{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T00:01:28Z","timestamp":1694736088427},"reference-count":19,"publisher":"International Academy Publishing (IAP)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.8.5.1357-1365","type":"journal-article","created":{"date-parts":[[2013,4,19]],"date-time":"2013-04-19T14:50:50Z","timestamp":1366383050000},"source":"Crossref","is-referenced-by-count":16,"title":["Trust Based Access Control Policy in Multi-domain of Cloud Computing"],"prefix":"10.17706","volume":"8","author":[{"given":"Guoyuan","family":"Lin","sequence":"first","affiliation":[]},{"given":"Yuyu","family":"Bie","sequence":"additional","affiliation":[]},{"given":"Min","family":"Lei","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2013,5,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.6.10.2156-2163"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2011.03958"},{"issue":"no. 7","key":"ref3","first-page":"85","article-title":"Trustworthiness-based dynamic access control for grid application","volume":"35","author":"Chen","year":"2008","unstructured":"[3] Xuri Chen, Weimin Xu, Wenfeng Shen, \"Trustworthiness-based dynamic access control for grid application,\" Journal of Hunan University (Natural Sciences), vol. 35, no. 7, pp. 85-89, Jul. 2008.","journal-title":"Journal of Hunan University"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.egypro.2011.11.146"},{"key":"ref5","article-title":"Access control oriented quantified trust degree representation model for distributed systems","author":"Lang","year":"2010","unstructured":"[5] Bo Lang, \"Access control oriented quantified trust degree representation model for distributed systems,\" Journal on Communications, Dec. 2010.","journal-title":"J Commun","ISSN":"http:\/\/id.crossref.org\/issn\/0021-9916","issn-type":"print"},{"key":"ref6","article-title":"TRBAC: trust based access control model","author":"Liu","year":"2011","unstructured":"[6] Wu Liu, Haixin Duan, Hong Zhang, \"TRBAC: trust based access control model,\" Journal of Computer Research and Development, Aug. 2011.","journal-title":"J Comput Res Dev","ISSN":"http:\/\/id.crossref.org\/issn\/1000-1239","issn-type":"print"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1109\/ITAIC.2011.6030345","article-title":"Research on trust-based access control model in cloud computing","volume-title":"Proceedings of 6th ICPCA","author":"Tan","year":"2011","unstructured":"[7] Zhanjiang Tan, Zhuo Tang, Renfa Li, Ahmed Sallam, Liu Yang, \"Research on trust-based access control model in cloud computing,\" Proceedings of 6th ICPCA, 2011."},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1109\/ICPCA.2011.6106526","article-title":"The design of a trust and role based access control model in cloud computing","volume-title":"Information Technology and Artificial Intelligence Conference (ITAIC)","author":"Wang","year":"2011","unstructured":"[8] Wenhui Wang, Jing Han, Meina Song, Xiaohui Wang, \"The design of a trust and role based access control model in cloud computing,\" Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13869-0_30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.01.039"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"ref12","first-page":"3","article-title":"Valuation of trust in open networks","volume-title":"Proceedings of the Third European Symposium on Research in Computer Security","author":"Beth","year":"1994","unstructured":"[14] Beth T., Borcherding M., Klein B. \"Valuation of trust in open networks,\" Proceedings of the Third European Symposium on Research in Computer Security, Brighton: Springer-Verlag, pp. 3-18, 1994."},{"issue":"no. 3","key":"ref13","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","article-title":"J\u03d5sang A. \"A logic for uncertain probabilities","volume":"9","year":"2001","unstructured":"[15] J\u03d5sang A. \"A logic for uncertain probabilities,\" International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 9, no. 3, pp. 279-311, 2001.","journal-title":"Int J Uncertainty Fuzziness Knowledge-Based Syst","ISSN":"http:\/\/id.crossref.org\/issn\/0218-4885","issn-type":"print"},{"issue":"no. 2","key":"ref14","first-page":"357","article-title":"A recommendation trust method based on fuzzy clustering in P2P networks","volume":"8","author":"Guo","year":"2013","unstructured":"[17] Liangmin Guo, Yonglong Luo, Zhengzhen Zhou, Meijing Ji, \"A recommendation trust method based on fuzzy clustering in P2P networks,\" Journal of Software, vol. 8, no. 2, pp. 357-360, Feb. 2013.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.1.2.42-53"},{"issue":"no. 1","key":"ref16","first-page":"11","article-title":"A robust collaborative filtering recommendation algorithm based on multidimensional trust model","volume":"8","author":"Jia","year":"2013","unstructured":"[19] Dongyan Jia, Fuzhi Zhang, Sai Liu, \"A robust collaborative filtering recommendation algorithm based on multidimensional trust model,\" Journal of Software, vol. 8, no. 1, pp. 11-18, Jan. 2013.","journal-title":"J Softw","ISSN":"http:\/\/id.crossref.org\/issn\/1000-9825","issn-type":"print"},{"key":"ref16","unstructured":"[9] Santos N, Gummadi KP, Rodrigues R. \"Towards trusted cloud computing,\" In: Sahu S, ed, USENIX Association Proc. of the Workshop on Hot Topics in Cloud Computing 2009. San Diego, 2009. http:\/\/www.usenix.org\/events\/hotcloud09\/tech\/full_papers\/santos.pdf"},{"key":"ref16","unstructured":"[13] Junchang Song, Cheng Su, \"Using trust in access control mechanism,\" Computer Engineering and Design, Oct. 2007."},{"key":"ref16","unstructured":"[16] Apu Kapadia, Jalal Al-Muhtadi, R. Campbell, et al. \"IRBAC 2000: secure interoperability using dynamic role translation,\" University of Illinois, Technical Report: U I-UCDCS-R-2000-2162, 2000."}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T11:42:38Z","timestamp":1498045358000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/9269"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,1]]},"references-count":19,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2013,5,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.8.5.1357-1365","relation":{},"ISSN":["1796-203X"],"issn-type":[{"value":"1796-203X","type":"print"}],"subject":[],"published":{"date-parts":[[2013,5,1]]}}}