[1]
|
Alguliev, R.M. and Abdullayeva, F.C. (2013) Identity Management Based Security Architecture of Cloud Computing on Multi-Agent Systems. Proceedings of the Third International Conference on Innovative Computing Technology (INTECH), London, 29-31 August 2013, 123-126. http://dx.doi.org/10.1109/INTECH.2013.6653643
|
[2]
|
∂liquliyev, R.M. and Abdullayeva, F.C. (2013) Bulud texnologiyalarinin t∂hlük∂sizlik probleml∂rinin t∂dqiqi v∂analizi. informasiya Texnologiyalari Probleml∂ri, 1, 3-14.
|
[3]
|
Carlini, E., Coppola, M., Dazzi, P., Ricci, L. and Righetti, G., (2012) Cloud Federations in Contrail. Euro-Par 2011: Parallel Processing Workshops, 7155, 159-168.
|
[4]
|
Rochwerger, B. (2009) The Reservoir Model and Architecture for Open Federated Cloud Computing. IBM Journal of Research and Development, 53, 535-545. http://dx.doi.org/10.1147/JRD.2009.5429058
|
[5]
|
Buyya, R., Broberg, J. and Goscinski, A. (2011) Cloud Computing: Principles and Paradigms. John Wiley & Sons Inc., Hoboken. http://dx.doi.org/10.1002/9780470940105
|
[6]
|
Maler, E. and Reed, D. (2008) The Venn of Identity: Options and Issues in Federated Identity Management. IEEE Security & Privacy, 6, 16-23. http://dx.doi.org/10.1109/MSP.2008.50
|
[7]
|
Santos, D.R., Westphall, C.M. and Westphall, C.B. (2013) Risk-Based Dynamic Access Control for a Highly Scalable Cloud Federation. Proceedings of the Seventh International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2013), Barcelona, 25-31 August 2013, 8-13.
|
[8]
|
Cabarcos, P.A. (2011) Risk Assessment for Better Identity Management in Pervasive Environments. Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Seattle, 21-25 March 2011, 389-390. http://dx.doi.org/10.1109/PERCOMW.2011.5766913
|
[9]
|
ETSI GS INS 004 (2010) Identity and Access Management for Networks and Services; Dynamic Federation Negotiation and Trust Management in IdM Systems.
|
[10]
|
Cabarcos, P.A., Marín, A.L., Sánchez, R.G., Almenares, F.M. and Sánchez, D.D. (2012) A Metric-Based Approach to Assess Risk for on Cloud Federated Identity Management. Journal of Network and Systems Management, 20, 513-533. http://dx.doi.org/10.1007/s10922-012-9244-2
|
[11]
|
Cloud Security Aliance (CSA) https://cloudsecurityalliance.org
|
[12]
|
ENISA (2009) Benefits, Risks and Recommendations for Information Security.
|
[13]
|
Latif, R., Abbas, H., Assar, S. and Ali, Q. (2014) Cloud Computing Risk Assessment: A Systematic Literature Review. Future Information Technology. Lecture Notes in Electrical Engineering, 276, 285-295.http://dx.doi.org/10.1007/978-3-642-40861-8_42
|
[14]
|
Ammar, F.B., Hafsa, I.H. and Ouni, F. (2011) Analytic Hierarchical Process for Multicriteria Decision Making in design of Flying Voltage Source Multilevel Inverters. European Journal of Electrical Engineering, 14, 719-756.http://dx.doi.org/10.3166/ejee.14.719-756
|
[15]
|
Nataraj, S. (2005) Analytic Hierarchy Process as a Decision-Support System in the Petroleum Pipeline Industry. Issues in Information Systems, VI, 16-21.
|