2009 IEEE International Conference on Service-Oriented Computing and Applications (SOCA) 2009
DOI: 10.1109/soca.2009.5410472
|View full text |Cite
|
Sign up to set email alerts
|

Role-based trust model for community of interest

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…However, this evidence is fragmented. The focus of this study will be on two types of attacks, which are similar in various ways to other attacks [28,29], despite their differences with respect to their features and how they are carried out in the cloud environment [30].…”
Section: Design and Methodologymentioning
confidence: 99%
“…However, this evidence is fragmented. The focus of this study will be on two types of attacks, which are similar in various ways to other attacks [28,29], despite their differences with respect to their features and how they are carried out in the cloud environment [30].…”
Section: Design and Methodologymentioning
confidence: 99%
“…In [106] that talks how to build service trust model. These ranking information can be used together with dependency information in composition.…”
Section: Rankingmentioning
confidence: 99%
“…A cloud service provider may give feedback or make inquiries concerning the trust values of cloud consumers by invoking a management trust service which is constituted of many distributed nodes. The nodes of a trust management system (TMS) expose interfaces to receive feedback or inquiries concerning trust results from the consumers in a decentralized manner [6][7][8]. The TMS discovers the available cloud services via the internet and allows consumers to access the new cloud service's trust by searching.…”
Section: Introductionmentioning
confidence: 99%