|
[1]P. Mell and T. Grance, “The NIST Definition of Cloud Computing”, National Institute of Standards and Technology Special Publication 800-145 (2011) [2]A. Celesti, F. Tusa, M. Villari and A. Puliafito, “Three-phase Cross-Cloud Federation Model: the Cloud SSO Authentication,” in Proc. of the 2010 Second International Conference on Advances in Future Internet, pp.94-101 (2010) [3]A. Celesti, F. Tusa, M. Villari and A. Puliafito, “How to Enhance Cloud Architectures to Enable Cross-Federation,” 2010 IEEE 3rd International Conference on Cloud Computing, pp.337-345 ( 2010) [4]R. Buyya, S.K. Garg, and R.N. Calheiros, “SLA-oriented resource provisioning for cloud computing: Challenges, architecture, and solutions,” 2011 International Conference on Cloud and Service Computing. IEEE, pp.1–10 (2011) [5]E. Apostol, I. Baluta, A. Gorgoi, V. Cristea, “Efficient Manager for Virtualized Resource Provisioning in Cloud Systems,” IEEE, pp. 511-517 (2011) [6]X. Wang, J. Sun, M. Huang, C. Wu and X. Wang, “A resource auction based allocation mechanism in the cloud computing environment,” 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum, pp.2111-2115, (2012) [7]M. Stihler, A.O. Santin, A.L. Marcon, and J. da Silva Fraga. “Integral federated identity management for cloud computing,” New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on, pp. 1 –5, (2012) [8]A. Buecker, P. Ashley, and N. Readshaw, “Federated Identity and Trust Management,” IBM Redbooks, (2008) [9]P. Steiner, “On the Internet nobody knows you’re a dog,” The New Yorker , Vol.69 (LXIX) no. 20, (1993) [10]D.H. McKnight, and N.L. Chervany, “The Meanings of Trust,” Technical Report, Carlson School of Management, University of Minnesota, pp.94-104, (1996) [11]U. Kylau, I. Thomas, M. Menzel, and C. Meinel, “Trust Requirements in Identity Federation Topologies,” 2009 International Conference on Advanced InformationNetworking and Applications, pp.137-145, (2009) [12]W. Li and L. Ping, “Trust Model to Enhance Security and Interoperability of Cloud Environment,” the CloudCom 2009, LNCS 5931, pp.69-79, (2009) [13]S. Pearson, Y. Shen, and M. Mowbray, “A Privacy Manager for Cloud Computing,” the CloudCom 2009, LNCS 5931, pp.90-106, (2009) [14]A. Celesti, F. Tusa, M. Villari and A. Puliafito, “Evaluating a Distributed Identity Provider Trusted Network with Delegated Authentications for Cloud Federation,” the 2nd International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2011), pp. 79-85, (2011) [15]A. Celesti, F. Tusa, M. Villari and A. Puliafito, “Federation Establishment Between CLEVER Clouds Through a SAML SSO Authentication Profile,” International Journal on Advances in Internet Technology, Vol. 4, No. 1 & 2, pp.14-27, (2011) [16]S. Malik and F. Huet, “Virtual Cloud: Rent Out the Rented Resources,” the 6th IEEE International Conference for Internet Technology and Secured Transactions (ICITST-2011), (2011) [17]X. You, X. Xu, J. Wan, and D. Yu, “RAS-M: Resource allocation strategy based on market mechanism in cloud computing,” Fourth China Grid Annual Conference, pp. 256-263 (2009) [18]K. Mochizuki and S. Kutibayashi, “Evaluation of optimal resource allocation method for cloud computing environments with limited electric power capacity,” IEEE International Conference on Network- Based Information Systems, pp.1-5 (2011) [19]M. Guazzone, A. Cosimo, and C. Massimo, “Energy-efficient resource management for cloud computing infrastructures,” In Proc. of the Cloud Computing Technology and Science (CloudCom), pp. 424-431, (2011) [20]H. Goudarzi and M. Pedram, “Multi-dimensional SLA-based Resource Allocation for Multi-tier Cloud Computing Systems,” IEEE 4th International Conference on Cloud Computing, pp324-331 (2011) [21]F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, L. Badger and D. Leaf, “NIST Cloud Computing Reference Architecture,” National Institute of Standards and Technology Special Publication, SP 500-292 (2011) [22]N. Gonzalez, C. Miers, F. Redgolo, M. Simplıcio, T. Carvalho, M. Naslund and M. Pourzandi, “A quantitative analysis of current security concerns and solutions for cloud computing,” Journal of Cloud Computing: Advances, Systems and Applications, 1-11, (2012) [23]K. Hashizume, D.G. Rosado, E. Fernandez-Medina and E.B. Fernandez, “An analysis of security issues for cloud computing,” Journal of Internet Services and Applications, 4:5, (2013) [24]B. Sotomayor, R. Montero, I. Llorente, and I. Foster, “Virtual infrastructure management in private and hybrid clouds,” Internet Computing, IEEE, vol. 13, pp. 14–22, (2009)
|