References
- J. Y. Wu, Q. L. Shen, J. L. Zhang, and Q. Xie, "Cloud computing: cloud security to trusted cloud," Advanced Materials Research, vol. 186, pp. 596-600, 2011. https://doi.org/10.4028/www.scientific.net/AMR.186.596
- I. Foster, Y. Zhao, I. Raicu, and S. Lu, "Cloud computing and grid computing 360-degree compared," in Proceedings of the Grid Computing Environments Workshop, Austin, TX, 2008, pp. 1-10.
- D. Chen and H. Zhao, "Data security and privacy protection issues in cloud computing," in Proceedings of the International Conference on Computer Science and Electronics Engineering, Hangzhou, China, 2012, pp. 647-651.
- S. Sun, C. Yan, and Y. Du, "Analysis on the influence of the cloud computing on the safety assessment technique," in Proceedings of the International Conference on Computer Science and Electronics Engineering, Hangzhou, China, 2012, pp. 285-288.
- D. G. Feng, M. Zhang, Y. Zhang, and Z. Xu, "Study on cloud computing security," Journal of Software, vol. 22, no. 1, pp. 71-83, 2011. https://doi.org/10.3724/SP.J.1001.2011.03958
- I. Foster, C. Kesselman, C. Lee, B. Lindell, K. Nahrstedt, and A. Roy, "A distributed resource management architecture that supports advance reservations and co-allocation," in Proceedings of the 7th International Workshop on Quality of Service, London, UK, 1999, pp. 27-36.
- C. M. Hu, J. P. Huai, T. Y. Wo, and L. Lei, "Service oriented grid architecture with end to end quality of service," Ruan Jian Xue Bao (Journal of Software), vol. 17, no. 6, pp. 1448-1458, 2006.
- Z. A. Wu and J. Z. Luo, "Dynamic multi-resource advance reservation in grid environment," in Proceedings of the IFIP International Conference on Network and Parallel Computing, Dalian, China, 2007, pp. 13-22.
- K. M. McKeown, "Advance reservation and co-allocation protocol for grid computing," in Proceedings of the 1st International Conference on e-Science and Grid Computing, Melbourne, Australia, 2005, pp. 1-8.
- Z. Gao and S. W. Luo, "Dynamic grid resource reservation mechanism based on resource-reservation graph," Ruanjian Xuebao (Journal of Software), vol. 22, no. 10, pp. 2497-2508, 2011.
- G. F. Wu and Y. He, "Improved domain-based trust model in grid environment," Computer Engineering, vol. 37, no. 3, pp. 137-139, 2011.
- W. Tang and Z. Chen, "Research of subjective trust management model based on the fuzzy set theory," Ruanjian Xuebao (Journal of Software), vol. 14, no. 8, pp. 1401-1408, 2003.
- S. W. Cheng and Y. Pan, "Credibility-based dynamic resource distribution strategy under cloud computing environment," Computer Engineering, vol. 37, no. 11, pp. 45-48, 2011.
- Y. Yao, J. Lin, J. Wang, N. Mi, and B. Sheng, "Admission control in YARN clusters based on dynamic resource reservation," in Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, Ottawa, Canada, 2015, pp. 838-841.
- C. Ghribi and D. Zeghlache, "Exact and heuristic graph-coloring for energy efficient advance cloud resource reservation," in Proceedings of the IEEE 7th International Conference on Cloud Computing, Anchorage, AK, 2014, pp. 112-119.
- Y. Shi, X. Jiang, and K. Ye, "An energy-efficient scheme for cloud resource provisioning based on CloudSim," in Proceedings of the IEEE International Conference on Cluster Computing, Austin, TX, 2011, pp. 595-599.