2012
DOI: 10.11591/closer.v1i3.742
|View full text |Cite
|
Sign up to set email alerts
|

Building trust into cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…• Contribution 1: Proposing a trust definition based on (Fan, 2012), (Ko et al, 2011) which states that trust can be achieved when consumers are confident that their data and computing resources are safe, available and under their control at known location under appropriate SLA which preserves their rights for auditability and the required level of security and privacy …”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…• Contribution 1: Proposing a trust definition based on (Fan, 2012), (Ko et al, 2011) which states that trust can be achieved when consumers are confident that their data and computing resources are safe, available and under their control at known location under appropriate SLA which preserves their rights for auditability and the required level of security and privacy …”
Section: Discussionmentioning
confidence: 99%
“…Healthcare sectors' trust can be achieved when they are confident that their data is secured, available and under their control with known data storage location (Fan, 2012), (Ko et al, 2011).…”
Section: Framework Designmentioning
confidence: 99%
“…Besides, it allows users to verify the IAAS provider and decide whether or not the service is secure before they launch their virtual machines. Yang et al [2], introduced three layers for trust conceptive framework in which it includes both the validity of the "hard trust" to guaranteed security mechanisms and technical devices, and "soft trust" that ensure by social legal human factors, Plus considering "trust relationship" between customers and cloud vendors, through the combination and integration of the three trusted layer in framework model. They also reported that the gap between these trust factors can be bridged from the underlying infrastructure to the virtual systems and to the service interaction level, to the trust field in cloud environment.…”
Section: Literature Reviewmentioning
confidence: 99%