لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
Yashpal Kadam, "Security Issues in Cloud Computing A Transparent View", ...
Mohamed Al Morsy, John Grundy and Ingo Miller, "An Analysis ...
H. Takabi, J.B.D. Joshi, G.Ahn., "Security and Privacy Challenges _ ...
M. Monsef, N Gidado, "Trust and privacy concem in the ...
M. Firdhous, O. Ghazali, and S. Hassan, Trust and Trust ...
International Journal Of Scientific _ Technology Research, Vol. 1, ISSUE ...
securityissues ", Future Generation Computer Systems , Vol. 28, Issue ...
JOURNAL, Vol. 4, pp.1-8, 2010. ...
Hoover, J. N.; R. Martin, "Demystifying the Cloud, " Information ...
Weiss, A, "Computing in the Clouds, " Vetworker, vol. 11, ...
J.R.Winkler, Securing the Cloud: Cloud Computer Security Techniques and Tactics, ...
Siani Pearson, "Privacy, Security and Trust in Cloud Computing", HP ...
_ _ _ contemporary research in business, Vol.3, No 9, ...
D. Jamil, H. Zaki, "Security Issues in Cloud Computing and ...
_ _ _ Network and Computer Applications, Vol. 34, pp.1-1 ...
V. Choudhary, "Software as a service: implications for investment in ...
S. Gajek, L. Liao, J. Schwenk, "Breaking and fixing the ...
M. Descher, P. Masser, T. Feilhauer, A.M. Tjoa, D. Huemer, ...
Vaquero L, Rodero-Merino L, Moran D, ;"Locking the sky: a ...
T. Mather, S. kumaraswamy, S. Latif, "Cloud Security and privacy: ...
Jaeger PT, Fleischmann KR (20 07) Public libraries, values, trust, ...
Rousseau D, Sitkin S, Burt R, Camerer C "Not so ...
all: a Cross-discipline View of Trust."Academy of Management [8] F.Farahmand, ...
_ _ _ _ 12(4), pp. 55-9, 2008. ...
Singh S, Morley C, "Young Australians" privacy, security and trust ...
_ _ _ _ _ _ 19(1), pp. 32-46, 2001. ...
_ _ _ _ Tech-nology & Politics, Vol. 4, 2005. ...
Nissenbaum H, Can Trust be Secured Online? A theoretical perspective. ...
Giff S, -The Influence of Metaphor, Smart Cards and Interface ...
R.J.W. Welten (Rob).Towards the cloud-The role of trust and perceived ...
Pearson S, Casassa Mot M, Crane S, Persistent and Dynamic ...
Mohammed A AlZain, Ben Soh and Eric Pardede, "MCDB: Using ...
time?"Growth 27, pp.15-20, 2009. ...
The Management of Security in Cloud Computing, ...
http://umkn-dsp _ 1 , unisa. ac , za/b itstream/handle 1 ...
Stephen S. Yau and Ho , An, "Condentiality Protection inCloud ...
Computing Systems", International Journal of Software and [34] Leavitt, N. ...
Informatics, Vol.4, No.4, pp. 351-365, 2010. ...
نمایش کامل مراجع