[1] |
陈红松, 王钢, 宋建林 . 基于云计算入侵检测数据集的内网用户异常行为分类算法研究[J]. 信息网络安全, 2018(3): 1-7.
|
|
CHEN H S , WANG G , SONG J L . Research on anomaly behavior classification algorithm of internal network user based on cloud computing intrusion detection data set[J]. Netinfo Security, 2018(3): 1-7.
|
[2] |
王国峰, 刘川意, 潘鹤中 ,等. 云计算模式内部威胁综述[J]. 计算机学报, 2017,40(2): 296-316.
|
|
WANG G F , LIU C Y , PAN H Z ,et al. Survey on insider threats to cloud computing[J]. Chinese Journal of Computers, 2017,40(2): 296-316.
|
[3] |
王晶 . 基于属性的云服务访问控制技术研究[D]. 保定:河北大学, 2016.
|
|
WANG J . Study of the technology on attribute based access control in cloud computing services[D]. Baoding:Hebei University, 2016.
|
[4] |
王燕, 周建涛 . 云环境下的信任研究方法与技术[J]. 小型微型计算机系统, 2015,36(10): 2334-2339.
|
|
WANG Y , ZHOU J T . Trust research methods and technology in cloud computing[J]. Journal of Chinese Computer Systems, 2015,36(10): 2334-2339.
|
[5] |
王超 . 云计算环境下基于用户行为的信任评估研究[D]. 包头:内蒙古科技大学, 2015.
|
|
WANG C . The research of trust evaluation based on user behavior in cloud computing[D]. Baotou:Inner Mongolia University of Science & Technology, 2015.
|
[6] |
王晋东, 卫波, 张恒巍 ,等. 云计算环境下服务信任评估方法研究[J]. 计算机科学, 2014,41(12): 38-42,66.
|
|
WANG J D , WEI B , ZHANG H W ,et al. Research on service trust evaluation approach under cloud computing environment[J]. Computer Science, 2014,41(12): 38-42,66.
|
[7] |
田立业, 詹静, 姜伟 ,等. 量化的云计算信任模型研究[J]. 计算机工程与设计, 2013,34(1): 13-17.
|
|
TIAN L Y , ZHAN J , JIANG W ,et al. Research on quantified cloud computing trust model[J]. Computer Engineering and Design, 2013,34(1): 13-17.
|
[8] |
毋泽南, 田立勤, 王志刚 . 基于机器学习的 Web 用户行为认证[J]. 网络与信息安全学报, 2018,4(1): 45-51.
|
|
WU Z N , TIAN L Q , WANG Z G . Behavior authentication of Web users based on machine learning[J]. Chinese Journal of Network and Information Security, 2018,4(1): 45-51.
|
[9] |
HUANG X M , YU R , KANG J W ,et al. Distributed reputation management for secure and efficient vehicular edge computing and networks[J]. IEEE Access, 2017,5: 25408-25420.
|
[10] |
谢晓兰, 李鑫融, 陈超泉 . 云环境中用户可信度计算方法[J]. 桂林理工大学学报, 2020,40(1): 122-130.
|
|
XIE X L , LI X R , CHEN C Q . Research on calculation method of user trust in cloud environment[J]. Journal of Guilin University of Technology, 2020,40(1): 122-130.
|
[11] |
胡园园, 顾新, 王涛 . 基于网络层次分析法的知识链信任评估研究[J]. 情报科学, 2015,33(12): 40-45.
|
|
HU Y Y , GU X , WANG T . Research on trust evaluation of knowledge chain based on the analytic network process[J]. Information Science, 2015,33(12): 40-45.
|
[12] |
许永平, 朱延广, 杨峰 ,等. 基于ANP和模糊积分的多准则决策方法及其应用[J]. 系统工程理论与实践, 2010,30(6): 1099-1105.
|
|
XU Y P , ZHU Y G , YANG F ,et al. New multi criteria decision making approach based on ANP and fuzzy integral with its application[J]. Systems Engineering-Theory & Practice, 2010,30(6): 1099-1105.
|
[13] |
肖传奇, 陈明志 . 云环境下基于 IFAHP 的用户行为信任模型研究[J]. 信息网络安全, 2015(12): 14-20.
|
|
XIAO C Q , CHEN M Z . Research on user behavior trust model based on IFAHP in cloud computing environment[J]. Netinfo Security, 2015(12): 14-20.
|
[14] |
毋泽南, 田立勤, 王志刚 . 一种结合滑动窗口和推荐信任的用户行为信任评估[J]. 山东大学学报(理学版), 2019,54(1): 53-59.
|
|
WU Z N , TIAN L Q , WANG Z G . A user behavior trust evaluation combined with sliding window and recommended trust[J]. Journal of Shandong University (Natural Science), 2019,54(1): 53-59.
|
[15] |
王卫强 . 基于动态反馈的云安全访问控制机制研究[D]. 沈阳:东北大学, 2013.
|
|
WANG W Q . The research of security access control based dynamic feedback on cloud computing platform[D]. Shenyang:Northeastern University, 2013.
|
[16] |
田立勤 . 网络用户行为的安全可信分析与控制[M]. 北京:清华大学出版社,北京交通大学出版社, 2011.
|
|
TIAN L Q . Security and trust analysis and control of network user behavior[M]. Beijing: Tsinghua University Press,Beijing Jiaotong University Press, 2011.
|
[17] |
马佳乐, 郭银章 . 云计算用户行为信任评估与访问控制策略研究[J]. 计算机应用研究, 2020,37(S2): 260-262.
|
|
MA J L , GUO Y Z . Research on cloud computing user behavior trust evaluation and access control strategy[J]. Application Research of Computers, 2020,37(S2): 260-262.
|