204
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Formulating Knowledge-Based Cloud Identity Selection

&

References

  • Kim H-W, Xu Y, Koh J. A comparison of online trust building factors between potential customers and repeat customers. J Assoc Inf Syst. 2004;5(10):392–420. doi:10.17705/1jais.
  • Ibrahim M, Ribbers PM. The impacts of competence-trust and openness-trust on interorganizational systems. Eur J Inf Syst. 2009;18(3):223–34. doi:10.1057/ejis.2009.17.
  • Gonzalez N, Miers C, Redígolo F, Simplicio M, Carvalho T, Näslund M, Pourzandi M. A quantitative analysis of current security concerns and solutions for cloud computing. J Cloud Comput. 2012;1:1–18.
  • Sun Z, Strang KD, Pambel F. Privacy and security in the big data paradigm. J Comput Inform Syst. 2018;1–12. doi:10.1080/08874417.2017.1418631.
  • Ward JS, Barker A. Observing the clouds: a survey and taxonomy of cloud monitoring. J Cloud Comput. 2014;3(1):24. doi:10.1186/s13677-014-0024-2.
  • Pons AP. Enhancing the quality-of-service for application service providers. J Comput Inform Syst. 2003;44:3–8.
  • Mollamotalebi M, Hajireza S. Multi-objective dynamic management of virtual machines in cloud environments. J Cloud Comput. 2017;6(1):16. doi:10.1186/s13677-017-0086-z.
  • Lynn T, Van Der Werff L, Hunt G, Healy P. Development of a cloud trust label: a delphi approach. J Comput Inform Syst. 2016;56(3):185–93. doi:10.1080/08874417.2016.1153887.
  • Sharma S, Menard P, Mutchler LA. Who to trust? Applying trust to social commerce. J Comput Inform Syst. 2019;59(1):32–42. doi:10.1080/08874417.2017.1289356.
  • Duan Q, Lu Y. Service-oriented network discovery and selection in virtualization-based mobile internet. J Comput Inform Syst. 2013;53(3):38–46. doi:10.1080/08874417.2013.11645630.
  • Lee Y-C. Adoption intention of cloud computing at the firm level. J Comput Inform Syst. 2019;59(1):61–72. doi:10.1080/08874417.2017.1295792.
  • Söllner M, Hoffmann A, Leimeister JM. Why different trust relationships matter for information systems users. Eur J Inf Syst. 2016;25(3):274–87. doi:10.1057/ejis.2015.17.
  • Gerhart N, Sidorova A. The effect of network characteristics on online identity management practices. J Comput Inform Syst. 2017;57(3):229–37. doi:10.1080/08874417.2016.1184007.
  • Hallappanavar VL, Birje MN. Trust management in cloud computing. Security solutions for hyperconnectivity and the internet of things. In: Dawson M, editor. Chapter 7. Hershey, PA: IGI Global; 2017. p. 130–150. doi:10.4018/978-1-5225-0741-3.ch007
  • Chiregi M, Navimipour NJ. Cloud computing and trust evaluation: a systematic literature review of the state-of-the-art mechanisms. J Electr Syst Inf Technol. 2017;5(3):608–22. doi:10.1016/j.jesit.2017.09.001.
  • Mármol FG, Girao J, Pérez GM. Trims, a privacy-aware trust and reputation model for identity management systems. Comput Netw. 2010;54(16):2899–912. doi:10.1016/j.comnet.2010.07.020.
  • Velásquez I, Caro A, Rodríguez A. Authentication schemes and methods: a systematic literature review. Inf Software Technol. 2018;94:30–37. doi:10.1016/j.infsof.2017.09.012.
  • Rittinghouse JW, Ransome JF. Cloud computing: implementation, management, and security. Boca Raton (FL, USA): CRC press; 2016.
  • Chinitz J. Single sign-on: is it really possible? Inf Syst Secur. 2000;9(3):1–14. doi:10.1201/1086/43310.9.3.20000708/31359.5.
  • Stergiou C, Psannis KE, Kim B-G, Gupta B. Secure integration of IOT and cloud computing. Future Gener Comput Syst. 2018;78:964–75. doi:10.1016/j.future.2016.11.031.
