A trust model for cloud computing environment

CENTRO ALGORITMI - The research unit of the School of Engineering - University of Minho – Portugal

[1]  Tharam S. Dillon,et al.  SLA-Based Trust Model for Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.

[2]  Richard T. Watson,et al.  Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..

[3]  Thomas Sandholm,et al.  What's inside the Cloud? An architectural map of the Cloud landscape , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[4]  Privacy-Preserving Audit of Secure Data Storage Services in Cloud Computing , 2013 .

[5]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[6]  Steve Mansfield-Devine Cloud Security: Danger in the clouds , 2008 .

[7]  Nikolay Borissov,et al.  Cloud Computing – A Classification, Business Models, and Research Directions , 2009, Bus. Inf. Syst. Eng..

[8]  G. Dhillon,et al.  Technical opinion: Information system security management in the new millennium , 2000, CACM.

[9]  Navin Sabharwal,et al.  Understanding Cloud Computing , 2013 .

[10]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[11]  Gurpreet Dhillon,et al.  Technical opinion: Information system security management in the new millennium , 2000, CACM.

[12]  Ian Sommerville,et al.  Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[13]  Haralambos Mouratidis,et al.  A framework to support selection of cloud providers based on security and privacy requirements , 2013, J. Syst. Softw..

[14]  Prashant Pandey,et al.  Cloud computing , 2010, ICWET.

[15]  Jianhua Che,et al.  Study on the Security Models and Strategies of Cloud Computing , 2011 .

[16]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[17]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .