[1]MELL P, GRANCE T. The NIST definition of cloud computing (draft) [J]. NIST Special Publication, 2011, 800(145): 7.
[2]FENG D, ZHANG M, ZHANG Y, et al.Study on cloud computing security [J]. Journal of Software, 2011, 22(1): 71-83. (冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.)
[3]LIN G, HE S, HUANG H, et al.Access control security model based on behavior in cloud computing environment [J]. Journal on Communications, 2012, 33(3): 59-66. (林果园,贺珊,黄皓,等.基于行为的云计算访问控制安全模型[J].通信学报,2012,33(3):59-66.)
[4]ZHAO M, YAO Z. Access control model based on RBAC in cloud computing [J]. Journal of Computer Applications, 2012, 32(S2): 267-270. (赵明斌,姚志强.基于RBAC的云计算访问控制模型[J].计算机应用,2012,32(S2):267-270.)
[5]ZHU Y, ZHANG J. Research on access control of SaaS platform [J].Computing Engineering and Applications, 2011, 47(24): 12-16. (朱养鹏,张璟.SaaS平台访问控制研究[J].计算机工程与应用,2011,47(24):12-16.)
[6]MA Q, AI Z. Access control models for cloud computing [J]. Computing Engineering and Design, 2012,33(12): 4487-4492. (马强,艾中良.面向云计算环境的访问控制模型[J].计算机工程与设计,2012,33(12):4487-4492.)
[7]JIN S, CAI H, JIANG L. Research on multi-tenant service oriented access control model [J]. Application Research of Computers, 2013, 30(7): 2136-2139. (金诗剑,蔡鸿明,姜丽红.面向服务的多租户访问控制模型研究[J].计算机应用研究,2013,30(7): 2136-2139.)
[8]FU X, WU Z, YANG P. Trust degree and attributes based RBAC authorization model [J]. Application Research of Computers, 2011, 28(2): 742-745. (符湘萍,吴振强,杨蓓.一种基于可信度和属性的 RBAC授权模型[J].计算机应用研究,2011,28(2):742-745.)
[9]WU X, ZHANG R, ZENG B, et al.A trust evaluation model for cloud computing [J]. Procardia Computer Science, 2013, 17: 1170-1177.
[10]SANDHU R S, COYNE E J, FEINSTEIN H L, et al.Role-based access control models [J]. IEEE Computer, 1996, 29(2): 38-47.
[11]TIAN L-Q, LIN C, NI Y. Evaluation of user behavior trust in cloud computing [C]// ICCASM 2010: Proceedings of the 2010 International Conference on Computer Application and System Modeling. Piscataway: IEEE, 2010: V7-567-V7-572.
[12]ZHOU X, YU T. Defense system model based on trust for cloud computing [J]. Journal of Computing Applications, 2011, 31(6): 1531-1535. (周茜,于炯.云计算下基于信任的防御系统模型[J].计算机应用,2011,31(6):1531-1535.)
[13]GUO S, TIAN L, SHEN X. Research on FAHP method in user behavior trust computation [J]. Computer Engineering and Applications, 2011, 47(12): 59-61.(郭树凯,田立勤,沈学利.FAHP在用户行为信任评估中的研究[J].计算机工程与应用,2011,47(12):59-61.)
[14]YI T, TIAN L, HU Z, et al.AHP-based user behavior evaluation method in trust worthy network [J]. Computing Engineering and Applications, 2007, 43(19): 123-126. (冀铁果,田立勤,胡志兴,等.可信网络中一种基于AHP的用户行为评估方法[J].计算机工程与应用,2007,43(19):123-126.) |