[1] |
ZISSIS D , LEKKAS D . Addressing cloud computing security issues[J]. Future Generation Computer Systems, 2012,28(3): 583-592.
|
[2] |
KHAN A N , KIAH M L M , KHAN S U ,et al. Towards secure mobile cloud computing:a survey[J]. Future Generation Computer Systems, 2013,29(5): 1278-1299.
|
[3] |
HUANG D , ZHOU Z , XU L ,et al. Secure data processing framework for mobile cloud computing[C]// Computer Communications Workshops. 2011: 614-618.
|
[4] |
LU K , WANG J , XIE L ,et al. An eigentrust-based hybrid trust model in P2P file sharing networks[J]. Procedia Computer Science, 2016,94: 366-371.
|
[5] |
FERNANDO N , LOKE S W , RAHAYU W . Mobile cloud computing:a survey[J]. Future Generation Computer Systems, 2013,29(1): 84-106.
|
[6] |
SEN J , . Security and privacy issues in wireless mesh networks:a survey[M]// Wireless Networks and Security. Berlin:Springer, 2013: 189-272.
|
[7] |
WANG H , WU S , CHEN M ,et al. Security protection between users and the mobile media cloud[J]. IEEE Communications Magazine, 2014,52(3): 73-79.
|
[8] |
KIM M , SANG O P . Trust management on user behavioral patterns for a mobile cloud computing[J]. Cluster Computing, 2013,16(4): 725-731.
|
[9] |
YAN Z , LI X , KANTOLA R . Controlling cloud data access based on reputation[J]. Mobile Networks & Applications, 2015,20(6): 828-839.
|
[10] |
YAN Z , LI X , KANTOLA R . Heterogeneous data access control based on trust and reputation in mobile cloud computing[M]// Advances in Mobile Cloud Computing and Big Data in the 5G Era. Berlin:Springer International Publishing, 2017.
|
[11] |
YAN Z , LI X , WANG M ,et al. flexible data access control based on trust and reputation in cloud computing[C]// IEEE Transactions on Cloud Computing. 2017.
|
[12] |
SINGH S , CHAND D . Trust evaluation in cloud based on friends and third party's recommendations[C]// Engineering and Computational Sciences. 2014: 1-6.
|
[13] |
HAMMAM A , SENBEL S . A trust management system for ad-hoc mobile clouds[C]// The International Conference on Computer Engineering & Systems. 2014: 31-38.
|
[14] |
CAO Q H , KHAN I , FARAHBAKHSH R ,et al. A trust model for data sharing in smart cities[C]// IEEE International Conference on Communications (ICC2016). 2016: 1-7.
|
[15] |
SICARI S , COEN A . DARE:evaluating data accuracy using node reputation[J]. Computer Networks, 2013,57(15): 3098-3111.
|
[16] |
SHEN H , LIN Y , LI Z . Refining reputation to truly select high-QoS servers in peer-to-peer networks[C]// IEEE Transactions on Parallel and Distributed Systems. 2013: 2439-2450.
|
[17] |
MOATI N , OTROK H , MOURAD A ,et al. Reputation-based cooperative detection model of selfish nodes in cluster-based QoS-OLSR protocol[J]. Wireless Personal Communications, 2014,75(3): 1747-1768.
|
[18] |
LI D , LI M , LIU J . Evolutionary trust scheme of certificate game in mobile cloud computing[J]. Soft Computing, 2017: 1-11.
|
[19] |
吴庆涛, 张旭龙, 张明川 ,等. 一种面向云服务的自主信誉管理机制[J]. 武汉大学学报(理学版), 2013,59(5): 425-430.
|
|
WU Q T , ZHANG X L , ZHANG M C ,et al. An independent reputation management mechanism for cloud service[J]. Journal of Wuhan University (Science Edition), 2013,59(5): 425-430.
|