{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:03:15Z","timestamp":1774364595397,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T00:00:00Z","timestamp":1540512000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s11227-018-2669-y","type":"journal-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T14:16:10Z","timestamp":1540563370000},"page":"3534-3554","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments"],"prefix":"10.1007","volume":"75","author":[{"given":"Heba","family":"Kurdi","sequence":"first","affiliation":[]},{"given":"Auhood","family":"Alfaries","sequence":"additional","affiliation":[]},{"given":"Abeer","family":"Al-Anazi","sequence":"additional","affiliation":[]},{"given":"Sara","family":"Alkharji","sequence":"additional","affiliation":[]},{"given":"Maimona","family":"Addegaither","sequence":"additional","affiliation":[]},{"given":"Lina","family":"Altoaimy","sequence":"additional","affiliation":[]},{"given":"Syed Hassan","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"2669_CR1","doi-asserted-by":"crossref","unstructured":"Firdhous M, Ghazali O, Hassan S (2011) A trust computing mechanism for cloud computing with multilevel thresholding. In: 6th International Conference on Industrial and Information Systems, IEEE, Kandy, Sri Lanka, pp 457\u2013461","DOI":"10.1109\/ICIINFS.2011.6038113"},{"key":"2669_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1049\/iet-ifs.2012.0232","volume":"7","author":"X Li","year":"2013","unstructured":"Li X, Du J (2013) Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing. IET Inf Secur 7:39\u201350. https:\/\/doi.org\/10.1049\/iet-ifs.2012.0232","journal-title":"IET Inf Secur"},{"key":"2669_CR3","doi-asserted-by":"crossref","unstructured":"Kanwal A, Masood R, Ghazia UE, Shibli MA, Abbasi AG (2013) Assessment criteria for trust models in cloud computing. In: IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing. IEEE, Beijing, China, pp 254\u2013261","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.61"},{"key":"2669_CR4","doi-asserted-by":"crossref","unstructured":"Goyal MK, Aggarwal A, Gupta P, Kumar P (2012) QoS based trust management model for Cloud IaaS. In: 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, IEEE, Solan, India, pp 843\u2013847","DOI":"10.1109\/PDGC.2012.6449933"},{"key":"2669_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1147\/JRD.2009.5429058","volume":"53","author":"B Rochwerger","year":"2009","unstructured":"Rochwerger B, Breitgand D, Levy E, Galis A, Nagin K, Llorente IM, Montero R, Wolfsthal Y, Elmroth E, Caceres J, Ben-Yehuda M, Emmerich W, Galan F (2009) The reservoir model and architecture for open federated cloud computing. IBM J Res Dev 53:1\u20134. https:\/\/doi.org\/10.1147\/JRD.2009.5429058","journal-title":"IBM J Res Dev"},{"key":"2669_CR6","doi-asserted-by":"crossref","unstructured":"Demchenko Y, Ngo C, Laat CD, Lee C (2014) Federated access control in heterogeneous intercloud environment: basic models and architecture patterns. In: IEEE International Conference on Cloud Engineering, IEEE, Boston, MA, USA, pp 439\u2013445","DOI":"10.1109\/IC2E.2014.84"},{"key":"2669_CR7","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-3-319-10389-1_2","volume-title":"Software engineering, artificial intelligence, networking and parallel\/distributed computing","author":"U Habiba","year":"2015","unstructured":"Habiba U, Masood R, Shibli MA (2015) Secure identity management system for federated cloud environment. In: Lee R (ed) Software engineering, artificial intelligence, networking and parallel\/distributed computing. Springer, New York, pp 17\u201333"},{"key":"2669_CR8","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/MIC.2009.94","volume":"13","author":"K Keahey","year":"2009","unstructured":"Keahey K, Tsugawa M, Matsunaga A, Fortes J (2009) Sky computing. IEEE Int Comput 13:43\u201351. https:\/\/doi.org\/10.1109\/MIC.2009.94","journal-title":"IEEE Int Comput"},{"key":"2669_CR9","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/2593512","volume":"47","author":"AN