Analysis of the requirements of the information security of reputation systems and scenario of using reputation systems in the cloud computing environment

被引:0
|
作者
Abdullaeva F.D. [1 ]
机构
[1] Institute of Information Technologies of National Academy of Sciences of Azerbaijan, Baku
关键词
Application areas; Cloud computing environment; Management of identifications; Reputation systems; Scenario of using; Security requirements;
D O I
10.1615/JAutomatInfScien.v48.i7.80
中图分类号
学科分类号
摘要
The analysis of application areas of reputation systems, their role at management of identifications in the environment of cloud computing, and the works which are carried out in this direction is given. The main components of reputation systems, security requirements, needed while their design, are defined. © 2016 by Begell House Inc.
引用
收藏
页码:77 / 87
页数:10
相关论文
共 50 条
  • [41] Comparative Study of Information Security Risk Assessment Models for Cloud Computing systems
    Jouini, Mouna
    Rabai, Latifa Ben Arfa
    7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 1084 - 1089
  • [42] Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach
    Rimal, Bhaskar Prasad
    Jukan, Admela
    Katsaros, Dimitrios
    Goeleven, Yves
    JOURNAL OF GRID COMPUTING, 2011, 9 (01) : 3 - 26
  • [43] Quantum computing and security of information systems
    Berezin, A. A.
    SAFETY AND SECURITY ENGINEERING II, 2007, 94 : 149 - 159
  • [44] Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach
    Bhaskar Prasad Rimal
    Admela Jukan
    Dimitrios Katsaros
    Yves Goeleven
    Journal of Grid Computing, 2011, 9 : 3 - 26
  • [45] Integration of SMS Security Systems in Cloud Computing
    Kumar, Mohan C. M.
    Dangeti, Raj Sudheer
    Jeganathan, L.
    GLOBAL TRENDS IN COMPUTING AND COMMUNICATION SYSTEMS, PT 1, 2012, 269 : 329 - +
  • [46] The Research and Application of Security Requirements Analysis Methodology of Information Systems
    Cui, Jing-Song
    Zhang, Da
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 30 - 36
  • [47] A Scientific Computing Environment for Accessing Grid Computing Systems Using Cloud Services
    Raboso, Mariano
    de la Varga, Jose A.
    Codes, Myriam
    Alonso, Jesus
    del Val, Lara
    Jimenez, Maria I.
    Izquierdo, Alberto
    Villacorta, Juan J.
    DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, 2012, 151 : 347 - +
  • [48] Analysis of Security Access Control Systems in Fog Computing Environment
    Zhang J.
    Journal of Cyber Security and Mobility, 2023, 12 (05): : 653 - 674
  • [49] A Reputation Mechanism for Dynamical Interactions in Multiagent Systems Under Quality of Service Requirements
    Tedesco, Francesco
    Franze, Giuseppe
    Casavola, Alessandro
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (10) : 5021 - 5028
  • [50] Identification of Security Requirements in Systems of Systems by Functional Security Analysis
    Fuchs, Andreas
    Rieke, Roland
    ARCHITECTING DEPENDABLE SYSTEMS VII, 2010, 6420 : 74 - 96