[1] D. Chappell, “A Short Introduction to Cloud Platforms an Enterprise—Oriented View,” Chappell and Associates, San Francisco, 2008, pp. 1-13.
[2] T. B. Winans and J. S. Brown, “Cloud Computing: A Collection of Working Papers,” Deloitte Consulting LLP, New York, pp. 1-27.
[3] Stratus Technologies, “Server Virtualization and Cloud Computing: Four Hidden Impacts on Uptime and Availability,” A White Paper by Stratus Technologies, June 2009.
[4] Oracle, “Architectural Strategies for Cloud Computing,” An Oracle White Paper in Enterprise Architecture, August 2009.
[5] G. Boss, P. Malladi, D. Quan, L. Legregni and H. Hall, “Cloud Computing,” IBM Corporation, New York, August 2007.
[6] NIST, January 2010. http://www.nist.gov/
[7] P. Mell and T. Grance, “Effectively and Securely: Using the Cloud Computing Paradigm,” NIST, Information Te- chnology Laboratory, Boulder, December 2009.
[8] The European Network and Information Security Agency (ENISA), “Cloud Computing: Benefits, Risks and Recommendations for Information Security,” November 2009. http://www.enisa.europa.eu/
[9] Juniper Networks, “Implementation Identity Federation in a Hybrid Cloud Computing Environment Solution Guide,” October 2009.
[10] FISMA, January 2010. http://csrc.nist.gov/drivers/documents/FISMA-final.pdf
[11] http://csrc.nist.gov/drivers/documents/FISMA-final.pdf
[12] P. Bryden, D. C. Kirkpatrick and F. Moghadami, “Security Authorization: An Approach for Community Cloud Computing Environments,” White Paper, November 2009.
[13] Gartner, “Assessing the Security Risks of Cloud Computing,” 2009. http://www.gartner.com/DisplayDocument?id=685308
[14] S. So, “Cloud Computing and Information Security,” Info-Security Project, No. 3, May 2009.
[15] G. Treu, F. Fuchs and C. Dargatz, “Implicit Authorization for Social Location Disclosure,” Journal of Software, Vol. 3, No. 1, 2008, pp. 18-26.
[16] M. E. Whiteman and H. J. Mattord, “Principles of Information Security,” 2nd Edition, Thomson Course Technology, Massachusetts, 2005.
[17] P. Venkataram and B. S. Babu, “An Authentication Sche- me for Ubiquitous Commerce: A Cognitive Agents Based Approach,” Proceedings of IEEE Workshops on Network Operations and Management Symposium Workshops, Salvador da Bahia, 7-11 April 2008, pp. 248-256.
[18] A. Gopalakrishnan, “Cloud Computing Identity Manage- ment,” SETLabs Briefings, Vol. 7, No. 7, 2009, pp. 45- 54.