Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2010 International Conference on Electronics and Information Engineering 2010
DOI: 10.1109/iceie.2010.5559829
|View full text |Cite
|
Sign up to set email alerts
|

Use trust management module to achieve effective security mechanisms in cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(17 citation statements)
references
References 11 publications
0
15
0
Order By: Relevance
“…There are two ways to establish the trust namely 1) between entities and domain 2) between the domains [33]. These models are suitable when they are applied to homogeneous environment which will be extended to the cross-cloud environment over large scale and complex application which raises in a security risk [25].…”
Section: E Domain-based Trust Modelmentioning
confidence: 99%
“…There are two ways to establish the trust namely 1) between entities and domain 2) between the domains [33]. These models are suitable when they are applied to homogeneous environment which will be extended to the cross-cloud environment over large scale and complex application which raises in a security risk [25].…”
Section: E Domain-based Trust Modelmentioning
confidence: 99%
“…Well-known static models include the 7-layer security model [2], SACS mode l [3], trust-based model [4], and so on. Dynamic models mainly include authentication-monitor model [5] and service composition model [6].…”
Section: A Security Modelsmentioning
confidence: 99%
“…In this way, it will inevitably make the user's data in a potentially unsafe state of destruction and theft and also have more detailed personal information exposed on the network, which is a very large exposure. Judging from today's cloud computing development, the security of user's data, user privacy information protection, data stored and cloud computing to their own security and stability, and many other regulatory aspects of cloud computing issues directly relate to cloud computing user acceptance; thus, security becomes the most important factor affecting the development of cloud computing business [2]. A reasonable and practicable access control strategy is needed, which is a guarantee to protect cloud computing suppliers to provide services and many cloud users access to services.…”
Section: Introductionmentioning
confidence: 99%