[1] | Aymerich, F. M., Fenu, G., Surcis, S., & IEEE. (2008). An Approach to a Cloud Computing Network. 1st International Conference on theApplications of Digital Information and Web Technologies, Ostrava, CZECH REPUBLIC, 120-125. |
|
[2] | Banerjee, P. (2009). An intelligent IT infrastructure for the future. 15th International Symposium on High-Performance Computer Architecture, Proceedings, Feb 14-18, 3. |
|
[3] | Delic, K. A., & Riley, J. A. (2009). Enterprise Knowledge Clouds: Next Generation KM Systems? International Conference on Information, Process, and Knowledge Management, Cancun, MEXICO. 49-53. |
|
[4] | Dodda, R. T., Smith, C., & van Moorsel, A. (2009). Architecture for Cross-Cloud System Management. 2nd International Conference on Contemporary Computing, Nioda, INDIA. 40, 556-567. |
|
[5] | Erickson, J. S., Spence, S., Rhodes, M., Banks, D., Rutherford, J., Simpson, E., et al. (2009). Content-Centered Collaboration Spaces in the Cloud. IEEE Internet Computing, 13(5), 34-42. |
|
[6] | Klein, C., & Kaefer, G. (2008). From smart homes to smart cities: Opportunities and challenges from an industrial perspective, Next Generation Teletraff c and Wired/Wireless Advanced Networking, Proceedings, Lecture Notes in Computer Science, 5174, 260. |
|
[7] | Lijun, M., Chan, W.K., & Tse, T.H. (2008). A tale of clouds: Paradigm comparisons and some thoughts on research issues. IEEE Asia-Pasific Services Computing Conference, APSCC’ 08, 464-469. |
|
[8] | Mitchell, P. (2008). Learning architecture: issues in indexing Australian education in a Web 2.0 world. Indexer, 26(4), 163-169. |
|
[9] | Dawei Sun, Guiran Chang, Qiang Guo, Chuan Wang, Xingwei Wang., “A Dependability Model to Enhance Security of Cloud Environment Using System-Level Virtualization Techniques”, First International Conference on Pervasive Computing, Signal Processing and Applications pcspa; 2010, pp. 305-310. |
|
[10] | Qian Liu, Chuliang Weng, Minglu Li, Yuan Luo, “An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds”, IEEE Security and Privacy, vol. 8, no. 6, pp. 56-62, Nov./Dec. 2010. |
|
[11] | M. Sharif et al, “Secure In-VM Monitoring Using Hardware Virtualization”, Proc. 16th ACM Conf. Computer andCommunications Security; ACM Press, 2009, pp. 477-487. |
|
[12] | Jia Xu, Jia Yan, Liang He, Purui Su, Dengguo Feng. “CloudSEC: A Cloud Architecture for Composing Collaborative Security Services”, 2nd IEEE International Conference on Cloud Computing Technology and Science cloudcom; 2010, pp. 703-711. |
|
[13] | Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1; 2009, https://cloudsecurityalliance.org/csaguide.pdf. |
|
[14] | Catteddu and G. Hogben. Cloud Computing: Benefits, Risks and Recommendations for Information Security. ENISA; 2009, http://www.enisa.europa.eu/. |
|
[15] | G. Balabanis, N. Reynolds, A. Simintiras: Bases of e-store loalty: Perceived switching barriers and satisfaction.2005. |
|
[16] | Z. Yang and R.T. Peterson: Customer Perceived Value, Satisfaction, and Loyalty: The Role of Switching Costs. |
|
[17] | In: Psychology & Marketing, Vol. 21(10): 799-822 (October 2004). Wiley Periodicals. 2004. |
|
[18] | S. Goldschmidt, S. Junghagen, U. Harris: Strategic affiliate marketing. Edward Elgar Publishing. 2004. |
|
[19] | http://mobiledevices.about.com/od/additionalresources/a/Cloud-Computing-Is-It-Really-All-That-Beneficial.htm |
|