-
1
-
-
84908476751
-
A novel trust management framework for multi-cloud environments based on trust service providers
-
Fan, W., Perros, H.: A novel trust management framework for multi-cloud environments based on trust service providers. Knowl.-Based Syst. 70, 392–406 (2014)
-
(2014)
Knowl.-Based Syst.
, vol.70
, pp. 392-406
-
-
Fan, W.1
Perros, H.2
-
2
-
-
79951515545
-
Cloud computing—The business perspective
-
Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing—The business perspective. Decis. Support. Syst. 51(1), 176–189 (2011)
-
(2011)
Decis. Support. Syst.
, vol.51
, Issue.1
, pp. 176-189
-
-
Marston, S.1
Li, Z.2
Bandyopadhyay, S.3
Zhang, J.4
Ghalsasi, A.5
-
3
-
-
84887477922
-
Trust management of services in cloud environments: obstacles and solutions
-
Noor, T.H., Sheng, Q.Z., Zeadally, S., Yu, J.: Trust management of services in cloud environments: obstacles and solutions. ACM Comput. Surv. 46(1), 12 (2013)
-
(2013)
ACM Comput. Surv.
, vol.46
, Issue.1
, pp. 12
-
-
Noor, T.H.1
Sheng, Q.Z.2
Zeadally, S.3
Yu, J.4
-
4
-
-
62949225623
-
Cloud computing and grid computing 360-degree compared
-
Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, pp. 1–10. IEEE (2008)
-
(2008)
Grid Computing Environments Workshop, pp. 1–10. IEEE
-
-
Foster, I.1
Zhao, Y.2
Raicu, I.3
Lu, S.4
-
5
-
-
70349456218
-
Virtual infrastructure management in private and hybrid clouds
-
Sotomayor, B., Montero, R.S., Llorente, I.M., Foster, I.: Virtual infrastructure management in private and hybrid clouds. IEEE Internet Comput. 13(5), 14–22 (2009)
-
(2009)
IEEE Internet Comput.
, vol.13
, Issue.5
, pp. 14-22
-
-
Sotomayor, B.1
Montero, R.S.2
Llorente, I.M.3
Foster, I.4
-
6
-
-
78649408074
-
-
The New York Times [online]. (). Accessed 14 July 2014
-
Gottfrid, D.: Self-service prorated supercomputing fun. The New York Times [online]. http://open.blogs.nytimes.com/2007/11/01/self-service-prorated-super-computing-fun/ (2007). Accessed 14 July 2014
-
(2007)
Self-service prorated supercomputing fun
-
-
Gottfrid, D.1
-
7
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
8
-
-
77950347409
-
A view of cloud computing
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
-
(2010)
Commun. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Zaharia, M.7
-
9
-
-
74049122943
-
Privacy-preserving digital identity management for cloud computing
-
Bertino, E., Paci, F., Ferrini, R., Shang, N.: Privacy-preserving digital identity management for cloud computing. IEEE Data Eng. Bull. 32(1), 21–27 (2009)
-
(2009)
IEEE Data Eng. Bull.
, vol.32
, Issue.1
, pp. 21-27
-
-
Bertino, E.1
Paci, F.2
Ferrini, R.3
Shang, N.4
-
10
-
-
77956356055
-
Trusted cloud computing with secure resources and data coloring
-
Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput. 14(5), 14–22 (2010)
-
(2010)
IEEE Internet Comput.
