Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Surveying and analyzing security, privacy and trust issues in cloud computing environments
D Sun, G Chang, L Sun, X Wang - Procedia Engineering, 2011 - Elsevier
Cloud computing is still in its infancy in spite of gaining tremendous momentum recently,
high security is one of the major obstacles for opening up the new era of the long dreamed …
high security is one of the major obstacles for opening up the new era of the long dreamed …
Detecting unfair recommendations in trust-based pervasive environments
In pervasive/ubiquitous computing environments, interacting users may evaluate their
respective trustworthiness by using historical data coming from their past interactions …
respective trustworthiness by using historical data coming from their past interactions …
A decade of security research in ubiquitous computing: results of a systematic literature review
Purpose Ever since Mark Weiser coined the term “ubiquitous computing”(ubicomp) in 1988,
there has been a general interest in proposing various solutions that would support his …
there has been a general interest in proposing various solutions that would support his …
Trust management for multimedia P2P applications in autonomic networking
In the last years, trust management has become a fundamental basis for facilitating the
cooperation between different users in peer-to-peer (P2P) multimedia applications within …
cooperation between different users in peer-to-peer (P2P) multimedia applications within …
A mechanism for detecting dishonest recommendation in indirect trust computation
Indirect trust computation based on recommendations form an important component in trust-
based access control models for pervasive environment. It can provide the service provider …
based access control models for pervasive environment. It can provide the service provider …
A framework for security of public cloud environment
M Lata, V Kumar - … Journal of Electronic Security and Digital …, 2024 - inderscienceonline.com
The majority of organisations tend to subcontract the computational requirements toward
public cloud services to minimise capital expenses. However, the desire of minimum cost …
public cloud services to minimise capital expenses. However, the desire of minimum cost …
[PDF][PDF] A novel trust management system for cloud computing IaaS providers
PD Manuel, MI Abd-El Barr… - JCMCC-Journal of …, 2011 - academia.edu
Trust is one of the most important means to improve the reliability of computing resources
provided in cloud environment and it plays an important role in commercial cloud …
provided in cloud environment and it plays an important role in commercial cloud …
[HTML][HTML] Trust prediction in online social rating networks
AMT Ali-Eldin - Ain Shams Engineering Journal, 2018 - Elsevier
Previous research on trust prediction in online social rating networks focused on users'
history of interactions in evaluating the reputation of other users, service providers or …
history of interactions in evaluating the reputation of other users, service providers or …
Modeling interaction using trust and recommendation in ubiquitous computing environment
To secure computing in pervasive environment, an adaptive trust and recommendation
based access control model (based on human notion of trust) is proposed. The proposed …
based access control model (based on human notion of trust) is proposed. The proposed …
A survey of reputation and trust mechanism in peer-to-peer network
G Shang-Fu, Z Jian-Lei - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
Security issue is becoming increasingly more important in the field of P2P (Peer-to-Peer)
technology due to its intrinsic properties, eg anonymous, dynamic, open etc. Reputation and …
technology due to its intrinsic properties, eg anonymous, dynamic, open etc. Reputation and …