2011
DOI: 10.1016/j.jss.2010.10.043
|View full text |Cite
|
Sign up to set email alerts
|

Resource discovery in a Grid system: Directing requests to trustworthy virtual organizations based on global trust values

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0
2

Year Published

2011
2011
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 24 publications
0
9
0
2
Order By: Relevance
“…Trust in cloud computing environment based on the selected cloud deployment models in which the applications are delegated and outsourced to the control of the owner. Trust has required an efficient and effective security policy in the traditional architecture that addressed the functional constraints and flows between them [35], [36]. External systems access the constraints that attack the programs which effect the access or control on the customer data.…”
Section: Security Challenges In Cloud Computingmentioning
confidence: 99%
“…Trust in cloud computing environment based on the selected cloud deployment models in which the applications are delegated and outsourced to the control of the owner. Trust has required an efficient and effective security policy in the traditional architecture that addressed the functional constraints and flows between them [35], [36]. External systems access the constraints that attack the programs which effect the access or control on the customer data.…”
Section: Security Challenges In Cloud Computingmentioning
confidence: 99%
“…Weng et al [40] empregam o conceito de confiança na troca de arquivos confidenciais e destacam que o relacionamento de confiança entre os parceiros é a base para a colaboração. Karaoglanoglou e Karatza [41] apresentam um mecanismo em que o processo de direcionamento de requisições a provedores confiáveis é feito com base nos valores globais de confiança. Em Nogoorani e Jalili [42] é proposto um framework para controle de acesso a ambientes de Grid Computing, no qual a validação da confiança e o gerenciamento de risco são adicionados aos serviços básicos de controle de acesso disponíveis em uma Grid.…”
Section: Organizações Virtuais E Confiançaunclassified
“…Currently most of these existing methods focused on the optimization of allocating physical resources to their associated virtual resources and migrating virtual machines to achieve load balance and increase resource utilization. These methods require the suspension of the cloud computing applications due to the mandatory shutdown of the associated virtual machines [73][74][75][76][77][78][79][80][81]. The protection of information privacy under the development of cloud computing technology is the latter situation [82][83][84][85][86][87][88][89].…”
Section: Cloud Computing Directionmentioning
confidence: 99%