Have a personal or library account? Click to login
CCDEA: Consumer and Cloud – DEA Based Trust Assessment Model for the Adoption of Cloud Services Cover

CCDEA: Consumer and Cloud – DEA Based Trust Assessment Model for the Adoption of Cloud Services

Open Access
|Aug 2016

References

  1. 1. Cooper, C. W., E. Rhodes. Measuring the Efficiency of Decision Making Units. - European Journal of Operational Research, Vol. 2, 1978, No 6, pp. 429-444.10.1016/0377-2217(78)90138-8
  2. 2. Lin, G., D. Wang, Y. Bie, M. Lei. MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing Information Security. China Communications, 2014, pp. 154-162.10.1109/CC.2014.6827577
  3. 3. Fan, W., H. Perros. A Novel Trust Management Framework for Multi-Cloud Environments Based on Trust Service Providers. - Knowledge-Based Systems, Vol. 70, 2014, pp. 392-406.10.1016/j.knosys.2014.07.018
  4. 4. Ouedraogo, M., H. Mouratidis. Selectinga Cloud Service Provider in the Age of Cybercrime. - Computers & Security, Vol. 38, 2013, pp. 3-13.10.1016/j.cose.2013.01.007
  5. 5. Tang, C., J. Liu. Selectinga Trusted Cloud Service Provider for Your Saa S Program. - Computers & Security, Vol. 50, 2015, pp. 60-73.10.1016/j.cose.2015.02.001
  6. 6. Huang, J., D. M. Nico l. Trust Mechanisms for Cloud Computing. - Journal of Cloud Computing: Advances, Systems and Applications, Vol. 2, 2013, No 9.10.1186/2192-113X-2-9
  7. 7. Tan, W. A., Y. Sun, L. X. Li, G. Z. Lu, T. Wang. A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing. - IEEE Systems Journal, Vol. 8, 2014, No 3, pp. 868-878.10.1109/JSYST.2013.2260072
  8. 8. Habib, S. M., S. Hauke, S. Ries, M. Muhlhauser. Trust asa Facilitator in Cloud Computing: A Survey. - Journal of Cloud Computing: Advances, Systems and Applications, Vol. 1, 2012, No 19.
  9. 9. Wißne r, M., S. Hammer, E. Kurdyukova, E. André. Trust-Based Decision-Making for the Adaptation of Public Displays in Changing Social Contexts. - Journal of Trust Management, Vol. 1, 2014, No 6.10.1186/2196-064X-1-6
  10. 10. Dolev, S., N. Gilboa, M. Kopeetsk y. Efficient Private Multi-Party Computations of Trust in the Presence of Curious and Malicious Users. - Journal of Trust Management, Vol. 1, 2014, No 8.10.1186/2196-064X-1-8
  11. 11. Yuan, W., D. Guan, Y.-K. Lee, S. Lee, S. J. Hur. Improved Trust-Aware Recommender System Using Small-Worldness of Trust Networks. - Knowledge-Based Systems, Vol. 23, 2010, pp. 232-238.10.1016/j.knosys.2009.12.004
  12. 12. Li, X., J. Du. Adaptive and Attribute-Based Trust Model for Service Level Agreement Guarantee in Cloud Computing. - IET Information Security, Special Issue - Trust and Identity Management in Mobile and Internet Computing and Communications, Vol. 7, 2013, No 1, pp. 39-50.10.1049/iet-ifs.2012.0232
  13. 13. Wang, W., G. Zeng, D. Tang, J. Yao. Cloud-DLS: Dynamic Trusted Scheduling for Cloud Computing. - Expert Systems with Applications, Vol. 39, 2012, pp. 2321-2329.10.1016/j.eswa.2011.08.048
  14. 14. Gu, L., J. Zhong, C. Wang, Z. Ni, Y. Zhang. Trust Model in Cloud Computing Environment Based on Fuzzy Theory. - International Journal of Computers Communications & Control, Vol. 9, 2014, No 5, pp. 570-583.10.15837/ijccc.2014.5.1276
