An interoperable context sensitive model of trust
Journal of Intelligent Information Systems
Future Generation Computer Systems
A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Trust Computing for Social Networking
ITNG '09 Proceedings of the 2009 Sixth International Conference on Information Technology: New Generations
Model-Driven Dependability Analysis of Virtualization Systems
ICIS '09 Proceedings of the 2009 Eigth IEEE/ACIS International Conference on Computer and Information Science
Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Communications of the ACM
Modeling and evaluation of trust with an extension in semantic web
Web Semantics: Science, Services and Agents on the World Wide Web
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems
Computer Standards & Interfaces
A P2P trust model based on multi-dimensional trust evaluation
LSMS'07 Proceedings of the Life system modeling and simulation 2007 international conference on Bio-Inspired computational intelligence and applications
MobileTrust: a trust enhanced security architecture for mobile agent systems
International Journal of Information Security
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
Approaches to improve the resources management in the simulator cloudsim
ICICA'10 Proceedings of the First international conference on Information computing and applications
Cloud computing - The business perspective
Decision Support Systems
Job scheduling algorithm based on Berger model in cloud environment
Advances in Engineering Software
EG-ICE'06 Proceedings of the 13th international conference on Intelligent Computing in Engineering and Architecture
Hi-index | 0.00 |
High security issue is one of the major obstacles for opening up the new cloud computing era. Trust, as a soft social security philosophy, can fight against such security threats and consequently offers a high trustworthiness cloud computing environments. In this paper, the definition of trust in clouds is given and the properties of trust are systematically analysed by referring to the social science theories. A malicious trust analysis and evaluation model is put forward, which includes: a analysing malicious trust information from the popularity, activity, and cooperation among trust entities, and acquiring the trustworthiness recommendations; and b evaluating the malicious nodes at the data level by similarity strategy, and evaluating malicious trust information at the overall level by individual and moving range control chart strategy. Simulation results conclusively demonstrate that this malicious trust analysis and evaluation model accurately detects and prevents malicious and faulty recommendations.