CAN-TM: Chain augmented Naïve Bayes-based trust model for reliable cloud service selection

M Mrabet, YB Saied, LA Saidane - ACM Transactions on Internet …, 2019 - dl.acm.org
The increasing proliferation of Cloud Services (CSs) has made the reliable CS selection
problem a major challenge. To tackle this problem, this article introduces a new trust model …

Estudio y clasificación de características y atributos de servicios cloud para la definición de un modelo de valor para servicios cloud

NA Merizalde Almeida - 2017 - riunet.upv.es
[ES] El objetivo de este trabajo es conocer la percepción de valor o importancia relativa que
tienen diferentes perfiles de usuario sobre las características y atributos de los servicios …

[图书][B] Regulatory compliance and total cost influence on the adoption of cloud technology: a quantitative study

CE Pugh - 2021 - search.proquest.com
Cloud computing services have provided numerous benefits for both large and small
businesses. However, limited knowledge exists about the factors that influence the adoption …

Trust management model based on malicious filtered feedback in cloud

P Varalakshmi, T Judgi, D Balaji - … DaSAA 2017, Chennai, India, January 4 …, 2018 - Springer
Cloud is designed to provide scalable IT resources remotely and requires less infrastructure
management. The services of untrustworthy provider may cause the cost loss and …

A Review on Trust-Based Resource Allocation in Cloud Environment: Issues Toward Collaborative Cloud

PS Pol, VK Pachghare - International Journal of Semantic …, 2023 - World Scientific
Due to the exponential rise in the usage of the internet and smart devices, there is a demand
for enhanced network efficiency and user satisfaction in a cloud computing environment …

A secure and efficient cloud resource allocation scheme with trust evaluation mechanism based on combinatorial double auction

Y Xia, H Hong, G Lin, Z Sun - KSII Transactions on Internet and …, 2017 - koreascience.kr
Cloud computing is a new service to provide dynamic, scalable virtual resource services via
the Internet. Cloud market is available to multiple cloud computing resource providers and …

Research on security evaluation system of network information system based on rough set theory

J Chen, Y Miao - International Journal of Internet Protocol …, 2021 - inderscienceonline.com
In view of the poor stability and long response time of the traditional network information
system security evaluation system, a rough set based network information system security …

Security and privacy preservation using constructive hierarchical data-sharing approach in cloud environment

R Bingu, S Jothilakshmi, N Srinivasu - Information Security Journal …, 2024 - Taylor & Francis
With the vast development in the cloud computing environment, many cloud users intend to
outsource the data to a remote location and share the data with multiple users. The …

Quantum safe cloud computing using hash-based digital signatures

Z Iftikhar, M Iftikhar, MA Shah - 2021 26th International …, 2021 - ieeexplore.ieee.org
Cloud computing provides its clients with on-demand resources, such as storage and
performance. The idea behind cloud computing is sharing of resources. With growth of cloud …

[PDF][PDF] Towards the development of a widely accepted cloud trust model

SM Eftekhar, W Suryn, J Roy, H Roy - Computing and Quality …, 2018 - researchgate.net
Different cloud trust models are designed to boost the consumer's confidence in order to
help them migrate their data to the cloud and use the cloud services offered by different …