참고문헌
- M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, et al., "A view of cloud computing," Communications of the ACM, vol. 53, no.4, pp. 50-58, 2010. https://doi.org/10.1145/1721654.1721672
- D. G. Feng, M. Zhang, Y. Zhang, and Z. Xu, "Study on cloud computing security," Journal of Software, vol. 22, no. 1, pp. 71-83, 2011. https://doi.org/10.3724/SP.J.1001.2011.03958
- Q. Xie, J. Wu, G. Wang, W. Liu, D. Chen, and X. Yu, "Provably secure authentication protocol based on convertible proxy signcryption in cloud computing," Scientia Sinica Informationis, vol. 42, no. 3, pp. 303-313, 2012. https://doi.org/10.1360/112011-915
- L. M. Vaquero, L. Rodero-Merino, and D. Moran, "Locking the sky: a survey on IaaS cloud security," Computing, vol. 91, no. 1, pp. 93-118, 2011. https://doi.org/10.1007/s00607-010-0140-x
- K. Hashizume, D. G. Rosado, E. Fernandez-Medina, and E. B. Fernandez, "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, vol. 4, article no. 5, 2013.
- C. Lin, W. B. Su, K. Meng, Q. Liu, and W. D. Liu, "Cloud computing security: architecture, mechanism and modeling," Chinese Journal of Computers, vol. 36, no. 9, pp. 1765-1784, 2013. https://doi.org/10.3724/SP.J.1016.2013.01765
- J. Huang and D. M. Nicol, "Trust mechanisms for cloud computing," Journal of Cloud Computing, vol. 2, article no. 9, 2013.
- P. Manuel, "A trust model of cloud computing based on Quality of Service," Annals of Operations Research, vol. 233, no. 1, pp. 281-292, 2015. https://doi.org/10.1007/s10479-013-1380-x
- R. Z. Du, J. F. Tian, and H. G. Zhang, "Cloud service selection model based on trust and personality preferences," Journal of Zhejiang University (Engineering Science), vol. 47, no. 1, pp. 53-61, 2013.
- Z. Yang, X. Qin, Y. Yang, and T. Yagink, "A hybrid trust service architecture for cloud computing," in Proceedings of 2013 International Conference on Computer Sciences and Applications, Wuhan, China, 2013, pp. 674-680.
- C. Li, S. Wang, L. Kang, L. Guo, and Y. Cao, "Trust evaluation model of cloud manufacturing service platform," The International Journal of Advanced Manufacturing Technology, vol. 75, no. 1-4, pp. 489-501, 2014. https://doi.org/10.1007/s00170-014-6112-0
- U. A. Kashif, Z. A. Memon, A. R. Balouch, and J. A. Chandio, "Distributed trust protocol for IaaS cloud computing," in Proceedings of 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 2015, pp. 275-279.
- M. Chiregi, and N. J. Navimipour, "A new method for trust and reputation evaluation in the cloud environments using the recommendations of opinion leaders' entities and removing the effect of troll entities," Computers in Human Behavior, vol. 60, pp. 280-292, 2016. https://doi.org/10.1016/j.chb.2016.02.029
- R. K. Chahal and S. Singh, "Fuzzy rule-based expert system for determining trustworthiness of cloud service providers," International Journal of Fuzzy Systems, vol. 19, no. 2, pp. 338-354, 2017. https://doi.org/10.1007/s40815-016-0149-1
- T. Lynn, L. van der Werff, G. Hunt, and P. Healy, "Development of a cloud trust label: a Delphi approach," Journal of Computer Information Systems, vol. 56, no. 23, pp. 185-193, 2016. https://doi.org/10.1080/08874417.2016.1153887
- A. Selvaraj and S. Sundararajan, "Evidence-based trust evaluation system for cloud services using fuzzy logic," International Journal of Fuzzy Systems, vol. 19, no. 2, pp. 329-337, 2017. https://doi.org/10.1007/s40815-016-0146-4
- J. Sidhu and S. Singh, "Improved topsis method based trust evaluation framework for determining trustworthiness of cloud service providers," Journal of Grid Computing, vol. 15, no. 1, pp. 81-105, 2017. https://doi.org/10.1007/s10723-016-9363-1
- M. Tang, X. Dai, J. Liu, and J. Chen, "Towards a trust evaluation middleware for cloud service selection," Future Generation Computer Systems, vol. 74, pp. 302-312, 2017. https://doi.org/10.1016/j.future.2016.01.009
- S. Singh and J. Sidhu, "Compliance-based multi-dimensional trust evaluation system for determining trustworthiness of cloud service providers," Future Generation Computer Systems, vol. 67, pp. 109-132, 2017. https://doi.org/10.1016/j.future.2016.07.013
- Y. Wang, J. Wen, X. Wang, and W. Zhou, "Cloud service evaluation model based on trust and privacy-aware," Optik, vol. 134, pp. 269-279, 2017. https://doi.org/10.1016/j.ijleo.2017.01.044
- N. Somu, G. R. MR, K. Kirthivasan, and S. S. VS, "A trust centric optimal service ranking approach for cloud service selection," Future Generation Computer Systems, vol. 86, pp. 234-252, 2018. https://doi.org/10.1016/j.future.2018.04.033
- M. Alhanahnah, P. Bertok, Z. Tari, and S. Alouneh, "Context-aware multifaceted trust framework for evaluating trustworthiness of cloud providers," Future Generation Computer Systems, vol. 79, pp. 488-499, 2018. https://doi.org/10.1016/j.future.2017.09.071
- M. B. Smithamol and S. Rajeswari, "TMM: trust management middleware for cloud service selection by prioritization," Journal of Network and Systems Management, vol. 27, no. 1, pp. 66-92, 2019. https://doi.org/10.1007/s10922-018-9457-0
- D. Li, H. Meng, and X. Sui, "Membership clouds and membership cloud generators," Computer Research and Development, vol. 32, no. 6, pp. 15-20, 1995.
- H. Chen and B. Li, "Approach to uncertain reasoning based on cloud model," Journal of Chinese Computer Systems, vol. 32, no. 12, pp. 2449-2455, 2011.
- Y. Du, Z. Song, and D. Li, "Mining association rules based on cloud model," Journal of PLA University of Science and Technology, vol. 1, no. 1, pp. 29-34, 2000. https://doi.org/10.3969/j.issn.1009-3443.2000.01.006
- X. Y. Meng, G. W. Zhang, C. Y. Liu, J. C. Kang, and H. S. Li, "Research on subjective trust management model based on cloud model," Journal of System Simulation, vol. 19, no. 14, pp. 3310-3317, 2007.
- G. W. Zhang, D. Y. Li, P. Li, J. C. Kang, and G. S. Chen, "A collaborative filtering recommendation algorithm based on cloud model," Journal of Software, vol. 18, no. 10, pp. 2403-2411, 2007. https://doi.org/10.1360/jos182403
- G. Qiang and Y. M. Bi, "Effectiveness evaluation of command of missile information war based on cloud model," Command Control & Simulation, vol. 30, no. 4, pp. 61-64, 2008. https://doi.org/10.3969/j.issn.1673-3819.2008.04.017
- J. Tian, H. Jiao, B. Wang, and C. Chen, "An e-commerce trust model based on expanded subjective logic," International Journal of High Performance Computing and Networking, vol. 9, no. 5-6, pp. 372-381, 2016. https://doi.org/10.1504/IJHPCN.2016.080409