[2]
D. Qianni, and C. Quan, Cloud computing and its key technology. Development and applications of high performance computing,
Vol. 26, no. 1, pp. 2-6, 2009.
[3]
C. Cachin, and M. Schunter, "A cloud you can trust", The INSPEC, vol. 48, no. 12, pp. 28-51, 2011.
[4]
Cloud computing use cases for discussion groups, cloud computing
use cases white paper, fourth edition, 2010.07.02, p. 47-54.
[5]
M. Alhamad, T. Dilon, and E. Chang, "The conceptual SLA framework for cloud computing", In: Proceeding of the 4th International Conference on Digital Ecosystems and Technologies The Park
Hyatt, Dubai, 2010.
[6]
J.J. Song, and Y. Wenjing, "Trust management related technology research", J. Commun. Comput., vol. 3, no. 1, pp. 37-43, 2006.
[7]
D. Gambetta, Can we trust? 2000, p. 213-2000. Dasgupta, 9. A. a.
Prat. Reputation and asset prices: A going of information Cascades
and systematic mispricing yoshinori miura, London School of Economics,
2005.
[8]
M. Deutsch, Distributive justice, a social, psychological perspective., The Yale University Press: New Haven, CT, 1985.
[9]
C.D. Zheng Xiaolin, Red China, etc. Service trust and credibility.
Hangzhou, zhejiang university press, 2008.4, pp 28-38.
[10]
B. Miztal, Trust in Modern Societies., Polity Press: Cambridge, MA, 1996.
[13]
Mui, Mohtashemi M. and A. Halberstadt a. A computational Model
of Trust and Reputation.
[15]
E. Chang, T. Dillon, and K.F. Hussain, Trust and reputation for
service-oriented environments: Technologies for building business
intelligence and consumer confidence. John Wiley & Sons, Ltd.,
Vu, 2006.36 m. Hauswirth, and k. Aberer. Forward P2P - based
semantic web Service discovery with QoS support//BPM 2005
Workshops, p. 18 to 31 in Reading, UK, 2006.
[16]
X. Liu, and L. Xiao, "HiREP: Hierarchical Reputation Management for Peer - to - Peer Systems", In: Proceeding of the 2006 International Conference on Parallel Processing Columbus, Ohio, USA, 2006.
[17]
N.H. Li, W.H. Winsborough, and J.C. Mitchell, "Distributed the credential chain discovery in trust management", J. Comput. Secur., vol. 11, no. 1, pp. 35-86, 2003.
[18]
T. Beth, M. Borcherding, and B. Klein, "The valuation of trust in the open networks", In: Proceedings of the Third European Symposium on Research in Computer Security London, UK: Springer - Verlag, 1994. pp. 3-18.
[19]
K. Huafeng L. Wei, "Zhang hui. “Trust negotiation based on similar trust in electronic commerce research", Inform. Netw. Secur., vol. 10, pp. 40-42, 2010.