L. Hong and L. Hao, The key technology and realization of trusted cloud security, 2010.

L. Chuang and P. Xue-hai, Research on trustworthy networks, Chinese Journal of Computer, vol.28, issue.5, pp.751-758, 2005.

S. Ss and H. K. , Fuzzy trust integration for security enforcement in grid computing, the Int'1 Symp on Network and Parallel Computing, pp.9-21, 2005.

Z. Rong-fang and H. Kai, Power-Trust: A robust and scalable reputation system for trusted Peer-to-Peer computing, IEEE Transactions on Parallel and Distributed Systems, vol.18, issue.4, pp.460-473, 2007.

L. Xiao-yong and G. Xiao-lin, Trust quantitative model with multiple decision factors in trusted network, Chinese Journal of Computer, vol.32, issue.3, pp.405-415, 2009.

L. Chuang, T. Li-qin, and W. Yuan-zhuo, Research on user behavior trust in trustworthy network, Journal of Computer Research and Development, vol.45, issue.12, pp.2033-2043, 2008.

J. Tie-guo, T. Li-qin, and H. Zhi-xing, AHP-based user behavior evaluation method in trustworthy network, Computer Engineering and Applications, vol.43, issue.19, pp.123-126, 2007.

W. Lian-fen and X. Shu-bai, The introduction of AHP, China Renmin University press, 1990.

L. Lei, W. Hui-qiang, and L. Yin, Evaluation method of service-level network security situation based on fuzzy analytic hierarchy process, Journal of Computer Applications, vol.29, issue.9, pp.2327-2331, 2009.