, vol.14
, Issue.5
, pp. 14-22
-
-
Hwang, K.1
Li, D.2
-
11
-
-
69349098776
-
Cloud computing and the common man
-
Viega, J.: Cloud computing and the common man. Computer 42(8), 106–108 (2009)
-
(2009)
Computer
, vol.42
, Issue.8
, pp. 106-108
-
-
Viega, J.1
-
12
-
-
77950601673
-
Cloud security with virtualized defense and reputation-based trust management
-
Hwang, K., Kulkareni, S., Hu, Y.: Cloud security with virtualized defense and reputation-based trust management. In: 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 717–722. IEEE (2009)
-
(2009)
8th IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 717–722. IEEE
-
-
Hwang, K.1
Kulkareni, S.2
Hu, Y.3
-
13
-
-
80054066376
-
Trust as a service: a framework for trust management in cloud environments
-
Springer, Berlin Heidelberg
-
Noor, T.H., Sheng, Q.Z.: Trust as a service: a framework for trust management in cloud environments. In: Web Information System Engineering (WISE), pp. 314–321. Springer, Berlin Heidelberg (2011)
-
(2011)
Web Information System Engineering (WISE)
, pp. 314-321
-
-
Noor, T.H.1
Sheng, Q.Z.2
-
15
-
-
84926427038
-
Trust mechanisms for cloud computing
-
Huang, J., Nicol, D.M.: Trust mechanisms for cloud computing. Journal of Cloud Computing 2 (1), 1–14 (2011)
-
(2011)
Journal of Cloud Computing
, vol.2
, Issue.1
, pp. 1-14
-
-
Huang, J.1
Nicol, D.M.2
-
16
-
-
67649425263
-
Cloud computing–A question of trust
-
Everett, C.: Cloud computing–A question of trust. Computer Fraud & Security 6, 5–7 (2009)
-
(2009)
Computer Fraud & Security
, vol.6
, pp. 5-7
-
-
Everett, C.1
-
17
-
-
84865644090
-
Success factors for deploying cloud computing
-
Garrison, G., Kim, S., Wakefield, R.L.: Success factors for deploying cloud computing. Commun. ACM 55(9), 62–68 (2012)
-
(2012)
Commun. ACM
, vol.55
, Issue.9
, pp. 62-68
-
-
Garrison, G.1
Kim, S.2
Wakefield, R.L.3
-
18
-
-
78650042649
-
In cloud computing we trust—But should we?
-
Arce, I., Ghosh, A.: In cloud computing we trust—But should we? IEEE Secur. Priv. 8(6), 14–16 (2010)
-
(2010)
IEEE Secur. Priv.
, vol.8
, Issue.6
, pp. 14-16
-
-
Arce, I.1
Ghosh, A.2
-
19
-
-
84926426306
-
Trust as a facilitator in cloud computing: a survey
-
Habib, S.M., Hauke, S., Ries, S., Mühlhäuser, M.: Trust as a facilitator in cloud computing: a survey. Journal of Cloud Computing 1(1), 1–18 (2012)
-
(2012)
Journal of Cloud Computing
, vol.1
, Issue.1
, pp. 1-18
-
-
Habib, S.M.1
Hauke, S.2
Ries, S.3
Mühlhäuser, M.4
-
20
-
-
77957700442
-
Establishing trust in cloud computing
-
Khan, K.M., Malluhi, Q.: Establishing trust in cloud computing. IT Professional 12(5), 20–27 (2010)
-
(2010)
IT Professional
, vol.12
, Issue.5
, pp. 20-27
-
-
Khan, K.M.1
Malluhi, Q.2
-
22
-
-
84860763608
-
Near-real-time cloud auditing for rapid response
-
Park, J.S., Spetka, E., Rasheed, H., Ratazzi, P., Han, K.J.: Near-real-time cloud auditing for rapid response. In: 26th International Conference on Advanced Information Networking and Applications Workshops, pp. 1252–1257. IEEE (2012)
-
(2012)
26th International Conference on Advanced Information Networking and Applications Workshops, pp. 1252–1257. IEEE
-
-
Park, J.S.1
Spetka, E.2
Rasheed, H.3
Ratazzi, P.4
Han, K.J.5
-
23
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)
-
(2010)
IEEE Secur. Priv.
