72
Views
8
CrossRef citations to date
0
Altmetric
Original Articles

ACO-BTM: A Behavior Trust Model in Cloud Computing Environment

, , &
Pages 785-795 | Received 30 Jul 2013, Accepted 17 Aug 2013, Published online: 12 Nov 2013

References

  • Zhumu Wen, Research on dynamic trust and access control mechanism in multi-domain interoperation environment. Huazhong University of Science and Technology, (2008).
  • S. P. Marsh, Formalizing Trust as a Computational Concept (Scotland: University of Stirling, 1995).
  • M. Blaze, J. Feigenbaum and J. Lacy, Decentralized trust management. Proceedings of the 1996 IEEE Symposium on Security and Privacy (Los Alamitos, USA, May 1996), pp. 164–173.
  • N. Santos, K. P. Gummadi, and R. Rodrigue. Towards trusted cloud computing, In Proc. of the 1st USENIX Workshop on Hot Topics in Cloud Computing (Berkeley, CA, USA, 2009).
  • S. Ries, J. Kangasharju and M. Muhlhauser, A classification of trust systems, LNCS 4277/2006. (Berlin: Springer), pp. 894–903.
  • A.Abdul-Rahman and S.Halles, A distributed trust model. New Security Paradigms Workshop'97 (1997), pp.48–60.
  • A. Abdul-Rahman and S. Hailes, Using recommendations for managing trust in distributed systems. Proceedings of the IEEE Malaysia International Conference Communieation'97(MICC'97), (Kuala Lumpur, IEEE PRESS,1997).
  • T.Beth, M.Boreherding and B.Klein, Valuation of trust in open networks. In Proceedings of the European SymPosium on Research in Computer Security (Springer-Verlag, Brighton UK, 1994), pp.3–18.
  • Jφsang A, A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3), (2001), pp. 279–311.
  • Jong P. Yoon and Z. Chen, Using privilege chain for access control and trustiness of resources in cloud computing. The 2nd International Conference on Networked Digital Technologies. JUL 07-09, (2010).
  • Wang Wei and Zeng GuoSun, Trusted dynamic level scheduling based on bayesian trust model. Science in China Series F-Information Sciences, 50 (3), (2007), pp. 456–469.
  • Colorni A, Dorigo M and Maniezzo V, Distributed optimization by ant colonies, Proceeding of the First European Conference Artificial Life (Paris: Elsevier Publishing, 1991), pp.134–142.
  • Punam Bedi and Ravish Sharma, Trust based recommender system using ant colony for trust computation. Expert Systems with Applications, 39 (2012), pp.1183–1190.
  • Félix Gómez Mármol, Gregorio Martínez Pérez and Antonio F. Gómez Skarmeta, TACS, a trust model for P2P networks, Wireless Pers Commun 51, (2009), pp.153–164.
  • Félix Gómez Mármol and Gregorio Martínez Pérez, Providing trust in wireless sensor networks using a bioinspired technique. Telecommun Syst, 46 (2011), pp. 163–180.
  • Félix Gómez Mármol, Gregorio Martínez Pérez and Javier G.Marín-Blázquez, META-TACS: a trust model demonstration of robustness through a genetic algorithm, Intelligent Automation and Soft Computing, 17(1), (2011), pp. 41–59.
  • M Dorigo, V Maniezzo and A Colorni, The ant system: optimization by a colony of cooperating agents, IEEE Transactions on Systems, Man, and Cybernetics Part B, 26 (1), (1996), pp.29–41.
  • Ye Zhiwei and Zheng Zhaobao, Research on the settings of parameter α,β,ρ in ant colony algorithm, Journal of Wuhan University: Information Science. 29(7), (2004).
  • Wu Hui, Yu Jiong and Yu Feiran. Dynamic access control algorithm based on trust model in cloud computing, Computer Engineering and Applications, 48(23), 2012, pp.102–106.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.