  15. 15. Gokulnath, K., R. Uthariaraj. Game Theory Based Trust Model for Cloud Environment. - The Scientific World Journal, Article ID 709827, 2015, Hindawi Publishing Corporation. 10 p.10.1155/2015/709827456217226380365
  16. 16. Zhou, Y., Z. Yan, N. Li, L. Yu, L. Zhou, L. Chen. Cloud-Data Envelopment Analysis Method Used for Assessment of Restoration Building Block Schemes. - CSEE Journal of Power and Energy Systems, Vol. 1, 2015, No 2, pp. 43-52.10.17775/CSEEJPES.2015.00018
  17. 17. Kumar, S. G., S. B. Versteeg, R. Buyyaa. A Framework for Ranking of Cloud Computing Services. - Future Generation Computer Systems, Vol. 29, 2013, pp. 1012-1023.10.1016/j.future.2012.06.006
  18. 18. Li, A., X. Yang, S. Kandula, M. Zhang. Cloud Cmp: Comparing Public Cloud Providers. - In: Proc. of 10th Annual Conference on Internet Measurement, Melbourne, Australia, 2010.
  19. 19. Iosup, A., S. Ostermann, N. Yigitbasi, R. Prodan, T. Fahringer, D. Epema. Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing. - IEEE Transactions on Parallel and Distributed Systems, Vol. 22, 2011, No 6, pp. 931-945.10.1109/TPDS.2011.66
  20. 20. Harmony, Cloudharmony.com, February 2012. http://cloudharmony.com/
  21. 21. Azadi, M., M. Jafarian, R. F. Saen, S. M. Mirhedayatian. A New Fuzzy DEA Model for Evaluation of Efficiency and Effectiveness of Suppliers in Sustainable Supply Chain Management Context. - Computers & Operations Research, Vol. 54, 2015, pp. 274-285.10.1016/j.cor.2014.03.002
  22. 22. Razavi, S. H., H. Amoozad, E. K. Zavadskas, S. S. Hashemi. A Fuzzy Data Envelopment Analysis Approach Based on Parametric Programming. - International Journal of Computer Communication, Vol. 8, 2013, No 4, pp. 594-607.10.15837/ijccc.2013.4.580
  23. 23. De Souza, L. M., M. P. Fernandez. Performance Evaluation Methodology for Cloud Computing Using Data Envelopment Analysis. - In: Proc. of 14th International Conference on Networks, IARIA, 2015, pp. 58-64. ISBN: 978-1-61208-398-8.
  24. 24. Chen, W.-C., A. L. Johnson. A Unified Model for Detecting Efficient and Inefficient Outliers in Data Envelopment Analysis. - Computers & Operations Research, Vol. 37, 2010, No 2, pp. 417-425.10.1016/j.cor.2009.06.010
  25. 25. Jin, B., Y. Wang, Z. Liu, J. Xue. A Trust Model Based on Cloud Model and Bayesian Networks. - Procedia Environmental Sciences, Vol. 11, 2011, pp. 452-459.10.1016/j.proenv.2011.12.072
  26. 26. Shuaibu, B. M., N. M. Norwawi, M. H. Selamat, A. Al-Alwani. Systematic Review of Web Application Security Development Model. - Artificial Intelligence Review, Vol. 43, 2015, pp. 259-276.10.1007/s10462-012-9375-6
  27. 27. Raja, S., S. Ramaiah. 2S-FAT-Based DLS Model for Cloud Environment. - Arabian Journal for Science and Engineering, Vol. 41, 2016, No 8, pp. 3099-3112.10.1007/s13369-016-2084-8
  28. 28. Wei, C. P., X. Tang. Possibility Degree Method for Ranking Intuitionistic Fuzzy Numbers. - In: Proc. of IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2010, pp.142-145. 10.1109/WI-IAT.2010.239
DOI: https://doi.org/10.1515/cait-2016-0034 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 52 - 69
Published on: Aug 19, 2016
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2016 Sivakami Raja, Saravanan Ramaiah, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.