
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
The Assessment of Cloud Service Trustworthiness State Based on D-S Theory and Markov Chain
Ming Yang, Tilei Gao, Wanyu Xie, et al.
IEEE Access (2022) Vol. 10, pp. 68618-68632
Open Access | Times Cited: 13
Ming Yang, Tilei Gao, Wanyu Xie, et al.
IEEE Access (2022) Vol. 10, pp. 68618-68632
Open Access | Times Cited: 13
Showing 13 citing articles:
A software trustworthiness evaluation methodology for cloud services with picture fuzzy information
Chuan Yue
Applied Soft Computing (2024) Vol. 152, pp. 111205-111205
Closed Access | Times Cited: 8
Chuan Yue
Applied Soft Computing (2024) Vol. 152, pp. 111205-111205
Closed Access | Times Cited: 8
A Trustworthiness Evaluation Mechanism Based on Principles–Assumptions Model
Xuefei Li, Ru Li
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17510-17524
Closed Access | Times Cited: 1
Xuefei Li, Ru Li
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17510-17524
Closed Access | Times Cited: 1
AI-HybridChain: Picturized authentication and DRL based access control method with secure two fold revocation for ensuring cloud computing security
Sathish Chander Krishnan
Future Generation Computer Systems (2024) Vol. 160, pp. 389-405
Closed Access | Times Cited: 1
Sathish Chander Krishnan
Future Generation Computer Systems (2024) Vol. 160, pp. 389-405
Closed Access | Times Cited: 1
Threats in Cloud Computing System and Security Enhancement
Mohammed Khodayer Hassan Al-Dulaimi, Aymen Mohammed Khodayer Al-Dulaimi, Omer Mohammed Khodayer Al-Dulaimi, et al.
(2024), pp. 82-93
Closed Access | Times Cited: 1
Mohammed Khodayer Hassan Al-Dulaimi, Aymen Mohammed Khodayer Al-Dulaimi, Omer Mohammed Khodayer Al-Dulaimi, et al.
(2024), pp. 82-93
Closed Access | Times Cited: 1
A Comprehensive Review for 4-D Trust Management in Distributed IoT
Xuefei Li, Ru Li
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21738-21762
Closed Access | Times Cited: 2
Xuefei Li, Ru Li
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21738-21762
Closed Access | Times Cited: 2
A Novel Software Trustworthiness Evaluation Strategy via Relationships between Criteria
Hongwei Tao, Qiaoling Cao, Haoran Chen, et al.
Symmetry (2022) Vol. 14, Iss. 11, pp. 2458-2458
Open Access | Times Cited: 3
Hongwei Tao, Qiaoling Cao, Haoran Chen, et al.
Symmetry (2022) Vol. 14, Iss. 11, pp. 2458-2458
Open Access | Times Cited: 3
Research on Privacy Security Risk Evaluation of Mobile Commerce Users based on Information Entropy and Markov Theory
Jia Wang, Tilei Gao
Research Square (Research Square) (2024)
Open Access
Jia Wang, Tilei Gao
Research Square (Research Square) (2024)
Open Access
Optimizing Cloud Identity Based Encryption to Secure Data: A Sustainable Approach
Mohd. Zeeshan Ali, Suhail Javed Quraishi
Communications in computer and information science (2024), pp. 218-231
Closed Access
Mohd. Zeeshan Ali, Suhail Javed Quraishi
Communications in computer and information science (2024), pp. 218-231
Closed Access
Assessment of cloud service trusted state based on fuzzy entropy and Markov chain
Ming Yang, Rong Jiang, Jia Wang, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Ming Yang, Rong Jiang, Jia Wang, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Mathematical Model Investigation of a Technological Structure for Personal Data Protection
Radi Romansky
Axioms (2023) Vol. 12, Iss. 2, pp. 102-102
Open Access | Times Cited: 1
Radi Romansky
Axioms (2023) Vol. 12, Iss. 2, pp. 102-102
Open Access | Times Cited: 1
Cloud Platform Credibility Assessment System Based on D-S Theory and Blockchain Technology
Ming Yang, Jia Li, Tilei Gao, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 2
Ming Yang, Jia Li, Tilei Gao, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 2
Assessment Method of Cloud Service Trusted State Based on Fuzzy Entropy and Markov chain
Ming Yang, Jia Li, Jia Wang, et al.
Research Square (Research Square) (2023)
Open Access
Ming Yang, Jia Li, Jia Wang, et al.
Research Square (Research Square) (2023)
Open Access
A Trustworthiness Evaluation Mechanism Based on Beta Distribution Under Selected Conditions
Kewei Guo, Xuefei Li
(2023), pp. 1781-1789
Closed Access
Kewei Guo, Xuefei Li
(2023), pp. 1781-1789
Closed Access