  • Alvarez R, Mirzoev T, Gowan A, Henderson B, Kruck S. Learning laboratories as services in private cloud deployment. J Comput Inform Syst. 2017;1–9. doi:10.1080/08874417.2017.1368422.
  • Noor TH, Sheng QZ. Trust as a service: a framework for trust management in cloud environments. Web information system engineering–Wise 2011. New York: Springer; 2011. p. 314–21.
  • Jahani A, Khanli LM. Cloud service ranking as a multi objective optimization problem. J Supercomput. 2016;1–30.
  • Introduction to the consensus assessments working group. CSA; [accessed]. https://cloudsecurityalliance.org/group/consensus-assessments/#_overview. 2016.
  • Noor TH, Sheng QZ, Maamar Z, Zeadally S. Managing trust in the cloud: state of the art and research challenges. Computer. 2016;49(2):34–45. doi:10.1109/MC.2016.57.
  • Na SH, Huh EN. A broker-based cooperative security-SLA evaluation methodology for personal cloud computing. Secur Commun Netw. 2014;8(7):1318–31. doi:10.1002/sec.1086.
  • Johannesson P, Perjons E. A method framework for design science research. Cham/Switzerland: Springer; 2014.
  • Peffers K, Tuunanen T, Rothenberger MA, Chatterjee S. A design science research methodology for information systems research. J Manage Inf Syst. 2007;24(3):45–77. doi:10.2753/MIS0742-1222240302.
  • Hevner AR. A three cycle view of design science research. Scand J Inf Syst. 2007;19:4.
  • Hevner A, March ST, Park J, Ram S. Design science in information systems research. MIS Q. 2004;28(1):75–105. doi:10.2307/25148625.
  • Nunamaker JF Jr, Chen M, Purdin TD. Systems development in information systems research. J Manage Inf Syst. 1990;7(3):89–106. doi:10.1080/07421222.1990.11517898.
  • Markus ML, Majchrzak A, Gasser L. A design theory for systems that support knowledge processes. MIS Q. 2001;26:179–212.
  • March ST, Storey VC. Design science in the information systems discipline: an introduction to the special issue on design science research. MIS Q. 2008;32:725–30. doi:10.2307/25148869.
  • Peffers K, Rothenberger M, Tuunanen T, Vaezi R. Design science research evaluation. In: Peffers K, Rothenberger M, Kuechler B, editors. Design science research in information systems. Advances in theory and practice. Berlin: Springer; 2012. p. 398–410.
  • Kanwal A, Masood R, Mumtaz R, Shibli MA, Mumtaz R. Access control as a service in cloud: challenges, impact and strategies. Comput Jl. 2014;58(4):601–26. bxu138 doi:10.1093/comjnl/bxu138.
  • Habib SM, Hauke S, Ries S, Mühlhäuser M. Trust as a facilitator in cloud computing: a survey. J Cloud Comput. 2012;1:1–18.
  • Soltani S, Martin P, Elgazzar K. A hybrid approach to automatic IAAS service selection. J Cloud Comput. 2018;7(1):12. doi:10.1186/s13677-018-0113-8.
  • Lopez J, Roman R, Agudo I, Fernandez-Gago C. Trust management systems for wireless sensor networks: best practices. Comput Commun. 2010;33(9):1086–93. doi:10.1016/j.comcom.2010.02.006.
  • Patel R, Borisaniya B, Patel A, Patel D, Rajarajan M, Zisman A. Comparative analysis of formal model checking tools for security protocol verification. In: Boumerdassi S, Nagamalai D, Meghanathan N, Nabendu C, editors. Recent trends in network security and applications. Chennai/India: Springer; 2010. p. 152–163.
  • Marudhadevi D, Dhatchayani VN, Sriram VS. A trust evaluation model for cloud computing using service level agreement. Comput Jl. 2014 bxu129;58(10):2225–32. doi:10.1093/comjnl/bxu129.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.