[PDF][PDF] A Survey of Multiple Clouds: Classification, Relationships and Privacy Concerns

R Al-Saidi, Z Kobti - CLOUD COMPUTING 2023, 2023 - researchgate.net
When major Cloud Service Providers (CSPs) network with other CSPs, they show a
predominant area over cloud computing architecture, each with different roles to serve user …

SelTCS: a framework for selecting trustworthy cloud services

N Thakur, A Singh, AL Sangal - Sādhanā, 2023 - Springer
Cloud computing is a computer science paradigm that has grown significantly in recent
years. It provides on-demand access to a diverse set of software, infrastructure and platform …

[PDF][PDF] A method for service evaluation based on fuzzy theory for cloud computing

L Guo, Y Luo, X He, G Hu, Y Dong - KSII Transactions on Internet and …, 2017 - itiis.org
Aiming at the phenomenon of false information issued by service providers in cloud
computing environment, a method for service evaluation based on fuzzy theory is put …

[PDF][PDF] AMAZON CLOUD SERVICES BASED ON SERVICE LEVEL AGREEMENT AND QUALITY OF SERVICE

K Mahesh, IDYK Sharma, M Laxmaiah - volume, 2019 - academia.edu
In this digital era, the emergence of many smart applications makes the human lives in a
way more smart but at the same time it also increases the amount of data to an …

[PDF][PDF] Satisfaction: A Scale to fulfill Consumer's Expectation on Cloud Computing

R Sandhu, K Khanna - … Journal of Research in Electronics and …, 2017 - academia.edu
Nowadays, in progressive era of innovations, world is consistently shifting towards one of
the new prototype for accommodating and delivering services over the Internet. This …

Trust evaluation based on variable weight synthesis

M Chen, L Chen, Z Dai, Z Shao… - … 19th Int Conf on Smart City …, 2021 - ieeexplore.ieee.org
There are a large number of terminals with data collection, transmission, processing, storage
processing and storage functions in the scenario of power mobile internet. Traditional …

A study on trust models in cloud computing

A Balcão Filho, F de Franco Rosa… - 2019 IEEE/ACS 16th …, 2019 - ieeexplore.ieee.org
Information Security is an aggregation of people effort, processes and technology to help
organizations at providing confidentiality, integrity and availability in their information assets …

An approach for evaluating trust in X. 509 certificates

Z El Uahhabi, H El Bakkali - 2016 11th International …, 2016 - ieeexplore.ieee.org
Today, X. 509 certificates is largely adopted for the identity verification of an entity. Such
organizations and people use it to confirm their identities in online transaction. Then, it is …

ED-BeCT: An enhanced dynamic behavioral cloud trust model to evaluate the trustworthiness of the cloud service provider

S Moazzezi Eftekhar - 2020 - espace.etsmtl.ca
Cloud computing is an evolving technology providing the delivery of on-demand calculating
services to offer scalable resources dynamically in an economical manner. The companies …

A semi-supervised learning approach to disease gene prediction

TP Nguyen, TB Ho - 2007 IEEE International Conference on …, 2007 - ieeexplore.ieee.org
Discovering human disease-causing genes (disease genes in short) is one of the most
challenging problems in bioinformatics and biomedicine, as most diseases are related in …