JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (08): 111-117.doi: 10.6040/j.issn.1671-9352.0.2014.274
Previous Articles Next Articles
LUO hai-yan1,2, LÜ Ping1, LIU Lin-zhong2, YANG Xun1
CLC Number:
[1] 刘鹏,刘欣,陈钟.信任管理研究综述[J].计算机工程与应用,2004(32):39-43. LIU Peng, LIU Xin, CHEN Zhong. A Survey on trust management[J]. Computer Engineering and Applications, 2004(32):39-43. [2] 冯登国,张敏,张妍, 等.云计算安全研究[J].软件学报,2011,22(1):71-83. FENG Dengguo, ZHANG Min, ZHANG Yan, et al. Study on Cloud Computing Security[J]. Journal of Software, 2011, 22(1):71-83. [3] 王磊,黄梦醒.云计算环境下基于灰色AHP的供应商信任评估研究[J].计算机应用研究,2013,30(3):742-750. WANG Lei, HUANG Meng-xing. Research on trust evaluation of supplier based on gray AHP in cloud computing[J]. Application Research of Computers, 2013, 30(3):742-750. [4] Beth T, Borcherding M, Klein B. Valuation of trust in open networks[C]//Proc. of ESORICS'94. Brighton: Springer-Verlag, 1994: 3-18. [5] Josang A. A logic for uncertain probabilities[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based System, 2001, 9(3):279-311. [6] BLAZE M, MFEIGENBAUM J, LACY J. Proceedings of 1996 IEEE Symposium on Security and Privacy[R]. Decentralized Trust Management, 1996: 164-173. [7] Abdul-Rahman A, Hailes S. Using recommendations for managing trust in distributed systems[C]. In Proceedings of the IEEE Malaysia International Conferenceon(MICC'97). Kuala Lumpur: IEEE Press, 1997. [8] 曹天杰,张永平.信任管理在电子商务中的实现[J].计算机应用与软件,2003,(3):15-17. Cao Tianjie, Zhang Yongping. On the implementation of trust management in electronic commerce[J]. Computer Applications and Software, 2003, (3):15-17. [9] 唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. TANG Wen, CHEN Zhong. Research of Subjective Trust Management Model Based on the Fuzzy Set Theory[J]. Journal of Software, 2003, 14(8):1401-1408. [10] 谭旭光,倪雁冰.响应型供应链中供应商综合能力的评价研究[J].组合机床与自动化加工技术,2007(11):108-112. TAN Xuguang, NI Yanbing. Research on Supplier Synthesis Capability Evaluation in Responsive Supply Chain[J]. Modular Machine Tool & Automatic Manufacturing Technique, 2007(11):108-112. [11] 张文修,吴伟志.粗糙集理论与方法[M].北京:科学出版社,2001:239-243. [12] 谢季坚,刘承平.模糊数学方法及其应用[M].武汉:华中科技大学出版社,2005:178-182. [13] 黎梨苗,陈志刚,邓晓衡.基于模糊理论的主观信任综合评价模型研究[J].计算机应用研究,2010,27(5):1860-1862. LI Limiao, CHEN Zhigang, DENG Xiaoheng. Research of subject trust comprehensive evaluation model based on fuzzy theory[J]. Application Research of Computers, 2010, 27(5):1860-1862. [14] Istvn Mezgr, Ursula Rauschecker. The challenge of networked enterprises for cloud computing interoperability[J]. Computers in Industry, 2014(65):657-674. |
[1] | ZHANG Ke-yong, LI Jiang-xin, YAO Jian-ming, LI Chun-xia. Research on supply chain decision making of equitable retailers with fair sensitivities [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 83-94. |
[2] | CHEN Liang, HU Jin-song. Influence of risk aversion on different types of dual-channel supply chain decision [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(5): 30-40. |
[3] | LIU Jing, ZHOU Yan, ZHENG Ying-jie, WANG Chao-sheng. Optimal decision-making for green supply chain considering retailers fairness concern and risk aversion [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(5): 12-29. |
[4] | XIAO Di, JIN Wen-wen. Pricing strategy for supply chain considering horizontal competition under C2B mode [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(5): 53-60. |
[5] | DONG Zhen-ning, WANG Zhuo, ZHOU Xue-jun. Retailer financing and ordering decision-making with limitation on the minimum loan amount [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(5): 61-69. |
[6] | WANG Xiao-yan, CHEN Xing-shu, WANG Yi-tong, GE Long. Performance measurement and analysis of cloud computing network based on OpenStack [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 30-37. |
[7] | HAN Pan-pan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 41-53. |
[8] | ZHONG Yuan, XIONG Shuang, ZHANG Cui-hua, CHEN Hui-jie. Research on fault tolerance strategies of quality improvement in supply chains with market pricing constraints [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 10-15. |
[9] | HUANG Yu-qing, ZHAO Bo, XIAO Yu, TAO Wei. A vTPM-VM live migration scheme based on KVM [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 69-75. |
[10] | DUAN Zheng-yu, ZHOU Yan, ZHANG Hua-min, XU Ming-jiao. The study of the supply chain network equilibrium model with retailers inequity aversion behavior [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 58-69. |
[11] | CHEN Guang-rui, CHEN Xing-shu, WANG Yi-tong, GE Long. A software update mechanism for virtual machines in IaaS multi-tenant environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 60-67. |
[12] | YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22. |
[13] | . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100. |
[14] | ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan. The method of determining decision attribute weight based on information entropy and membership [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 86-90. |
[15] | HE Xin-hua, HU Wen-fa, XU Chang-yan, CHEN Ji-hong. Collaborative transshipment strategy of service supply chain for emergencies based on stochastic and fuzzy simulation [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(12): 67-77. |
|