参考文献

参考文献

[1]Khan K M,Malluhi Q.Establishing Trust in Cloud Computing.IT Professional,2010:20-27.

[2]Kim H,Lee H,Kim W,et al.A Trust Evaluation Model for QoS Guarantee in Cloud Systems.Security and Communication Networks,International Journal of Grid and Distributed Computing,2010:1-10.

[3]Canedo E D,Albuquerque R D O,Junior R T D S.Trust Model for File Sharing in Cloud Computing.In:Proc.of the Second International Conference on Cloud Computing,GRIDs,and Virtualization,2011:66-73.

[4]Abawajy J.Establishing Trust in Hybrid Cloud Computing Environments.In:Proc.of the IEEE 10th International Conference on Trust,Security and Privacy in Computing and Communications(TrustCom),2011:118-125.

[5]Firdhous M,Ghazali O,Vijaykumar P,et al.A Trust Computing Mechanism for Cloud Computing.In:Proc.of the ITU Fully Networked Human-Innovations for Future Networks and Services,2011:1-7.

[6]Pawar P S,Rajarajan M,Nair S K,et al.Trust Model for Optimized Cloud Services.In:Proc.of the 6th IFTP International Conference on Trust Management,2012:99-112.

[7]Wang K,li D Y.Trusted Cloud Computing with Secure Resources and Data Coloring.IEEE Internet Computing,2010:14-22.

[8]Liu Y C,Ma Y T,Zhang H S,et al.A Method for Trust Management in Cloud Computing:Data Coloring by Cloud Watermarking.International Journal of Automation and Computing,2011:280-285.

[9]Hada P S,Singh R,Meghwal M M.Security Agents:A Mobile Agent based Trust Model for Cloud Computing.International Journal of Computer Applications,2011:12-15.

[10]Ramaswamy A,Balasubramanian A,Vijaykumar P,et al.A Mobile Agent based Approach of ensuring Trustworthiness in the Cloud.In:Proc.of the International Conference on Recent Trends in Information Technology,2011:678-682.

[11]Ahmed M,Xiang Y.Trust Ticket Deployment:A Notion of a Data Owner's Trust in Cloud Computing.In:Proc.of the 2011 IEEE 10th International Conference on Trust,Security and Privacy in Computing and Communications,2011:111-117.

[12]荆琦,唐礼勇,陈钟.无线传感器网络中的信任管理.软件学报,2008,19(7):1716-1730.

[13]官尚云,伍卫国,董小社,等.开放分布式环境中的信任管理综述.计算机科学,2010,37(3):22-35.

[14]Gang Y,Huaimin W,Dianxi S.Towards more controllable and practical delegation.International workshop on Mathematical Methods,Models and Architectures for Computer Networks Security.Springer Verlag,2005:245-258.

[15]窦文,等.构造基于推荐的Peer-to-Peer环境下的Trust模型.软件学报,2004,15(4):571-583.

[16]田春岐,邹仕洪,王文东,等.一种基于推荐证据的有效抗攻击P2P网络信任模型.计算机学报,2008,31(2):271-281.

[17]朱峻茂,杨寿保,樊建平,等.Gird与P2P混合计算环境下基于推荐证据推理的信任模型.计算机研究与发展,2005,42(5):797-803.

[18]王茜,杜瑾珺.一种P2P电子商务安全信任模型.计算机科学,2006,33(9):54-57.

[19]张骞,张霞,文学志,等.Peer-to-Peer环境下多粒度Trust模型构造.软件学报,2006,17(1):96-107.

[20]李小勇,桂小林.大规模分布式环境下动态信任模型研究.软件学报,2007,18(6):1510-1521.

[21]常俊胜,王怀民,尹刚.一种P2P系统中基于时间帧的动态信任模型.计算机学报,2006,29(8):1301-1307.

[22]刘伟,蔡嘉勇,贺也平.一种基于信任度的自组安全互操作方法.软件学报,2007,18(8):1958-1967.

[23]冯登国,张敏,张妍,等.云计算安全研究.软件学报,2011,22(1):71-83.

[24]邹德清,金海,羌卫中,等.云计算安全挑战与实践.中国计算机学会通讯,2011,7(12):55-62.

[25]高云璐,沈备军,孔华锋.基于SLA与用户评价的云计算信任模型.计算机工程,2012,38(7):28-30.