Toosi","year":"2014","unstructured":"Toosi AN, Calheiros RN, Buyya R (2014) Interconnected cloud computing environments: challenges, taxonomy, and survey. ACM Comput Surv 47:7. https:\/\/doi.org\/10.1145\/2593512","journal-title":"ACM Comput Surv"},{"key":"2669_CR10","doi-asserted-by":"crossref","unstructured":"Hu Z, Liu L, Wang C (2011) Organization domain trust evaluation model in federa environment based on subjective logic. In: International Conference on Information Technology, Computer Engineering and Management Sciences (ICM), IEEE, Nanjing, Jiangsu, China, pp 380\u2013384","DOI":"10.1109\/ICM.2011.62"},{"key":"2669_CR11","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A J\u00f8sang","year":"2001","unstructured":"J\u00f8sang A (2001) A logic for uncertain probabilities. Int J Uncertain Fuzziness Knowl Based Syst 9:279\u2013311. https:\/\/doi.org\/10.1142\/S0218488501000831","journal-title":"Int J Uncertain Fuzziness Knowl Based Syst"},{"key":"2669_CR12","unstructured":"J\u00f8sang A, Hayward R, Pope S (2006) Trust network analysis with subjective logic. In: Proceedings of the 29th Australasian Computer Science Conference. Australian Computer Society, Inc., Hobart, Australia, pp 85\u201394"},{"key":"2669_CR13","doi-asserted-by":"crossref","unstructured":"Alhadad N, Busnel Y, Serrano-Alvarado P, Lamarre P (2014) Trust evaluation of a system for an activity with subjective logic. In International Conference on Trust, Privacy and Security in Digital Business, Springer, Cham, pp 48\u201359","DOI":"10.1007\/978-3-319-09770-1_5"},{"issue":"3","key":"2669_CR14","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/TCIAIG.2016.2592965","volume":"9","author":"RC Cardoso","year":"2017","unstructured":"Cardoso RC, Gomes AJ, Freire MM (2017) A user trust system for online games\u2014part I: an activity theory approach for trust representation. IEEE Trans Comput Intell AI Games 9(3):305\u2013320","journal-title":"IEEE Trans Comput Intell AI Games"},{"key":"2669_CR15","doi-asserted-by":"crossref","unstructured":"Chen F, Wang C, Cho JH (2017) Collective subjective logic: scalable uncertainty-based opinion inference. In: 2017 IEEE International Conference on Big Data (Big Data), IEEE, pp 7\u201316","DOI":"10.1109\/BigData.2017.8257906"},{"key":"2669_CR16","doi-asserted-by":"crossref","unstructured":"West AG, Kannan S, Lee I, Sokolsky O (2010) An evaluation framework for reputation management systems. In: Zheng Y (ed) Trust modeling and management in digital environments: from social concept to system development. Information science reference, Hershey, PA, USA, pp 282\u2013308","DOI":"10.4018\/978-1-61520-682-7.ch012"},{"key":"2669_CR17","doi-asserted-by":"crossref","unstructured":"Biao C, Zhishu L, Yang C, Die F, Liangyang C (2009) Trust decision making in structured P2P network. In: International Conference on Communication Software and Networks, IEEE, Macau, China, pp 679\u2013683","DOI":"10.1109\/ICCSN.2009.52"},{"key":"2669_CR18","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1109\/TPDS.2007.1021","volume":"18","author":"R Zhou","year":"2007","unstructured":"Zhou R, Hwang K (2007) PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18:460\u2013473. https:\/\/doi.org\/10.1109\/TPDS.2007.1021","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"2669_CR19","volume-title":"Distributed and cloud computing: from parallel processing to the internet of things","author":"K Hwang","year":"2012","unstructured":"Hwang K, Fox GC, Dongarra JJ (2012) Distributed and cloud computing: from parallel processing to the internet of things. Morgan Kaufmann, New York"},{"key":"2669_CR20","first-page":"1043","volume":"14","author":"Y-J Lin","year":"2013","unstructured":"Lin Y-J, Yang H-W, Yang C-C, Lin W (2013) A traceable and fair transaction mechanism for digital rights management on P2P networks. J Int Technol 14:1043\u20131051","journal-title":"J Int Technol"},{"key":"2669_CR21","unstructured":"Firdhous