[1] |
ZISSIS D , LEKKAS D . Addressing cloud computing security issues[J]. Future Generation Computer Systems, 2012,28(3): 583-592.
|
[2] |
KHAN A N , MAT KIAH M L , KHAN S U ,et al. Towards secure mobile cloud computing:a survey[J]. Future Generation Computer Systems, 2013,29(5): 1278-1299.
|
[3] |
FERNANDO N , LOKE S W , RAHAYU W . Mobile cloud computing:a survey[J]. Future Generation Computer Systems, 2013,29(1): 84-106.
|
[4] |
SHEN H , LIN Y , LI Z . Refining reputation to truly select high-QoS servers in peer-to-peer networks[J]. IEEE Transactions on Parallel Distribute System, 2013,24: 2439-2450.
|
[5] |
LUA K , WANGA J L , XIEA L ,et al. An eigentrust-based hybrid trust model in P2P file sharing networks[J]. Procedia Computer Science, 2016,94: 366-371.
|
[6] |
刘浩, 陈志刚, 张连明 . 基于社区的移动社交网络安全路由算法设计与实现[J]. 信息网络安全, 2017(7): 25-31.
|
|
LIU H , CHEN Z G , ZHANG L M . A secure routing algorithm of mobile social network based on community[J]. Netinfor Security, 2017,7: 25-31.
|
[7] |
SINGH S , CHAND D . Trust evaluation in cloud based on friends and third party’s recommendations[C]// IEEE Engineering and Computational Sciences. 2014: 1-6.
|
[8] |
YAN Z , LI X , KANTOLA R . Controlling cloud data access based on reputation[J]. Mobile Networks and Applications, 2015,20(6): 828-839.
|
[9] |
YAN Z , LI X , KANTOLA R . Heterogeneous data access control based on trust and reputation in mobile cloud computing[M]. Advances in Mobile Cloud Computing and Big Data in the 5G Era,Springer International Publishing, 2017: 65-113.
|
[10] |
YAN Z , LI X , WANG M ,et al. Flexible data access control based on trust and reputation in cloud computing[J]. IEEE Transactions on Cloud Computing, 2017,99: 1-12.
|
[11] |
LIN H , XU L , HUANG X Y ,et al. A trustworthy access control model for mobile cloud computing based on reputation and mechanism design[J]. Ad Hoc Networks, 2015,35(C): 51-64.
|
[12] |
CAO Q H , KHAN I , FARAHBAKHSH R ,et al. A trust model for data sharing in smart cities[C]// IEEE International Conference on Communications (ICC2016), 2016: 1-7.
|
[13] |
LIN H , HU J , TIAN Y L ,et al. Toward better data veracity in mobile cloud computing:a context-aware and incentive-based reputation mechanism[J]. Information Sciences, 2017,387: 238-253.
|
[14] |
LIN H , XU L , MU Y ,et al. A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing[J]. Future Generation Computer Systems, 2015,52: 125-136.
|
[15] |
KIM M , PARK S O . Trust management on user behavioral patterns for a mobile cloud computing[J]. Cluster Comput, 2013,16: 725-731.
|
[16] |
HAMMAM A , SENBEl S . A trust management system for ad hoc mobile clouds[C]// 2013 8th International Conference on Computer Engineering & Systems. 2013: 31-38.
|
[17] |
张会兵, 李超, 胡晓丽 ,等. 物联网搜索中主客观融合的动态信誉评估[J]. 通信学报, 2015,36(12): 106-113.
|
|
ZHANG H B , LI C , HU X L ,et al. Fusing subjective and objective factors:a dynamic approach to evaluating reputation for IoT search[J]. Journal on Communications, 2015,36(12): 106-113.
|
[18] |
RAJENDRAN V V , SWAMYNATHAN S . Hybrid model for dynamic evaluation of trust in cloud services[J]. Wireless Networks, 2016,22(6): 1807-1818.
|
[19] |
ZHANG J , ZHANG Z , GUO H . Towards secure data distribution systems in mobile cloud computing[J]. IEEE Transactions on Mobile Computing, 2017,99: 1-12.
|
[20] |
VASAL D , SUBRAMANIAN V , ANASTASOPOULOS A . A systematic process for evaluating structured perfect Bayesian equilibria in dynamic games with asymmetric information[J]. American Control Conference, 2016: 3378-3385.
|