, vol.8
, Issue.6
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.2
Ahn, G.J.3
-
25
-
-
84856161999
-
Distributed trust management for validating sla choreographies
-
Springer, Berlin Heidelberg New York
-
Haq, I.U., Alnemr, R., Paschke, A., Schikuta, E., Boley, H., Meinel, C.: Distributed trust management for validating sla choreographies. In: Grids and Service-Oriented Architectures for Service Level Agreements, pp. 45–55. Springer, Berlin Heidelberg New York (2010)
-
(2010)
Grids and Service-Oriented Architectures for Service Level Agreements
, pp. 45-55
-
-
Haq, I.U.1
Alnemr, R.2
Paschke, A.3
Schikuta, E.4
Boley, H.5
Meinel, C.6
-
26
-
-
84862730520
-
Trust model for optimized cloud services
-
Springer, Berlin Heidelberg
-
Pawar, P.S., Rajarajan, M., Nair, S.K., Zisman, A.: Trust model for optimized cloud services. In: Trust Management VI, pp. 97–112. Springer, Berlin Heidelberg (2012)
-
(2012)
Trust Management VI
, pp. 97-112
-
-
Pawar, P.S.1
Rajarajan, M.2
Nair, S.K.3
Zisman, A.4
-
27
-
-
84867561992
-
NIST Cloud computing standards roadmap
-
Hogan, M., Liu, F., Sokol, A., Tong, J.: NIST Cloud computing standards roadmap. NIST Special Publication, 35 (2011)
-
(2011)
NIST Special Publication
, pp. 35
-
-
Hogan, M.1
Liu, F.2
Sokol, A.3
Tong, J.4
-
28
-
-
84888066817
-
Cloud verifier: verifiable auditing service for iaas clouds
-
Schiffman, J., Sun, Y., Vijayakumar, H., Jaeger, T.: Cloud verifier: verifiable auditing service for iaas clouds. In: 9th World Congress on Services (SERVICES), pp. 239–246. IEEE (2013)
-
(2013)
9th World Congress on Services (SERVICES), pp. 239–246. IEEE
-
-
Schiffman, J.1
Sun, Y.2
Vijayakumar, H.3
Jaeger, T.4
-
29
-
-
84865048353
-
A framework for ranking of cloud computing services
-
Garg, S.K., Versteeg, S., Buyya, R.: A framework for ranking of cloud computing services. Futur. Gener. Comput. Syst. 29(4), 1012–1023 (2013)
-
(2013)
Futur. Gener. Comput. Syst.
, vol.29
, Issue.4
, pp. 1012-1023
-
-
Garg, S.K.1
Versteeg, S.2
Buyya, R.3
-
30
-
-
84874663533
-
An SLA-based broker for cloud infrastructures
-
Cuomo, A., Di Modica, G., Distefano, S., Puliafito, A., Rak, M., Tomarchio, O., Venticinque, S., Villano, U.: An SLA-based broker for cloud infrastructures. J. Grid. Comput. 11(1), 1–25 (2013)
-
(2013)
J. Grid. Comput.
, vol.11
, Issue.1
, pp. 1-25
-
-
Cuomo, A.1
Di Modica, G.2
Distefano, S.3
Puliafito, A.4
Rak, M.5
Tomarchio, O.6
Venticinque, S.7
Villano, U.8
-
31
-
-
84925290142
-
Cloud services representation using SLA composition
-
García, A.G., Blanquer, I.: Cloud services representation using SLA composition. J. Grid. Comput. 13(1), 35–51 (2015)
-
(2015)
J. Grid. Comput.
, vol.13
, Issue.1
, pp. 35-51
-
-
García, A.G.1
Blanquer, I.2
-
32
-
-
84892433822
-
Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems
-
Ding, S., Yang, S., Zhang, Y., Liang, C., Xia, C.: Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems. Knowl.-Based Syst. 56, 216–225 (2014)
-
(2014)
Knowl.-Based Syst.
, vol.56
, pp. 216-225
-
-
Ding, S.1
Yang, S.2
Zhang, Y.3
Liang, C.4
Xia, C.5
-
33
-
-
84920913053
-
An audit-based trustworthiness verification scheme for monitoring the integrity of cloud servers
-
Wang, C., Wang, Y., Liu, C., Wang, X.: An audit-based trustworthiness verification scheme for monitoring the integrity of cloud servers. J. Comput. Inf. Syst. 10(23), 9923–9937 (2014)
-
(2014)
J. Comput. Inf. Syst.
, vol.10
, Issue.23
, pp. 9923-9937
-
-
Wang, C.1
Wang, Y.2
Liu, C.3
Wang, X.4
-
34
-
-
84900505883
-
A novel two stage model for cloud service trustworthiness evaluation
-
Fan, W., Yang, S., Pei, J.: A novel two stage model for cloud service trustworthiness evaluation. Expert. Syst. 31(2), 136–153 (2014)
-
(2014)
Expert. Syst.
