Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
[3] F. Koeune and F.-X. Standaert, “Foundations of security analysis and design iii,” A. Aldini,
R. Gorrieri, and F. Martinelli, Eds. Berlin, Heidelberg: Springer-Verlag, 2005, ch. A Tutorial on
Physical Security and Side-channel Attacks.
[4] S. Habib, S. Hauke, S. Ries, and M. Mhlhuser, “Trust as a facilitator in cloud computing: a
survey,” Journal of Cloud Computing.
[5] J. Huang and D. Nicol, “Trust mechanisms for cloud computing,” Journal of Cloud
Computing.
[7] T. Noor and Q. Sheng, “Credibility-based trust management for services in cloud
environments,” in Service-Oriented Computing, ser. Lecture Notes in Computer Science, G.
Kappel, Z. Maamar, and H. Motahari-Nezhad, Eds. Springer Berlin Heidelberg.
[10] A. Whitby, A. Jsang, and J. Indulska, “Filtering out unfair ratings in bayesian reputation
systems,” .
[11] C. Dellarocas, “Immunizing online reputation reporting systems against unfair ratings and
discriminatory behavior,” in Proceedings of the 2Nd ACM Conference on Electronic Commerce,
ser. EC ’00. New York, NY, USA: ACM,.
[12] M. Chen and J. P. Singh, “Computing and using reputations for internet ratings,” in
Proceedings of the 3rd ACM Conference on Electronic Commerce, ser. EC ’01. New York, NY,
USA.
[13] A. Das and M. Islam, “Securedtrust: A dynamic trust computation model for secured
communication in multi agent systems,” Dependable and Secure Computing, IEEE Transactions.
[14] A. K. Despotovic Z, “Maximum likelihood estimation of peers? performances in p2p
networks,” in Proceedings of the 2nd workshop on the economics of peer-to-peer systems.
[15] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The eigen trust algorithm for
reputation management in p2p networks,” in Proceedings of the 12th International Conference
on World Wide Web, ser. WWW ’03. New York, NY, USA.
[16] B. Yu, M. Singh, and K. Sycara, “Developing trust in large-scale peer-to-peer systems,” in
Multi-Agent Security and Survivability.
[17] A. Whitby, A. Jsang, and J. Indulska, “Filtering out unfair ratings in bayesian reputation
systems,”.
[18] B. E. Commerce, A. Jsang, and R. Ismail, “The beta reputation system,” in In Proceedings
of the 15th Bled Electronic Commerce Conference.
[19] W. T. L. Teacy, J. Patel, N. R. Jennings, and M. Luck, “Coping with inaccurate reputation
sources: Experimental analysis of a probabilistic trust model,” in Proceedings of the Fourth
International Joint Conference on Autonomous Agents and Multiagent Systems.
.
[20] H. Zhao, X. Yang, and X. Li, “An incentive mechanism to reinforce truthful reports in
reputation systems,” .
[21] R. Jurca and B. Faltings, “An incentive compatible reputation mechanism,” in Proceedings
of the Second International Joint Conference on Autonomous Agents and Multiagent Systems,
ser. AAMAS.
[22] M. Feldman, K. Lai, I. Stoica, and J. Chuang, “Robust incentive techniques for peer-to-peer
networks,” in Proceedings of the 5th ACM Conference on Electronic Commerce, ser. EC ’04.
New York.
[25] E. Ayday and F. Fekri, “Robust reputation management using probabilistic message
passing,” in Proceedings of the Global Communications.
[27] Y. Zhu and M. Ammar, “Algorithms for assigning substrate network resources to virtual
network components,” .
[28] D. G. Andersen, “Theoretical approaches to node assignment,”.
[29] J. Lischka and H. Karl, “A virtual network mapping algorithm based on subgraph
isomorphism detection,” in Proceedings of the 1st ACMWorkshop on Virtualized Infrastructure
Systems and Architectures,.
[30] M. Yu, Y. Yi, J. Rexford, and M. Chiang, “Rethinking virtual network embedding:
Substrate support for path splitting and migration,” SIGCOMM Comput. Commun.
[31] R. Ricci, C. Alfeld, and J. Lepreau, “A solver for the network test bed mapping problem,”
SIGCOMM Comput. Commun. Rev.,.
[33] X. A. Sandra Herker, Ashiq Khan, “Survey on survivable virtual network embedding
problem and solutions,” ICNS 2013 : The Ninth International Conference on Networking and
Services,.
[35] P. Gill, N. Jain, and N. Nagappan, “Understanding network failure in data centers:
Measurement, analysis, and implications,”.
[37] T. Guo, N. Wang, K. Moessner, and R. Tafazolli, “Shared backup network provision for
virtual network embedding,” in Communications.
[38] H. Yu, V. Anand, C. Qiao, and H. Di, “Migration based protection for virtual infrastructure
survivability for link failure,” in Optical Fiber Communication Conference and
[39] J. Shamsi and M. Brockmeyer, “Qosmap: Achieving quality and resilience through overlay
construction,” in Internet and Web Applications and Services.
[40] H. Yu, V. Anand, C. Qiao, and G. Sun, “Cost efficient design of survivable virtual
infrastructure to recover from facility node failures,” .
[41] C. Qiao, B. Guo, S. Huang, J. Wang, T. Wang, and W. Gu, “A novel.two-step approach to
surviving facility failures,” in Optical Fiber Communication Conference and Exposition
(OFC/NFOEC), 2011 and the National Fiber Optic Engineers Conference.
[42] H. Yu, C. Qiao, V. Anand, X. Liu, H. Di, and G. Sun, “Survivable virtual infrastructure
mapping in a federated computing and networking system under single regional failures,” .
[43] Q. Hu, Y. Wang, and X. Cao, “Location-constrained survivable network virtualization,” in
Sarnoff Symposium .
[44] W.-L. Yeow, C. Westphal, and U. Kozat, “Designing and embedding reliable virtual
infrastructures,” .
[46] M. Rahman and R. Boutaba, “Svne: Survivable virtual network embedding algorithms for
network virtualization,” Network and Service Management,.
[47] E. Modiano and A. Narula-Tam, “Survivable lightpath routing: A new approach to the
design of wdm-based networks,” .
[48] X. Sun, G. Chang, and F. Li, “A trust management model to enhance security of cloud
computing environments,” in Networking and Distributed Computing (ICNDC), 2011 Second
International Conference .
[49] M. Wang, G. Wang, J. Tian, H. Zhang, and Y. Zhang, “An accurate and multi-faceted
reputation scheme for cloud computing,”.
[50] J. Sidhu and S. Singh, “Compliance based trustworthiness calculation mechanism in cloud
environment,” Procedia Computer Science,.
[51] M. Mac´ıas and J. Guitart, “Cheat-proof trust model for cloud computing markets,” in
Proceedings of the 9th International Conference on Economics of Grids, Clouds, Systems, and
Services,.
[52] T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu, “Trust management of services in cloud
environments: Obstacles and solutions,”.
[53] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud:
Exploring information leakage in third-party compute clouds,” in Proceedings of the 16th ACM
Conference on Computer and Communications Security.
[54] T. Zhang, Y. Zhang, and R. B. Lee, “Memory dos attacks in multi-tenant clouds: Severity
and mitigation,”.