[1] | Ruthfield, S. (1995, September). The Internet's History and Development From Wartime Tool to the Fish-Cam. Crossroads - Special issue on networks, 2(1), pp. 2-4. |
|
[2] | Dennis, M. A. (2012, March 2). Denial of Service Attack (DoS Attack). (Encyclopaedia Britannica Online Academic Edition). Encyclopaedia Britannica. Retrieved January 29, 2014, from http://www.britannica.com/EBchecked/topic/1055468/denial-of-service-attack. |
|
[3] | Murphy, D. M. (February 2010). War is War? The utility of cyberspace operations in the contemporary operational environment. Proceedings of the workshop for the center for strategic leadership (pp. 1-4). Pennsylvania, USA.: U.S. Army War College. |
|
[4] | Arora, R., & Bajaj, K. S. (2013, March). Highly Effective Advanced Technology “HEAT” Re-defining Technology for Hospital Management. International Journal of Management & Behavioural Sciences, Special Edition, 68-73. |
|
[5] | Davies, A. (2004, June). Computational intermediation and the evolution of computation as a commodity. Applied Economics, 36(11: 1131). |
|
[6] | Christopher, S. (1959). Time Sharing in Large Fast Computers. Proceedings of the International Conference on Information processing, UNESCO.2.19, pp. 336-341. UNESCO. Retrieved February 1, 2014. |
|
[7] | IBM. (1970). IBM System/360 Operating System: Conversational Remote Job Entry Concepts and Facilities. International Business Machine (IBM). North Carolina, USA.: IBM Systems Reference Library. Retrieved February 1, 2014, from http://bitsavers.informatik.uni-stuttgart.de/pdf/ibm/360/rje/GC30-2012-0_CRJE_Concepts_and_Facilities_Jun70.pdf. |
|
[8] | Nikiforakis, N., Joosen, W., & Johns, M. (2011). Abusing Locality in Shared Web Hosting. Proceedings of the Fourth European Workshop on System Security: Article No. 2. Salzburg, Austria: Association for Computing Machinery. |
|
[9] | Urgaonkar , B., Shenoy, P., & Roscoe, T. (2009, February). Resource overbooking and application profiling in a shared Internet hosting platform. ACM Transactions on Internet Technology (TOIT): Article No. 1 , 9(1). |
|
[10] | Bhattiprolu, S., Biederman, E. W., Hallyn, S., & Lezcano, D. (2008, July). Virtual Servers and Checkpoint/Restart in Mainstream. ACM SIGOPS Operating Systems Review - Research and developments in the Linux kernel, 42(5), 104-113. |
|
[11] | Buyya, R., & Bubendorfer, K. (2009). Market-Oriented Grid and Utility Computing. Wiley Publishing. |
|
[12] | Skillsoft. (2013). Cloud Computing Basics. United States of America. Retrieved August 18, 2013. |
|
[13] | Ogu, E. C., Omotunde, A. A., Mensah, Y., & Ogbonna, A. C. (2014). Virtualization and cloud computing: The pathway to business performance enhancement, sustainability and productivity. International Journal of Business and Economics Research, 170-177. |
|
[14] | Mell, P., & Grance, T. (September 2011). The NIST Definition of Cloud Computing. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, United States Department of Commerce. Gaithersburg, MD 20899-8930: National Institute of Standards and Technology. Retrieved January 28, 2014, from http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. |
|
[15] | Gartner AADI Summit. (2009). Cloud Computing as Gartner Sees it. Gartner's Application Architecture, Development & Integration Summit. |
|
[16] | Strømmen-Bakhtiar, A., & Razavi, A. R. (2011). Cloud Computing Business Models. Springer Computer Communications and Networks, 43-60. |
|
[17] | Ryan, S., & Jiangchuan, L. (2012). Understanding the Impact of Denial of Service Attacks on Virtual Machines. Journal of the IEEE. |
|
[18] | Tupakula, U., & Varadharajan, V. (2011). TVDSEC: Trusted Virtual Domain Security. Institute of Electrical and Electronic Engineers (IEEE), 57-63. |
|
[19] | Pearce, M., Zeadally, S., & Hunt, R. (2013, February). Virtualization: Issues, Security Threats, and Solutions. Association for Computing Machinery (ACM) Computing Surveys, Article 17: 1-39. |
|
[20] | Gurav, U., & Shaikh, R. (2010). Virtualization – A key feature of cloud computing. Proceedings of the International Conference and Workshop on Emerging Trends in Technology (ICWET 2010) (pp. 227-229). Mumbai, Maharashtra, India.: Association for Computing Machinery. |
|
[21] | Sangha, H. (2011, March 9). What is CloudBurst. Retrieved February 2, 2014, from CLOUDCREO: Virtual Solutions, Real Benefits: http://blog.cloudcreo.com/?p=1056. |
|
[22] | CDW Corporation. (2010, January 11). CDW Server Virtualization Life Cycle Report (Medium and Large Businesses). Retrieved from CDW Newsroom: http://webobjects.cdw.com/webobjects/media/pdf/Newsroom/CDW-Server-Virtualization-Life-Cycle-Report.pdf. |
|
[23] | Nagaraju, K., & Sridaran, R. (2012, September). A Survey on Security Threats for Cloud Computing. International Journal of Engineering Research & Technology (IJERT), Volume 1(Issue 7), 1-10. |
|
[24] | Morrissey, M. (2014, January 10). The Future of Cloud Computing - Perspecsys. Retrieved from Cloud Data Security, Secure Cloud Data Encryption | Perspecsys: http://perspecsys.com/future-cloud-computing/. |
|
[25] | Jones, E. (2013). 2013 Future of Cloud Computing Survey Reveals Business Driving Cloud Adoption in Everything as a Service Era; IT Investing Heavily to Catch up and Support Consumers Graduating from Bring Your Own Device (BYOD) to Bring Your Own Cloud (BYOC). Palo Alto, California.: North Bridge Venture Partners. Retrieved May 28, 2014, from http://www.northbridge.com/2013-future-cloud-computing-survey-reveals-business-driving-cloud-adoption-everything-service-era-it. |
|
[26] | Chowdhury, K. N., & Boutaba, R. (2009, July). Network virtualization: state of the art and research challenges. IEEE Communications Magazine, 47(7), 20-26. |
|
[27] | Soundararajan, V., & Anderson, J. M. (2010). The impact of management operations on the virtualized datacenter. Proceedings of the 37th annual international symposium on Computer architecture (pp. 326-337`). New York, NY, USA: ACM. |
|
[28] | Miller, K., & Pegah, M. (2007). Virtualization: virtually at the desktop. Proceedings of the 35th annual ACM SIGUCCS fall conference (pp. 255-260). New York, NY, USA: ACM. |
|