[1] ALI M, KHAN S U, VASILAKOS A V. Security in cloud computing: opportunities and challenges[J]. Information Sciences, 2015, 305: 357-383. [2] HE J, DONG M, OTA K, et al. NetSecCC: a scalable and fault-tolerant architecture for cloud computing security[J]. Peer-to-Peer Networking and Applications, 2016, 9(1): 67-81. [3] RYAN M D. Cloud computing security: the scientific challenge, and a survey of solutions[J]. The Journal of Systems and Software, 2013, 86(9): 2263-2268. [4] LIAO M S, LIANG G S, CHEN C Y. Fuzzy grey relation method for multiple criteria decision-making problems[J]. Quality & Quantity, 2013, 47(6): 3065-3077. [5] 刘勇, JEFFREY F, 刘思峰, 等. 基于区间直觉模糊的动态多属性灰色关联决策方法[J]. 控制与决策, 2013, 28(9): 1303-1308. (LIU Y, JEFFREY F, LIU S F, et al. Dynamic multiple attribute grey incidence decision making method based on interval valued intuitionisitc fuzzy number[J]. Control and Decision, 2013, 28(9): 1303-1308.) [6] LIAO H, XU Z, XIA M. Multiplicative consistency of hesitant fuzzy preference relation and its application in group decision making[J]. International Journal of Information Technology & Decision Making, 2014, 13(1): 47-76. [7] FARHADINIA B. Information measures for hesitant fuzzy sets and interval-valued hesitant fuzzy sets[J]. Information Sciences, 2013, 240: 129-144. [8] ZADEH L A. Fuzzy sets[J]. Information and Control, 1965, 8(3): 338-356. [9] TORRA V. Hesitant fuzzy sets[J]. International Journal of Intelligent Systems, 2010, 25: 529-539. [10] CHEN N, XU Z, XIA M. Interval-valued hesitant preference relations and their applications to group decision making[J]. Knowledge-Based Systems, 2013, 37: 528-540. [11] HU J, ZHANG X, CHEN X, et al. Hesitant fuzzy information measures and their applications in multi-criteria decision making[J]. International Journal of Systems Science, 2015, 47(1): 62-76. [12] JAHANSHAHLOO G R, LOTFI F H, IZADIKHAH M. An algorithmic method to extend TOPSIS for decision-making problems with interval data[J]. Applied Mathematics and Computation, 2006, 175(2): 1375-1384. [13] 郭亚军, 易平涛.线性无量纲化方法的性质分析[J]. 统计研究, 2008, 25(2): 93-100. (GUO Y J, YI P T. Character analysis of linear dimensionless methods[J]. Statistical Research, 2008, 25(2): 93-100.) [14] 高志方, 赖雨晴, 彭定洪.可信云服务评估的非加IVHF-GLRA方法[J/OR].计算机应用研究. [2017-03-15]. http://www.arocmag.com/article/02-2018-02-024.html. (GAO Z F, LAI Y Q, PENG D H, Non additive IVHF-GLRA method for trustworthy cloud service evaluation [J/OR]. Application Research of Computers. [2017-03-15]. http://www.arocmag.com/article/02-2018-02-024.html.) [15] MORSY M A, GRUNDY J, MVLLER I. An analysis of the cloud computing security problem[EB/OL]. [2017-01-10]. https://arxiv.org/ftp/arxiv/papers/1609/1609.01107.pdf. [16] SABAHI F. Cloud computing security threats and responses [C]//Proceedings of the 2011 IEEE 3rd International Conference on Communication Software and Networks. Piscataway, NJ: IEEE, 2011: 245-249. [17] ZHANG Z, CHAO W, DAZENG T, et al. Induced generalized hesitant fuzzy operators and their application to multiple attribute group decision making[J]. Computers & Industrial Engineering, 2014, 67: 116-138. [18] XU Z, ZHANG X. Hesitant fuzzy multi-attribute decision making based on TOPSIS with incomplete weight information [J]. Knowledge-Based Systems, 2013, 52: 53-64. |