Analysis of the requirements of the information security of reputation systems and scenario of using reputation systems in the cloud computing environment

被引:0
|
作者
Abdullaeva F.D. [1 ]
机构
[1] Institute of Information Technologies of National Academy of Sciences of Azerbaijan, Baku
关键词
Application areas; Cloud computing environment; Management of identifications; Reputation systems; Scenario of using; Security requirements;
D O I
10.1615/JAutomatInfScien.v48.i7.80
中图分类号
学科分类号
摘要
The analysis of application areas of reputation systems, their role at management of identifications in the environment of cloud computing, and the works which are carried out in this direction is given. The main components of reputation systems, security requirements, needed while their design, are defined. © 2016 by Begell House Inc.
引用
收藏
页码:77 / 87
页数:10
相关论文
共 50 条
  • [21] A reference model for designing effective reputation information systems
    Rein, GL
    JOURNAL OF INFORMATION SCIENCE, 2005, 31 (05) : 365 - 380
  • [22] Design of Platform Reputation Systems: Optimal Information Disclosure
    Shi, Zijun
    Srinivasan, Kannan
    Zhang, Kaifu
    MARKETING SCIENCE, 2022, : 500 - 520
  • [23] Representation of Trust and Reputation in Self-Managed Computing Systems
    Kantert, Jan
    Edenhofer, Sarah
    Tomforde, Sven
    Mueller-Schloer, Christian
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1828 - 1835
  • [24] Security requirements for RFID computing systems
    Zhang, Xiaolan
    King, Brian
    International Journal of Network Security, 2008, 6 (02) : 214 - 226
  • [25] Security threats scenarios in trust and reputation models for distributed systems
    Gomez Marmol, Felix
    Martinez Perez, Gregorio
    COMPUTERS & SECURITY, 2009, 28 (07) : 545 - 556
  • [26] A Unified Security Backplane for Trust and Reputation Systems in Decentralized Networks
    Tegeler, Florian
    Lei, Jun
    Fu, Xiaoming
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS, 2009, : 311 - 312
  • [27] Management in peer-to-peer systems: Trust, reputation and security
    Boutaba, R
    Marshall, A
    COMPUTER NETWORKS, 2006, 50 (04) : 469 - 471
  • [28] Asymptotic Risk Analysis for Trust and Reputation Systems
    Boreale, Michele
    Celestini, Alessandro
    SOFSEM 2013: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2013, 7741 : 169 - 181
  • [29] Systematic analysis of centralized online reputation systems
    Liu, Ling
    Munro, Malcolm
    DECISION SUPPORT SYSTEMS, 2012, 52 (02) : 438 - 449
  • [30] Enhancing Information Security in Cloud Computing Environment Using Cryptographic Techniques
    Pardeshi, Suraj R.
    Pawar, Vikul J.
    Kharat, Kailash D.
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 511 - 515