[1] SAILER R, ZHANG X, JAEGER T, et al. Design and implementation of a TCG-based integrity measurement architecture[C]//Proceedings of the 13th USENIX Security Symposium. Berkley: USENIX Association, 2004, 13: Article No.16. [2] WANG S, ZHENG Z, SUN Q, et al. Cloud model for service selection[C]//Proceedings of the 2011 IEEE Conference on Computer Communications Workshops. Piscataway: IEEE, 2011: 666-671. [3] BERGER S, CÁCERES R, GOLDMAN K A, et al. vTPM: virtualizing the trusted platform module[C]//Proceedings of the 15th Conference on USENIX Security Symposium. Berkley: USENIX Association, 2006, 15: Article No. 21. [4] 孟祥怡,张光卫,刘常昱,等.基于云模型的主观信任管理模型研究[J].系统仿真学报,2007,19(14):47-54.(MENG X Y, ZHANG G W, LIU C Y, et al. Research on subjective trust management model based on cloud mode[J]. Journal of System Simulation, 2007,19(14): 47-54.) [5] LI X, ZHOU F, YANG X. A multi-dimensional trust evaluation model for large-scale P2P computing[J]. Journal of Parallel and Distributed Computing, 2011, 71(6): 837-847. [6] 杨玉丽,彭新光,付东来.基于云模型的主观信任评估机制[J].计算机工程与设计,2013,34(12):4151-4155.(YANG Y L, PENG X G, FU D L. Subjective trust evaluation mechanism based on cloud model[J]. Computer Engineering and Design, 2013, 34(12): 4151-4155.) [7] 张琳,刘婧文,王汝传,等.基于改进D-S证据理论的信任评估模型[J].通信学报,2013, 34(7):167-173.(ZHANG L, LIU J W, WANG R C, et al. Trust evaluation model based on improved D-S evidence theory[J]. Journal on Communications, 2013, 34(7): 167-173.) [8] 张仕斌,李春香.基于云模型的信任评估方法研究[J].计算机学报,2013,36(2):422-431.(ZHANG S B, XU C X. Study on the trust evaluation approach based on cloud model[J]. Chinese Journal of Computers, 2013, 36(2): 422-431.) [9] 蔡红云,杜瑞忠,田俊峰,等.基于云模型和风险估的信任模型研究[J].计算机工程2012,38(23):139-142.(CAI H Y, DU R Z, TIAN J F, et al. Research of trust model based on cloud model and risk evaluation[J]. Computer Engineering, 2012, 38(23): 139-142.) [10] JAEGER T, SAILER R, CHANKAR U. PRIMA: policy reduced integrity measurement architecture[C]//Proceedings of the 11th ACM Symposium on Access Control Models and Technologies. New York: ACM, 2006: 19-28. [11] DINABURG A, ROYAL P, SHARIF M, et al. Ether: malware analysis via hardware virtualization extensions[C]//Proceedings of the 15th ACM Conference on Computer and Communications Security. New York: ACM, 2008: 51-62. [12] 李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995, 32(6):15-20.(LI D Y, MENG H J, SHI X M. Membership clouds and membership cloud generators[J]. Journal of Computer Research and Development, 1995, 32(6): 15-20.) [13] ZHOU Z X, XU H, WANG S P. A novel weighted trust model based on cloud[J]. Advances in Information Sciences and Service Sciences, 2011, 3(3): 115-124. [14] 胡涛,王树宗,杨建军.基于云模型的物元综合评估方法[J].海军工程大学学报,2006,18(1): 85-88.(HU T, WANG S Z, YANG J J. Matter-element integration evaluation method based on cloud model[J]. Journal of Naval University of Engineering, 2006, 18(1): 85-88.) |