, vol.31
, Issue.2
, pp. 136-153
-
-
Fan, W.1
Yang, S.2
Pei, J.3
-
35
-
-
28844464697
-
Trusted grid computing with security binding and trust integration
-
Song, S., Hwang, K., Kwok, Y.K.: Trusted grid computing with security binding and trust integration. J. Grid. Comput. 3(1), 53–73 (2005)
-
(2005)
J. Grid. Comput.
, vol.3
, Issue.1
, pp. 53-73
-
-
Song, S.1
Hwang, K.2
Kwok, Y.K.3
-
36
-
-
33748191280
-
Trust brokering and its use for resource matchmaking in public-resource grids
-
Azzedin, F., Maheswaran, M., Mitra, A.: Trust brokering and its use for resource matchmaking in public-resource grids. J. Grid. Comput. 4(3), 247–263 (2006)
-
(2006)
J. Grid. Comput.
, vol.4
, Issue.3
, pp. 247-263
-
-
Azzedin, F.1
Maheswaran, M.2
Mitra, A.3
-
38
-
-
84867276671
-
Validating cloud infrastructure changes by cloud audits
-
Doelitzscher, F., Fischer, C., Moskal, D., Reich, C., Knahl, M., Clarke, N.: Validating cloud infrastructure changes by cloud audits. In: 8th World Congress on Services (SERVICES), pp. 377–384. IEEE (2012)
-
(2012)
8th World Congress on Services (SERVICES), pp. 377–384. IEEE
-
-
Doelitzscher, F.1
Fischer, C.2
Moskal, D.3
Reich, C.4
Knahl, M.5
Clarke, N.6
-
40
-
-
84900001208
-
Consistency as a service: auditing cloud consistency
-
Liu, Q., Wang, G., Wu, J.: Consistency as a service: auditing cloud consistency. IEEE Trans. Netw. Serv. Manag. 11(1), 25–35 (2014)
-
(2014)
IEEE Trans. Netw. Serv. Manag.
, vol.11
, Issue.1
, pp. 25-35
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
41
-
-
79952743231
-
Design and auditing of cloud computing security
-
Gowrigolla, B., Sivaji, S., Masillamani, M.R.: Design and auditing of cloud computing security. In: 5th International Conference on Information and Automation for Sustainability (ICIAFs), pp. 292–297. IEEE (2010)
-
(2010)
5th International Conference on Information and Automation for Sustainability (ICIAFs), pp. 292–297. IEEE
-
-
Gowrigolla, B.1
Sivaji, S.2
Masillamani, M.R.3
-
42
-
-
77957944617
-
Understanding the approach for auditing of cloud computing system
-
Chen, J., Jiang, W., Yan, J.: Understanding the approach for auditing of cloud computing system. In: Information Technology and Computer Science (ITCS), pp. 581–583. IEEE (2010)
-
(2010)
Information Technology and Computer Science (ITCS), pp. 581–583. IEEE
-
-
Chen, J.1
Jiang, W.2
Yan, J.3
-
46
-
-
33644617018
-
-
Figueira, J., Greco, S., Ehrgott, M.: Multiple criteria decision analysis: state of the art surveys Springer Science & Business Media, p 78 (2005)
-
(2005)
Ehrgott, M.: Multiple criteria decision analysis: state of the art surveys Springer Science & Business Media
, pp. 78
-
-
Figueira, J.1
Greco, S.2
-
49
-
-
0034847453
-
A note on the use of the analytic hierarchy process for environmental impact assessment
-
Ramanathan, R.: A note on the use of the analytic hierarchy process for environmental impact assessment. J. Environ. Manage. 63(1), 27–35 (2001)
-
(2001)
J. Environ. Manage.
, vol.63
, Issue.1
, pp. 27-35
-
-
Ramanathan, R.1
-
50
-
-
33746095213
-
-
Publications, Pennsylvania Pittsburgh RWS
-
Saaty, T.L.: Theory and applications of the analytic network process: decision making with benefits, opportunities, costs, and risks. Publications, Pennsylvania Pittsburgh RWS (2005)
-
(2005)
Theory and applications of the analytic network process: decision making with benefits, opportunities, costs, and risks
-
-
Saaty, T.L.1
-
51
-
-
85014241021
-
-
Accessed 5 February 2015
-
Cloud Harmony Cloud Reports: Availablefrom: https://cloudharmony.com/reports/state-of-thecloud-compute-report (2014). Accessed 5 February 2015
-
(2014)
Cloud Harmony Cloud Reports
-
-
|