{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:24:25Z","timestamp":1730237065172,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10,25]]},"DOI":"10.1109\/iccta35431.2014.9521622","type":"proceedings-article","created":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T16:37:02Z","timestamp":1630082222000},"page":"14-22","source":"Crossref","is-referenced-by-count":0,"title":["Hybrid Trust Management Model for Cloud Computing"],"prefix":"10.1109","author":[{"given":"Aya Salama A.","family":"Saleh","sequence":"first","affiliation":[]},{"given":"Essam M. Ramzy","family":"Hamed","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Hashem","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2011.10643132"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427548"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2010.67"},{"key":"ref13","article-title":"A trust model of cloud computing based on Quality of Service","author":"manuel","year":"2013","journal-title":"Annals of Operations Research"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2013.6710555"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522980"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1186\/2192-113X-1-19"},{"key":"ref4","article-title":"Security Agents: A Mobile Agent based Trust Model for Cloud Computing","volume":"36","author":"singh","year":"2011","journal-title":"International Journal of Computer Applications (0975 &#x2013; 8887)"},{"key":"ref3","first-page":"254","article-title":"CertainLogic: A Logic for Modeling Trust and Uncertainty\",Trust and Trustworthy Computing","author":"ries","year":"2011","journal-title":"4th International Conference TRUST 2011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.21917\/ijsc.2013.0076"},{"key":"ref5","article-title":"Trusted Anonymous Execution: A Model to Raise Trust in Cloud\",Grid and Cooperative Computing (GCC)","author":"song","year":"2010","journal-title":"2010 9th IEEE International Conference on"},{"key":"ref8","article-title":"Towards a Trust Management System for Cloud Computing Marketplaces: using CAIQ as a trust information source","author":"habib","year":"2013","journal-title":"Security and Communication Networks Journal"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.129"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.05.149"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24434-6_27"},{"key":"ref9","article-title":"Research on Trust Management Strategies in Cloud Computing Environment","author":"li","year":"2012","journal-title":"Journal of Computational Information Systems"}],"event":{"name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","start":{"date-parts":[[2014,10,25]]},"location":"Alexandria, Egypt","end":{"date-parts":[[2014,10,27]]}},"container-title":["2014 24th International Conference on Computer Theory and Applications (ICCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9521546\/9521602\/09521622.pdf?arnumber=9521622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T16:18:30Z","timestamp":1637597910000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9521622\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,25]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iccta35431.2014.9521622","relation":{},"subject":[],"published":{"date-parts":[[2014,10,25]]}}}