2015 7th Conference on Information and Knowledge Technology (IKT) 2015
DOI: 10.1109/ikt.2015.7288735
|View full text |Cite
|
Sign up to set email alerts
|

A new method for evaluating cloud computing user behavior trust

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Paul et al [31] proposed a trust-based access control model in a cloud environment, which uses role-based access control policies for users and modifies them based on their trust level to achieve dynamic trust evaluation. Hosseini et al [32] used decision trees, logistic regression, plain Bayesian, and various other machine learning methods of trust evaluation strategies to predict the trust values of users and resources. Yang et al [33] proposed an integrated model-based trust evaluation method for user behavior, namely ordered logit regression, by combining the advantages of statistical methods and hierarchical analysis.…”
Section: User Trust Evaluationmentioning
confidence: 99%
“…Paul et al [31] proposed a trust-based access control model in a cloud environment, which uses role-based access control policies for users and modifies them based on their trust level to achieve dynamic trust evaluation. Hosseini et al [32] used decision trees, logistic regression, plain Bayesian, and various other machine learning methods of trust evaluation strategies to predict the trust values of users and resources. Yang et al [33] proposed an integrated model-based trust evaluation method for user behavior, namely ordered logit regression, by combining the advantages of statistical methods and hierarchical analysis.…”
Section: User Trust Evaluationmentioning
confidence: 99%
“…Such as the fuzzy logic technique [8] based on cloud computing, and the mutual trust based access control model [9] combined with trust management. What's more, the paper [10] proposed a dynamic trust evaluate method to deal with cloud user's behavior by using entropy method and AHP, and the paper [11] proposed a new method for user behavior trust evaluation that considers user's identification code and mac address to prevent the registration of members with multiple user names and makes available the information of user behavior trust in other cloud computing environments.…”
Section: Stage Of the Researchmentioning
confidence: 99%
“…Li et al proposed the concept of direct trust, indirect reputation, the weights of trust evaluation indexes with the inherent characteristics for the cloud manufacturing service platform, and defined a comprehensive assessment model [10]. Hosseini et al considered that the tenants could manipulate the software, operating systems or even network infrastructure provided by the cloud vendors directly, and the credibility of tenants' behavior would directly affect the credibility of systems [11]. They established an evaluation system of tenant behaviors including credible layer, sub-credible layer and credible evidence layer in the cloud environment.…”
Section: Pos(iscc2015)064mentioning
confidence: 99%