Keyphrases
Malicious Attacks
100%
Cloud Computing Environment
100%
Trust Model
100%
Deception
66%
Trust Evaluation
66%
Public Cloud Computing
66%
Deception Behavior
66%
Cloud Service Provider
33%
Cloud Services
33%
Politicians
33%
User Requirements
33%
Information Sharing
33%
Service Provider
33%
Detection Rate
33%
Cloud Computing System
33%
Detection Efficiency
33%
Unreliability
33%
Inherent Uncertainty
33%
One-based
33%
Cloud User
33%
Service Users
33%
Gain Loss
33%
Malicious Node Detection
33%
Fuzzy Mathematics
33%
Solo
33%
User Collusion
33%
Provider-initiated
33%
Gainsharing
33%
Loss Analysis
33%
Fail-stop Signature
33%
Computer Science
Cloud Computing
100%
Malicious Attack
100%
Public Cloud
66%
User Requirement
33%
Cloud Computing System
33%
Fuzzy Mathematics
33%
User and Cloud Service Provider
33%