M, Ghazali O, Hassan S, Harun NZ, Abas A (2011) Honey bee based trust management system for cloud computing. In: 3rd International Conference on Computing and Informatics. ICOCI, Bandung, Indonesia, paper no. 126"},{"key":"2669_CR22","doi-asserted-by":"crossref","unstructured":"Sato H, Kanai A, Tanimoto S (2010) A cloud trust model in a security aware cloud. In: 10th IEEE\/IPSJ International Symposium on Applications and the Internet, IEEE, Seoul, South Korea, pp 121\u2013124","DOI":"10.1109\/SAINT.2010.13"},{"key":"2669_CR23","unstructured":"Wang T, Ye B, Li Y, Yang Y (2010) Family gene based cloud trust model. In: Educational and Network Technology (ICENT), IEEE, Qinhuangdao, China, pp 540\u2013544"},{"key":"2669_CR24","doi-asserted-by":"crossref","unstructured":"J\u00f8sang A, Bhuiyan T (2008) Optimal trust network analysis with subjective logic. In: 2nd International Conference on Emerging Security Information, Systems and Technologies, IEEE, Cap Esterel, France, pp 179\u2013184","DOI":"10.1109\/SECURWARE.2008.64"},{"key":"2669_CR25","doi-asserted-by":"crossref","unstructured":"Bhuiyan T, Josang A, Xu Y (2010) Trust and reputation management in web-based social network. In: Web Intelligence and Intelligent Agents, InTech, Croatia, pp 207\u2013232","DOI":"10.5772\/8375"},{"key":"2669_CR26","doi-asserted-by":"crossref","unstructured":"Ma X, Wang Z, Liu F, Bian J (2010) A trust model based on the extended subjective logic for P2P networks. In: 2nd International Conference on e-Business and Information System Security, IEEE, Wuhan, China, pp 1\u20134","DOI":"10.1109\/EBISS.2010.5473465"},{"key":"2669_CR27","doi-asserted-by":"crossref","unstructured":"Dillon T, Wu C, Chang E (2010) Cloud computing: issues and challenges. In: 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), IEEE, Perth, WA, Australia, pp 27\u201333","DOI":"10.1109\/AINA.2010.187"},{"key":"2669_CR28","doi-asserted-by":"crossref","unstructured":"Habib SM, Ries S, Muhlhauser M (2010) Cloud computing landscape and research challenges regarding trust and reputation. In: 7th International Conference on Ubiquitous Intelligence and Computing and 7th International Conference on Autonomic and Trusted Computing, IEEE, Xian, Shaanxi, China, pp 410\u2013415","DOI":"10.1109\/UIC-ATC.2010.48"},{"key":"2669_CR29","doi-asserted-by":"crossref","unstructured":"Li W, Ping L, Pan X (2010) Use trust management module to achieve effective security mechanisms in cloud environment. In: International Conference on Electronics and Information Engineering, IEEE, Kyoto, Japan, pp\u00a0V1-14\u2013V11-19","DOI":"10.1109\/ICEIE.2010.5559829"},{"key":"2669_CR30","doi-asserted-by":"crossref","unstructured":"Habib SM, Ries S, Muhlhauser M (2011) Towards a trust management system for cloud computing. In: 10th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE Changsha, China, pp 933\u2013939","DOI":"10.1109\/TrustCom.2011.129"},{"key":"2669_CR31","doi-asserted-by":"crossref","unstructured":"Fan W, Perros H (2013) A reliability-based trust management mechanism for cloud services. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) IEEE, Melbourne, VIC, Australia, pp 1581\u20131586","DOI":"10.1109\/TrustCom.2013.194"},{"key":"2669_CR32","unstructured":"Muchahari MK, Sinha SK (2012) A new trust management architecture for cloud computing environment. In: International Symposium on Cloud and Services Computing, IEEE, Mangalore, India, pp 136\u2013140"},{"key":"2669_CR33","doi-asserted-by":"crossref","unstructured":"Chiluka N, Andrade N, Gkorou D, Pouwelse J (2012) Personalizing eigentrust in the face of communities and centrality attack. In: 26th International Conference on Advanced Information Networking and Applications, IEEE, Fukuoka, Japan, pp 503\u2013510","DOI":"10.1109\/AINA.2012.48"},{"key":"2669_CR34","doi-asserted-by":"crossref","unstructured":"Shvachko K, Kuang H, Radia S, Chansler R (2010) The hadoop distributed file system. In: 26th Symposium on Mass Storage Systems and Technologies (MSST), IEEE, Incline