2011 IEEE World Congress on Services 2011
DOI: 10.1109/services.2011.91
|View full text |Cite
|
Sign up to set email alerts
|

TrustCloud: A Framework for Accountability and Trust in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
151
0
2

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 305 publications
(153 citation statements)
references
References 11 publications
0
151
0
2
Order By: Relevance
“…To best mitigate barriers to confidence, we need to understand the main components affecting cloud trust [32]:…”
Section: Mental Barriers and Components Of Trust In Cloud Computingmentioning
confidence: 99%
See 2 more Smart Citations
“…To best mitigate barriers to confidence, we need to understand the main components affecting cloud trust [32]:…”
Section: Mental Barriers and Components Of Trust In Cloud Computingmentioning
confidence: 99%
“…encryption) which make it extremely difficult or uneconomical for an unauthorized person to access some information [32].…”
Section: Mental Barriers and Components Of Trust In Cloud Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…They also adopt extensible access control markup language (XACML) to enforce policy specification which aligns with the UBSF approach for security. Ko et al [9] investigate trust for Cloud computing and propose a TrustCloud Framework focused on accountability. They have three layers: (1) System layer, which covers all the underlying hardware and platform; (2) Data layer, which contains the data for the work and (3) Workflow layer, which uses workflow to execute all the services and requests.…”
Section: Introductionmentioning
confidence: 99%
“…This kind of service is also Infrastructure as a Service (IaaS), based on which the service providers can build a variety of specific services to customers [3]. The ubiquitous adoption of cloud services depends largely on the trustworthiness of the cloud providers [4], [5], because customers lose direct control of their data and applications hosted in cloud environments. And the data and applications may be subject to two kinds of threats: insider attacks such as malicious staff or administrator internal of the cloud providers [6] or attacks from other cloud users sharing the same cloud computing infrastructure and resources [7].…”
Section: Introductionmentioning
confidence: 99%