
    Nhlabatsi, Armstrong
    Khan, Khaled M. D.
    Hong, Jin B.
    Kim, Dong Seong
    Fernandez, Rachael
    Fetais, Noora
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 426 - 444
  • [4] RepFD - Using reputation systems to detect failures in large dynamic networks
    Veron, Maxime
    Marin, Olivier
    Monnet, Sebastien
    Sens, Pierre
    2015 44TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING (ICPP), 2015, : 91 - 100
  • [5] Preventing privacy-invasive software using collaborative reputation systems
    Boldt, Martin
    Carlsson, Bengt
    Larsson, Tobias
    Linden, Niklas
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2007, 4721 : 142 - +
  • [6] A business process-based method on security requirements analysis of information systems
    Yu, ZW
    Tang, RZ
    Ye, FB
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2: MODERN INDUSTRIAL ENGINEERING AND INNOVATION IN ENTERPRISE MANAGEMENT, 2005, : 1005 - 1009
  • [7] Detecting false testimonies in reputation systems using self-organizing maps
    Bankovic, Z.
    Vallejo, J. C.
    Fraga, D.
    Moya, J. M.
    LOGIC JOURNAL OF THE IGPL, 2013, 21 (04) : 549 - 559
  • [8] The Effects of Perceived Information Quality and Perceived System Quality on Trust and Adoption of Online Reputation Systems
    Komiak, Sherrie
    Ilyas, Irfan
    AMCIS 2010 PROCEEDINGS, 2010,
  • [9] Secure Information Systems development -: Based on a security requirements engineering process
    Mellado, Daniel
    Fernandez-Medina, Eduardo
    Piattini, Mario
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 467 - +
  • [10] Fraud Detection in Reputation Systems in e-Markets using Logistic Regression and Stepwise Optimization
    Maranzato, Rafael
    Pereira, Adriano
    Neubert, Marden
    do Lago, Alair Pereira
    APPLIED COMPUTING REVIEW, 2010, 11 (01): : 14 - 26