Village, NV, USA, pp 1\u201310","DOI":"10.1109\/MSST.2010.5496972"},{"key":"2669_CR35","doi-asserted-by":"crossref","unstructured":"Rao S, Wang Y, Tao XL (2010) The comprehensive trust model in P2P based on improved eigentrust algorithm. In: International Conference on Measuring Technology and Mechatronics Automation, IEEE, Changsha City, China, pp 822\u2013825","DOI":"10.1109\/ICMTMA.2010.221"},{"key":"2669_CR36","unstructured":"Khan SM, Hamlen KW (2012) Hatman: intra-cloud trust management for hadoop. In: 5th International Conference on Cloud Computing, IEEE, Honolulu, HI, USA, pp 494\u2013501"},{"key":"2669_CR37","doi-asserted-by":"crossref","unstructured":"Nishikawa T, Fujita S (2010) An effective risk avoidance scheme for the eigentrust reputation management system. In: 1st International Conference on Networking and Computing, IEEE, Higashi-Hiroshima, Japan, pp 36\u201343","DOI":"10.1109\/IC-NC.2010.28"},{"key":"2669_CR38","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1120717.1120721","volume":"5","author":"Z Abrams","year":"2005","unstructured":"Abrams Z, Mcgrew R, Plotkin S (2005) A non-manipulable trust system based on eigentrust. ACM SIGecom Exch 5:21\u201330","journal-title":"ACM SIGecom Exch"},{"key":"2669_CR39","doi-asserted-by":"crossref","unstructured":"Samlinson E, Usha M (2013) User-centric trust based identity as a service for federated cloud environment. In: 4th International Conference on Computing, Communications and Networking Technologies (ICCCNT), IEEE, Tiruchengode, India, pp 1\u20135","DOI":"10.1109\/ICCCNT.2013.6726636"},{"key":"2669_CR40","doi-asserted-by":"crossref","unstructured":"Jaiganesh M, Aarthi M, Kumar AVA (2015) Fuzzy ART-based user behavior trust in cloud computing. In: Artificial Intelligence and Evolutionary Algorithms in Engineering Systems, Springer, New Delhi, pp 341\u2013348","DOI":"10.1007\/978-81-322-2126-5_38"},{"issue":"1","key":"2669_CR41","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/s11227-015-1488-7","volume":"72","author":"S Jabbar","year":"2016","unstructured":"Jabbar S, Naseer K, Gohar M, Rho S, Chang H (2016) Trust model at service layer of cloud computing for educational institutes. J Supercomput 72(1):58\u201383","journal-title":"J Supercomput"},{"key":"2669_CR42","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/TPDS.2015.2408613","volume":"27","author":"TH Noor","year":"2016","unstructured":"Noor TH, Sheng QZ, Yao L, Dustdar S, Ngu AH (2016) CloudArmor: supporting reputation-based trust management for cloud services. IEEE Trans Parallel Distrib Syst 27:367\u2013380","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"2","key":"2669_CR43","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/s40815-016-0149-1","volume":"19","author":"RK Chahal","year":"2016","unstructured":"Chahal RK, Singh S (2016) Fuzzy rule-based expert system for determining trustworthiness of cloud service providers. Int J Fuzzy Syst 19(2):338\u2013354","journal-title":"Int J Fuzzy Syst"},{"issue":"2","key":"2669_CR44","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s40815-016-0146-4","volume":"19","author":"A Selvaraj","year":"2017","unstructured":"Selvaraj A, Sundararajan S (2017) Evidence-based trust evaluation system for cloud services using fuzzy logic. Int J Fuzzy Syst 19(2):329\u2013337","journal-title":"Int J Fuzzy Syst"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-018-2669-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2669-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2669-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T12:09:19Z","timestamp":1694002159000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-018-2669-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,26]]},"references-count":44,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["2669"],"URL":"https:\/\/doi.org\/10.1007\/s11227-018-2669-y","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,26]]},"assertion":[{"value":"26 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}