7ARMBRUST M, FOX A, GRIFFITH R, et al. A view of cloud computing [J]. Commune ACM, 2010, 53(4) : 50 - 58.
8韦凯.网格环境下信任模型及其访问控制应用的研究[D].广州:华南理工大学,201i.
9ROGER C. User requirements for cloud computing architecture [C] // International Conference on Cluster, Cloud and Grid Computing. Melbourne.. IEEE, 2010: 625 - 630.
10WANG Wei, ZENG Guo-sun, TANG Da-zhong, et al. Cloud-DLS:dynamic trusted scheduling for Cloud com- puting [J]. Expert System with Applications, 2012, 39 (3) :2321 - 2329.
1BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open network[C]. Proceedings of the European Sysposium on Re- search in Security (ESORICS). Brighton, 1994 : 3-8.
2GALIZIA S, GUGLIOTTA A, DOMINGUE J . A trust based methodology for web service selection[C]// International confer- ence on semantic computing,2007:193-200.
3MANIKRAO U S,PRABHAKAR T VDynamie selection of web services with recommendation system[C]. IEEE Computer Society, Washington: 342-352.