[1] MA J. Research on network security threat situation assessment and analysis [D].Wuhan: Huazhong University of Science and Technology, 2010.(马杰.网络安全威胁态势评估与分析方法研究[D].武汉:华中科技大学, 2010.) [2] WANG Y, VASSILEVA J. Trust and reputation model in peer-to-peer networks [C]//Proceedings of the 3rd International Conference on Peer-to-Peer Computing. Piscataway: IEEE, 2003: 150-157. [3] TANG W, HU J, CHEN Z. Research on a fuzzy logic-based subjective trust management model [J]. Journal of Computer Research and Development, 2005, 42(10): 1654-1659.(唐文, 胡建斌, 陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展, 2005, 42(10):1654-1659.) [4] LIU Y. The research of dynamic trust evaluation in mobile Ad Hoc networks [D]. Hefei: Anhui University, 2012.(刘亚峰.移动Ad Hoc网下的动态信任评估研究[D].合肥:安徽大学, 2012.) [5] ZHANG Y. Research of trust relationship in multi-domain access control [D]. Wuhan: South-Central University for Nationalities, 2010.(张昀.多域访问控制中的信任关系研究[D].武汉:中南民族大学, 2010.) [6] DELLAROCAS C. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior [C]//Proceedings of the 2nd ACM Conference on Electronic Commerce. New York: ACM, 2000: 150-157. [7] ZHOU Q, YU J.Defense system model based on trust for cloud computing [J]. Journal of Computer Applications, 2011, 31(6): 1531-1535.(周茜, 于炯.云计算下基于信任的防御系统模型[J].计算机应用, 2011, 31(6):1531-1535.) [8] HWANG K, KULKARENI S, HU Y. Cloud security with virtualized defense and reputation-based trust management [C]//DASC'09: Proceedings of the 8th IEEE International Conference on Dependable, Autonomic and Secure Computing. Piscataway: IEEE, 2009: 717-722. [9] ALHAMAD M, DILLON T, CHANG E. Conceptual SLA frame-work for cloud computing [C]//Proceedings of the 4th IEEE International Conference on Digital Ecosystems and Technologies. Piscataway: IEEE, 2010: 606-610. [10] ALHAMAD M, DILLON T, CHANG E. SLA-based trust model for cloud computing [C]//Proceedings of the 13th IEEE International Conference on Network-Based Information Systems. Piscataway: IEEE, 2010: 321-324. [11] GAO Y, SHEN B, KONG H. Trust model for cloud computing based on SLA and user ratings [J]. Computer Engineering, 2012, 38(7): 28-30.(高云璐, 沈备军, 孔华锋.基于SLA与用户评估的云计算信任模型[J].计算机工程, 2012, 38(7):28-30.) [12] ZHAO P. Research on trust evaluation for service in cloud computing [D]. Beijing: Beijing Jiaotong University, 2014.(赵娉婷.云计算环境下服务信任度评估技术的研究[D].北京:北京交通大学, 2014.) [13] WANG M C, WU X, ZHANG W, et al. A conceptual platform of SLA in cloud computing [C]//Proceedings of the 2011 9th IEEE International Conference on Dependable, Autonomic and Secure Computing. Piscataway: IEEE, 2011: 1131-1135. [14] HUBERMAN B A, WU F. The dynamics of reputations [J/OL]. Journal of Statistical Mechanics: Theory and Experiment, 2004(4). [2014-12-02]. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.20.3728&rep=rep1&type=pdf. [15] LIANG C, JIANG G, LU W. Research on evaluation of SaaSSP service quality based on SLA [J]. Computer Engineering, 2013, 39(10): 31-36.(梁昌勇, 江贵红, 陆文星.基于SLA的 SaaSSP服务质量评价研究[J].计算机工程, 2013, 39(10):31-36.) |