Dynamic trust based access control framework for securing multi-cloud environment
RK Banyal, VK Jain, P Jain - … of the 2014 international conference on …, 2014 - dl.acm.org
Cloud Computing are used to deliver services from share pool of computing resources.
These resources are provided to the user using the internet. It has advantage over traditional …
These resources are provided to the user using the internet. It has advantage over traditional …
A Comparative Study on Cloud Gaming Platforms
Cloud computing has provided multiple challenges to software and infrastructure services. In
order to maximize the benefits of resource consolidation, most cloud providers only offer …
order to maximize the benefits of resource consolidation, most cloud providers only offer …
A survey on trust and trustworthy e-learning system
Y Liu, Y Wu - … Conference on Web Information Systems and …, 2010 - ieeexplore.ieee.org
Trust is an important topic in information security research and is oriented to increase the
reliability and performance of a web-based system in open networks. A trustworthy e …
reliability and performance of a web-based system in open networks. A trustworthy e …
Towards a trust, reputation and recommendation meta model
New trust, reputation and recommendation (TRR) models are continuously proposed.
However, the existing models lack shared bases and goals. For this reason, in this work we …
However, the existing models lack shared bases and goals. For this reason, in this work we …
Using quantified trust levels to describe authentication requirements in federated identity management
I Thomas, M Menzel, C Meinel - Proceedings of the 2008 ACM workshop …, 2008 - dl.acm.org
Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of
services offered by different service providers which in addition can be located in different …
services offered by different service providers which in addition can be located in different …
Understanding the trust of software‐intensive distributed systems
LS Gallege, DU Gamage, JH Hill… - … Practice and Experience, 2016 - Wiley Online Library
An early understanding of the trust concerns while composing a distributed system from
independently developed software services saves time and effort. It also allows the …
independently developed software services saves time and effort. It also allows the …
TrustFraMM: meta description for trust frameworks
M Vinkovits, A Zimmermann - … Security, Risk and Trust and 2012 …, 2012 - ieeexplore.ieee.org
Due to the boom in trust research new Trust Frameworks are created within short time
intervals providing specific solutions for different domains. But these frameworks miss a …
intervals providing specific solutions for different domains. But these frameworks miss a …
Formal methods applied to access control policy design, verification and enforcement
C Bertolissi - 2022 - hal.science
The evolution of classical information systems has introduced new technologies and
services for information managing and sharing. With the spread of the Internet, it is now …
services for information managing and sharing. With the spread of the Internet, it is now …
[書籍][B] An investigation of influencing factors for adopting federated identity authentication in service-oriented architecture (SOA)
Y Tadesse - 2012 - search.proquest.com
The importance of information security has made many organizations to invest and utilize
effective information security controls within the information systems (IS) architecture. An …
effective information security controls within the information systems (IS) architecture. An …
[PDF][PDF] Extension of the trusted cloud domain for the composite cloud process
S Rajan, A Jairath - International Journal on Computer Science & …, 2012 - researchgate.net
Internet is a" network of networks" that consists of millions of private and public, academic,
business, and government networks of local to global scope that are linked by copper wires …
business, and government networks of local to global scope that are linked by copper wires …