A trust-based resource selection algorithm in Cloud Computing

被引:0
|
作者
机构
[1] Qin, Tong
[2] Liu, Xinran
来源
Liu, Xinran | 1600年 / Transport and Telecommunication Institute, Lomonosova street 1, Riga, LV-1019, Latvia卷 / 18期
关键词
18;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] A trust-based selection approach for composite service
    Li, Jun
    Zheng, Xiao-Lin
    Chen, De-Ren
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2012, 46 (05): : 885 - 892
  • [32] A cloud service composition method using a trust-based clustering algorithm and honeybee mating optimization algorithm
    Zanbouri, Kouros
    Jafari Navimipour, Nima
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (05)
  • [33] Cloud Computing Resource Schedule Strategy Based on PSO Algorithm
    Xiong, Yingyidu
    Wu, Yanyan
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1332 - 1336
  • [34] An improved resource query and location algorithm based on cloud computing
    Jiang, Wuxue
    Zhang, Jing
    Li, Junhuai
    Hu, Hui
    Telkomnika - Indonesian Journal of Electrical Engineering, 2013, 11 (10): : 6166 - 6172
  • [35] Security for Resource Selection in Grid Computing Based On Trust and Reputation Responsiveness
    Vijayakumar, V.
    Banu, R. S. D. Wahida
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (11): : 107 - 115
  • [36] A Dynamic Resource Allocation Algorithm in Cloud Computing Based on Workflow and Resource Clustering
    Shang, Qinghong
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (02): : 403 - 411
  • [37] Trust-Based Scheduling Strategy for Cloud Workflow Applications
    Yang, Yuli
    Peng, Xinguang
    Cao, Jianfang
    INFORMATICA, 2015, 26 (01) : 159 - 180
  • [38] Trust-based security architecture for Ubiquitous Computing systems
    Hung, Le Xuan
    Giang, Pho Duc
    Zhung, Yonil
    Van Phuong, Tran
    Lee, Sungyoung
    Lee, Young-Koo
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 753 - 754
  • [39] Trust-based Recommender Algorithm Using the Properties of Trust Network
    Zhang Guangqian
    He Youqin
    2012 INTERNATIONAL CONFERENCE ON EDUCATION REFORM AND MANAGEMENT INNOVATION (ERMI 2012), VOL 5, 2013, : 104 - 110
  • [40] Trust-based dynamic authorization model for pervasive computing
    Guo, Yajun
    Wang, Liang
    Hong, Fan
    Han, Lansheng
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (08): : 70 - 73