Analysis of the requirements of the information security of reputation systems and scenario of using reputation systems in the cloud computing environment

被引:0
|
作者
Abdullaeva F.D. [1 ]
机构
[1] Institute of Information Technologies of National Academy of Sciences of Azerbaijan, Baku
关键词
Application areas; Cloud computing environment; Management of identifications; Reputation systems; Scenario of using; Security requirements;
D O I
10.1615/JAutomatInfScien.v48.i7.80
中图分类号
学科分类号
摘要
The analysis of application areas of reputation systems, their role at management of identifications in the environment of cloud computing, and the works which are carried out in this direction is given. The main components of reputation systems, security requirements, needed while their design, are defined. © 2016 by Begell House Inc.
引用
收藏
页码:77 / 87
页数:10
相关论文
共 50 条
  • [1] A Trust Reputation Architecture for Cloud Computing Environment
    Bilecki, Luis Felipe
    Fiorese, Adriano
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 614 - 621
  • [2] A security architecture for reputation systems
    Ismail, R
    Boyd, C
    Josang, A
    Russell, S
    E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2003, 2738 : 176 - 185
  • [3] A Formal Model for Security Analysis of Trust and Reputation systems
    Ghasempouri, Seyed Asgary
    Ladani, Behrouz Tork
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 13 - 18
  • [4] Reputation management in collaborative computing systems
    Arenas, Alvaro E.
    Aziz, Benjamin
    Silaghi, Gheorghe Cosmin
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (06) : 546 - 564
  • [5] Enhancing Multilateral Security in and by Reputation Systems
    Steinbrecher, Sandra
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2009, : 135 - 150
  • [6] Collaborative Reputation Systems in a Cultural Heritage Scenario
    Cuomo, Salvatore
    De Michele, Pasquale
    Galletti, Ardelio
    Ponti, Giovanni
    NUMERICAL COMPUTATIONS: THEORY AND ALGORITHMS (NUMTA-2016), 2016, 1776
  • [7] A Systems-of-Systems Security Framework for Requirements Definition in Cloud Environment
    Gennari Carturan, Sara B. O.
    Goya, Denise Hideko
    13TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE (ECSA 2019), VOL 2, 2019, : 235 - 240
  • [8] On the Modelling of the Computer Security Impact on the Reputation Systems
    Ksiezopolski, Bogdan
    Wierzbicki, Adam
    Rusinek, Damian
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 526 - 531
  • [9] Reputation by design: using VDML and ServiceML for reputation systems modeling
    Capecchi, Sara
    Pisano, Paola
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2014, : 191 - 198
  • [10] SECURITY ISSUES OF SCADA SYSTEMS IN CLOUD COMPUTING ENVIRONMENT
    Alakbarov, R. G.
    Hashimov, M. A.
    PROCEEDINGS OF THE7TH INTERNATIONAL CONFERENCE ON CONTROL AND OPTIMIZATION WITH INDUSTRIAL APPLICATIONS, VOL II, 2020, : 65 - 67