The key technology and realization of trusted cloud security, 2010. ,
Research on trustworthy networks, Chinese Journal of Computer, vol.28, issue.5, pp.751-758, 2005. ,
Fuzzy trust integration for security enforcement in grid computing, the Int'1 Symp on Network and Parallel Computing, pp.9-21, 2005. ,
Power-Trust: A robust and scalable reputation system for trusted Peer-to-Peer computing, IEEE Transactions on Parallel and Distributed Systems, vol.18, issue.4, pp.460-473, 2007. ,
Trust quantitative model with multiple decision factors in trusted network, Chinese Journal of Computer, vol.32, issue.3, pp.405-415, 2009. ,
Research on user behavior trust in trustworthy network, Journal of Computer Research and Development, vol.45, issue.12, pp.2033-2043, 2008. ,
AHP-based user behavior evaluation method in trustworthy network, Computer Engineering and Applications, vol.43, issue.19, pp.123-126, 2007. ,
The introduction of AHP, China Renmin University press, 1990. ,
Evaluation method of service-level network security situation based on fuzzy analytic hierarchy process, Journal of Computer Applications, vol.29, issue.9, pp.2327-2331, 2009. ,