Analysis of the requirements of the information security of reputation systems and scenario of using reputation systems in the cloud computing environment

被引:0
|
作者
Abdullaeva F.D. [1 ]
机构
[1] Institute of Information Technologies of National Academy of Sciences of Azerbaijan, Baku
关键词
Application areas; Cloud computing environment; Management of identifications; Reputation systems; Scenario of using; Security requirements;
D O I
10.1615/JAutomatInfScien.v48.i7.80
中图分类号
学科分类号
摘要
The analysis of application areas of reputation systems, their role at management of identifications in the environment of cloud computing, and the works which are carried out in this direction is given. The main components of reputation systems, security requirements, needed while their design, are defined. © 2016 by Begell House Inc.
引用
收藏
页码:77 / 87
页数:10
相关论文
共 50 条
  • [31] Enhancing Security Systems in Cloud Computing
    Al-Nuaim, Ahmed
    Almusallam, Naif
    VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 322 - 327
  • [32] Analysis of cloud computing and information security
    Kenan, Wang
    Shao, Qian
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 3810 - 3813
  • [33] ANALYSIS OF USAGE OF INFORMATION SYSTEMS AND TECHNOLOGY: CLOUD COMPUTING
    Bayaga, Anass
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON COMPUTING & INFORMATICS, 2015, : 558 - 563
  • [34] An adaptive formal parallel technique with reputation integration for the enforcement of security policy in the cloud environment
    Benmenzer, Faiza
    Beghdad, Rachid
    COMPUTER COMMUNICATIONS, 2022, 196 : 207 - 228
  • [35] Trust and Reputation Management in Healthcare Systems: Taxonomy, Requirements and Open Issues
    Jabeen, Farhana
    Hamid, Zara
    Akhunzada, Adnan
    Abdul, Wadood
    Ghouzali, Sanaa
    IEEE ACCESS, 2018, 6 : 17246 - 17263
  • [36] Integration of Wireless Sensor Network and Cloud Computing Using Trust and Reputation Technique
    Buddesab
    Bhavyashree, S. P.
    Thriveni, J.
    Venugopal, K. R.
    EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY, ICERECT 2018, 2019, 545 : 69 - 82
  • [37] Improving security in WMNs with reputation systems and self-organizing maps
    Bankovic, Zorana
    Fraga, David
    Manuel Moya, Jose
    Carlos Vallejo, Juan
    Malagon, Pedro
    Araujo, Alvaro
    de Goyeneche, Juan-Mariano
    Romero, Elena
    Blesa, Javier
    Villanueva, Daniel
    Nieto-Taladriz, Octavio
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (02) : 455 - 463
  • [38] Complying with Security Requirements in Cloud Storage Systems
    Roman, Rodrigo
    Felipe, Miguel Rodel
    Gene, Phua Eu
    Zhou, Jianying
    JOURNAL OF COMPUTERS, 2016, 11 (03) : 201 - 206
  • [39] Network security analysis for cloud computing environment
    Xie, Linjiang
    Hang, Feilu
    Guo, Wei
    Zhang, Zhenhong
    Li, Hanruo
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2022, 13 (06)
  • [40] Reputation and Attribute Based Dynamic Access Control Framework in Cloud Computing Environment For Privacy Protection
    Liu Wu
    Sun Donghong
    Ren Ping
    Liu Ke
    2016 12TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2016, : 1239 - 1245