[26]方恩光,吴卿.基于证据理论的云计算信任模型研究.计算机应用与软件,2012,29(4):68-70.

[27]谢晓兰,刘亮,赵鹏.面向云计算基于双层激励和欺骗检测的信任模型.电子与信息学报,2012,34(4):812-817.

[28]杜瑞忠,田俊峰,张焕国.基于信任和个性偏好的云服务选择模型.浙江大学学报,2013,47(1):53-61.

[29]Delfs H,Knebl H.密码学原理导引:原理与应用.肖国镇,张宁,译.北京:清华大学出版社,2008.

[30]杨波.现代密码学.2版.北京:清华大学出版社,2007.

[31]杨晓元.现代密码学.西安:西安电子科技大学出版社,2009.

[32]Menezes A J,van Oorschot P C,Vanstone S A.应用密码学手册.胡磊,王鹏,等,译.北京:电子工业出版社,2005.

[33]ElGamal T.A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms.International workshop on the Theory and Application of Cryptographic Techniques.Springer Verlag,1985:10-18.

[34]黄建,卿斯汉.基于角色的访问控制.计算机工程应用,2003,39(28):64-66.

[35]张焕国,王张宜.密码学引论.武汉:武汉大学出版社,2009.

[36]Chaum D,Van Antwerpen H.Undeniable Signatures,Lecture Notes in Computer Sciences,1989:212-216.

[37]Chaum D.Blind Signatures for Untraceable Payments.Advances in Cryptologys,1983:199-203.

[38]Fiat A,Shamir A.How to Prove Yourself Practical Solutions to Identification and Signature Problems.Lecture Notes in Computer Science,1987:186-194.

[39]Bishop M.计算机安全学:安全的艺术与科学.王立斌,等,译.北京:电子工业出版社,2005.

[40]Diffie W,Hellman M E.Multiuser Cryptographic Techniques.National Computer Conference,1976:109-112.

[41]郑东,李祥学,黄征.密码学——密码算法与协议.北京:电子工业出版社,2009.

[42]Diffie W,Hellman M.New Directions in Cryptography.IEEE Transaction on Information Theory,1976:472-492.

[43]Kahate A.密码学与网络安全.邱仲潘,译.北京:清华大学出版社,2005.

[44]Bishop M.Computer Security:Art and Science.Pearson Education,Ltd,2004.

[45]Davida G.Chosen Signature Cryptanalysis of the RSA(MIT)Public-key Cryptosystem.TR-CS-82-2,Department of electrical engineering and computer science,University of Wisconsin,Milwaukee,1982.

[46]Kravitz D W.Digital Signature Algorithm,U.S.Patent#5,231,668,July 27,1993.

[47]Rivest R,Shamir A,Adleman L.A Method for Obtaining Digital Signatures and Public Key Cryptosystems.Communications,1978,21(2):120-126.

[48]Bird R,Gopal I,Herzberg A,et al.Systematic Design of Two-party Authentication Protocols.Lecture Notes in Computer Science,1991,576:44-61.

[49]陈克非.用对称密码体制实现双向认证.上海交通大学学报,1998.

[50]范明钰,王光卫.网络安全协议理论与技术.北京:清华大学出版社,2009.

[51]Tanenbaum A S.计算机网络.4版.潘爱民,徐明伟,译.北京:清华大学出版社,2004.

[52]胡铮.网络与信息安全.北京:清华大学出版社,2006.

[53]Rizvi S,Ryoo J,Liu Y H,et al.A centralized trust model approach for cloud computing.Wireless and Optical Communication Conference,2014:1-6.

[54]Yang Z X,Qin X L,Yang Y J,et al.A Hybrid Trust Service Architecture for Cloud Computing.International Conference on Computer Sciences and Applications,2013:674-680.

[55]Kashif U A,Memon Z A,Balouch A R,et al.Distributed trust protocol for IaaS Cloud Computing.12th International Bhurban Conference on Applied Sciences and Technology,2015:275-278.

[56]Li X Y,Ma H D,Zhou F,et al.T-Broker:A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services.IEEE Transactions on Information Forensics and Security,2015,10(7):1402-1415.

[57]Noor T H,Sheng Q,Yao L,et al.Cloud Armor:Supporting Reputation-based Trust Management for Cloud Services.IEEE Transactions on Parallel and Distributed Systems,2015,27(2):367-380.