[1] Ran S. A model for web services discovery with QoS[J].ACM SIGCOM Exchanges,2003,4(1):1-10
[2] Noor T H, Sheng Q Z, Yao L, et al. CloudArmor: Supporting reputation-Based trust management for cloud services[J]. IEEE Transactions on Parallel & Distributed Systems, 2016, 27(2):367-380.
[3] Zhang H, Li C, Zhang X, et al. Comparison of dynamic trust management model in cloud computing[C]// Proc of Int Conf on Computer Science and Service System. Piscataway,NJ:IEEE, 2012:699-701
[4] Muchahari M K, Sinha S K. A new trust management architecture for cloud computing environment[C]// Proc of Int Symp on Cloud and Services Computing. Los Alamitos,CA: IEEE Computer Society, 2012:136-140
[5] Noor T H, Sheng Q Z, Alfazi A. Reputation Attacks Detection for Effective Trust Assessment among Cloud Services[C]// IEEE Int Conf on Trust, Security and Privacy in Computing and Communications. Piscataway,NJ:IEEE, 2013:469-476
[6] CSA: The Notorious Nine Cloud Computing Top Threats in 2013[OL]. [2018-03-22].https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
[7] Patel H,Patel D.A review of approaches to achieve data storage correctness in cloud computing csing crusted third party auditor[C]//Proc of Int Symp on Cloud and Services Computing(ISCOS).Piscataway,NJ: IEEE, 2012:84- 87
[8] 谢立军,朱智强.基于隶属度理论的云服务行为信任评估模型研究[J].计算机应用研究,2013,30(4):1051-1054
[9] 毛建景, 张凯萍. 云计算环境下海量用户行为信任评估模型[J]. 计算机仿真, 2016, 33(3):385-388.
[10] Fan Y Q, Zhang Y S. Trusted Access Control Model Based on Role and Task in Cloud Computing[C]// Int Conf on Information Technology in Medicine and Education.Piscataway,NJ: IEEE, 2016:710-713
[11]Singh S, Chand D. Trust evaluation in cloud based on friends and third party's recommendations[C]// Engineering and Computational Sciences.Piscataway,NJ: IEEE, 2014:1-6