[1] Pearson S. Privacy, security and trust in cloud computing[M]. [S.l.]: Springer London, 2013: 3-42.[2] Huang J, Nicol D M. Trust mechanisms for cloud computing[J]. Journal of Cloud Computing, 2013, 2(1): 1-14.[3] Trusted Computing Platform Alliance (TCPA). TCPA main specification version 1.1b[R]. Trusted Computing Group, 2002: 2-9.[4] Imran K, Rehman H, Zahid A. Design and deployment of a trusted eucalyptus cloud[C]//2011 IEEE International Conference on Cloud Computing(CLOUD). Washington DC: IEEE, 2011: 380-387.[5] Xin Siyuan, Zhao Yong, Li Yu. Property-based remote attestation oriented to cloud computing[C]//2011 Seventh International Conference on Computational Intelligence and Security. Sanya: [s.n.], 2011: 1028-1032.[6] Manik L D, Ashutosh S, Ved P G. A dynamic ID-based remote user authentication scheme[J]. IEEE Transactions on Consumer Electronics, 2004, 50(2): 629-631.[7] Wang Y, Liu J, Xiao F, et al. A more efficient and secure dynamic ID-based remote user authentication scheme[J]. Computer Communications, 2009, 32(4): 583-585.[8] Lee H, Choi D, Lee Y, et al. Security weaknesses of dynamic ID-based remote user authentication protocol[J]. Proceedings of the World Academy of Science Engineering and Technology, 2009, 59: 190-193.[9] Yu Jinwei. The program design for the network security authentication based on the USB key technology[C]//2011 International Conference on Electronic and Mechanical Engineering and Information Technology. [S.l.]: IEEE, 2011: 2215-2218.[10] Chuang M C, Chen M C. An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics[J]. Expert Systems with Applications, 2014, 41(4): 1411-1418.[11] 林闯, 田立勤, 王元卓. 可信网络中用户行为可信的研究[J]. 计算机研究与发展, 2008, 45(12): 2033-2043. Lin Chuang, Tian Liqin, Wang Yuanzhuo. Research on user behavior trust in trustworthy network[J]. Journal of Computer Research and Development, 2008, 45(12): 2033-2043.[12] Tian L, Lin C, Ni Y. Evaluation of user behavior trust in cloud computing[C]//Computer Application and System Modeling (ICCASM), International Conference on. [S.l.]: IEEE, 2010: 567-572.[13] Dewangan M B K, Shende M P. Survey on user behavior trust evaluation in cloud computing[J]. International Journal of Science, Engineering and Technology Research, 2012, 1(5): 113-117.[14] Lin Honggang. Research on trust-degree based dynamic access control model[C]//E-Product E-Service and E-Entertainment (ICEEE), 2010 International Conference on. [S.l.]: IEEE, 2010: 1-4.[15] Lin G, Bie Y, Lei M. Trust based access control policy in multi-domain of cloud computing[J]. Journal of Computers, 2013, 8(5): 5-10. |