

Author: Zhu Bo Jajodia Sushil Kankanhalli Mohan S.
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.1, Iss.1-2, 2006-09, pp. : 103-112
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


By Almeida Eduardo Sunyé Gerson Traon Yves Valduriez Patrick
Empirical Software Engineering, Vol. 15, Iss. 4, 2010-08 ,pp. :


Trust modelling and analysis in peer-to-peer clouds
By Petri Ioan
International Journal of Cloud Computing, Vol. 1, Iss. 2-3, 2012-05 ,pp. :



