[1] S. M. Habib, S. Hauke, and S. Ries, “Trust as a facilitator in cloud computing a survey,” Journal of Cloud Computing: Advances, Systems and Applications, 1:19, 2012.##
[2] J. Huang and D. M. Nl, “Trust mechanisms for cloud computing,” Journal of Cloud Computing: Springer open Journal Advances, Systems and Applications, 2:9, 2013.##
[3] H. Kim, H. Lee, W. Kim, and Y. Kim, “A Trust Evaluation Model for QoS Guarantee in Cloud Systems,” International Journal of Grid and Distributed Computing, vol. 3, no. 1, March 2010.##
[4] J. Abawajy, “Establishing Trust in Hybrid Cloud Computing Environments,” IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communication, pp. 118-125, Changsha, 2011.##
[5] D. Sun, G. Chang, L. Sun, F. Li, and X. Wang, “A dynamic multi-dimensional trust evaluation model to enhance security of cloud computing environments,” Int. J. Innovative Computing and Applications, vol. 3, no. 4, 2011.##
[6] Z. X. ZHOU, H. XU, and S. P. WANG, “A Novel Weighted Trust Model based on Cloud,” Advances in Information Sciences and Service Sciences, vol. 3, no. 3, April 2011.##
[7] D. A. D'Melloa and V. S. Ananthanarayana, “Dynamic Selection Mechanism for Quality of Service Aware Web Services,” Journal of Enterprise Information Systems, vol. 4, no. 1, pp. 23-60, USA, 2010.##
[8] X. S. Wang, X. Q. Wen, and D. Liu, “Trust Model Based on Cloud Theory in Pervasive Environment,” Computer Engineering, vol. 36, no. 7, pp. 282-284, 2010.##
[9] Z. Yang, L. Qiao, C. Liu, C. Wan, “A Collaborative Trust Model Of Firewall Through Based On Cloud Computing,” 14th International Conference On Computer Supported Cooperative Work In Design (CSCWD), pp. 329-334, Shanghai, China, 2010.##
[10] S. X. Wang, L. Zhang, and H. S. Li, “Evaluation Approach of Subjective Trust Based on Cloud Model,” Journal of Software, vol. 21, no. 6, pp. 1341-1352, 2010.##
[11] A. J. Bidgoly and B. T. Ladani, “Trust Modeling and Verification Using Colored Petri Nets,” 2011 8th International ISC Conference on Information Security and Cryptology (ISCISC), September 2011.##
[12] N. Griffiths, K. M. Chao, and M. Younas, “Fuzzy trust for peer-to-peer systems,” in: ICDCSW Workshops 2006, 26th IEEE International Conference on Distributed Computing Systems Workshops 2006, pp. 73–73, July 2006.##
[13] Q. J. Sun and F. P. Zeng, “Trust Model Based on Reputation and Cloud Model in P2P Environment,” Mini-micro Systems, vol. 31, no. 7, pp. 1328-1332, 2010.##
[14] J. Luo, X. Liu, and M. Fan, “A trust model based on fuzzy recommendation for mobile ad-hoc networks,” Journal of Computer Networks, Elsevier, pp. 2396–2407, 2009.##
[15] H. Liao, Q. Wang, and G. Li, “A Fuzzy Logic-based Trust Model in Grid,” International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 608-614, 2009.##
[16] W. Li and L. Ping, “Trust Model to Enhance Security and Interoperability of Cloud Environment,” Cloud Com 2009, LNCS 5931, pp. 69–79, 2009.##
[17] D. Kovac and D. Trcek, “Qualitative trust modeling in SOA,” Journal of Systems Architecture, vol. 55, pp. 255–263, 2009.##
[18] Z. Shuqin, L. Dongxin, and Y. Yongtian, “A Fuzzy Set Based Trust and Reputation Model in P2P Networks,” IDEAL 2004, LNCS 3177, pp. 211–217, 2004.##
[19] X. Wang, P. Liang, H. Ma, D. Xing, and B. Wang, “A P2P Trust Model Based on Multi-Dimensional Trust Evaluation,” LSMS 2007, LNCS 4688, pp. 347–356, 2007.##
[20] J. Li, X. Wang, B. Liu, Q. Wang, and G. Zhang, “A reputation management scheme based on global trust model for peer-to-peer virtual communities,” in: WAIM, pp. 205–216, 2006.##
[21] L. Jing-Tao, J. Yi-Nan, X. Xiao-Chun, W. Xue-Ping, and Z. Gen-Du, “A trust model based on similarity-weighted recommendation for p2p environments,” Mob. Netw. Appl., vol. 18, no. 1, pp. 157–167, 2007.##
[22] B. Sarwar, G. Karypis, J. Konstan, and J. Riedl, “Item-Based Collaborative Filtering Recommendation Algorithms,” WWW10, May 1-5, Hong Kong, ACM 1-58113-348-0/01/0005 , 2001.##
[23] R. Buyya, R. Ranjan, and R. N. Calheiros, “Modeling and simulation of scalable cloud computing environments and the Clouds toolkit: challenges and opportunities,’ Proceedings of the 2009 International Conference on High Performance Computing & Simulation, (HPCS 2009), pp. 1–11, June 2009.##
W. J. Guojun Wang and J. Wu, “Generating trusted graphs for trust evaluation in online social networks Future Generation Computer Systems,” 2012##