Chaves, S.A.D., Westphall, C.B., Lamin, F.R.: SLA Perspective in Security Management for Cloud Computing. In: Sixth International Conference on Networking and Services, pp. 212–217 (2010)
Google Scholar
Bernsmed, K., Jaatun, M.G., Meland, P.H., Undheim, A.: Security SLAs for Federated Cloud Services. In: Sixth International Conference on Availability, Reliability and Security, pp. 202–209 (2011)
Google Scholar
Kandukuri, B.R., Ramakrishna Paturi, V., Rakshit, A.: Cloud Security Issues. In: IEEE International Conference on Services Computing, pp. 517–520 (2009)
Google Scholar
Ahuja, R., De, A., Gabrani, G.: SLA Based Scheduler for Cloud for Storage & Computational Services. In: International Conference on Computational Science and Its Applications, pp. 258–262 (2011)
Google Scholar
Clark, K.P., Warnier, M.E., Brazier, F.M.T., Quillinan, T.B.: Secure Monitoring of Service Level Agreements. In: International Conference on Availability, Reliability and Security, pp. 454–461 (2010)
Google Scholar
Daniel, D., Lovesum, S.P.J.: A novel approach for scheduling service request in cloud with trust monitor. In: Proceedings of 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies, ICSCCN, pp. 509–513 (2011)
Google Scholar
Kubert, R., Wesner, S.: Service level agreements for job control in high performance computting. In: Proceedings of the International Multiconference on Computer Science and Information Technology, pp. 655–661. IEEE (2010)
Google Scholar
Liu, P., Zong, R., Liu, S.: A new model for Authentication and Authorization across Heterogeneous Trust-Domain. In: International Conference on Computer Science and Software Engineering, vol. 03, pp. 789–792. IEEE Computer Society (2008)
Google Scholar
Pippal, S.K., Kumari, A., Kushwaha, D.K.: CTES based Secure approach for Authentication and Authorization of Resource and Service in Clouds. In: International Conference on Computer & Communication Technology (ICCCT), pp. 444–449 (2011)
Google Scholar
Tao, J., Marten, H., Kramer, D., Karl, W.: An Intuitive Framework for Accessing Computing Clouds. In: International Conference on Computational Science, ICCS, pp. 2049–2057 (2011)
Google Scholar
Hota, C., Sanka, S., Rajarajan, M., Nair, S.K.: Capability-based Cryptographic Data Access Control in Cloud Computing. Int. J. Advanced Networking and Applications 03, 1152–1161 (2011)
Google Scholar
Zhang, X., Hong-tao, D., Chen, J.Q., Lin, Y., Zeng, L.J.: Ensure Data Security in Cloud Storage. In: International Conference on Network Computing and Information Security, pp. 284–287 (2011)
Google Scholar
Zhou, X., Tang, X.: Research and Implementation of RSA Algorithm for Encryption and Decryption. In: The 6th International Forum on Strategic Technology, pp. 1118–1121 (2011)
Google Scholar
Alhamad, M., Tharam, D., Chang, E.: SLA-Based Trust Model for Cloud Computing. In: 13th International Conference on Network-Based Information Systems, pp. 321–324 (2010)
Google Scholar
Sainan, L.: Task-role-based access control model and implementation. In: 2nd International Conference on Education Technology and Computer (ICETC), pp. 293–296 (2010)
Google Scholar