[1] R.Buyya, C.S. Yeo and S. Venugopal, “Market oriented Cloud computing: Vision, hype and reality for delivering IT services as computing utilities”, in Proc. IEEE/ ACM Grid Conf., 2008, pp. 50-57.
[2] R. Aoun, E. A. Doumith and M. Gagnaire, “Resource Provisioning for enriched services in Cloud environment”, in Proc. IEEE Cloud Conf., 2010, pp. 296-303.
[3] U. Khalid, A. Ghafoor, M. Irum, and M. A. Shibli, “Cloud based secure and privacy enhanced authentication & authorization protocol”, Procedia Computer Science, 22, 2013, pp. 680-688.
[4] Web-Resource http://en.wikipedia.org/wiki/Cloud_computing
[5] “Cloud Computing: a Perspective Study” Lizhe WANG, Gregor VON LASZEWSKI
[6] S. Pearson, “Privacy, security and trust in cloud computing,” in Privacy and Security for Cloud
Computing (S. Pearson and G. Yee, eds.), Computer Communications and Networks, pp. 3–42,
Springer London, 2013.
[7] R. Dua, A. Raja, and D. Kakadia, “Virtualization vs containerization to support paas,” in Cloud
Engineering (IC2E), 2014 IEEE International Conference on, pp. 610–614, March 2014.
[8] N. Mimura Gonzalez, M. Torrez Rojas, M. Maciel da Silva, F. Redigolo, T. Melo de Brito Carvalho, C. Miers, M. Naslund, and A. Ahmed, “A framework for authentication and authorization credentials in cloud computing,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 509–516, July 2013.
[9] R. Lomotey and R. Deters, “Saas authentication middleware for mobile consumers of iaas cloud,” in Services, 2013 IEEE Nineth World Congress on, pp. 448–455, June 2013.
[10] M. Anand, “Cloud monitor: Monitoring applications in cloud,” in Cloud Computing in Emerging Markets (CCEM), 2012 IEEE International Conference on, pp. 1–4, Oct 2012.
[11] Dr. Bhawna Nigam, Himanshu Dugar and Tanveer Singh Bhatia, “Comparative Study of IoT Platforms and Support for Edge Computing”, International Journal of Engineering & Technology, Vol 7, 2018, pp. 461-467.
[12] Volkan Gezer, Jumyung Um and Martin Ruskowski, “An Introduction to Edge Computing and A Real-Time Capable Server Architecture”, International Journal on Advances in Intelligent Systems”, Vol 11, no. 1 & 2, July 2018, pp. 105-114.
[13] United Nations, “The Universal Declaration of Human Rights”
http://www.un.org/en/documents/udhr/index.shtml, 1948. Retrieved August 2015.
[14] Cloud Security Alliance (CSA), “Security Guidance for Critical Areas of Focus in Cloud Computing” version 3, 2011. Available at: https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf
[15] Cloud Security Alliance (CSA), “The Notorious Nine: Cloud Computing Top Threats in 2013”.
Available at: https://cloudsecurityalliance.org.
[16] Devi, T. & Ganesan, R., 2015. Platform-as-a-Service (PaaS): Model and Security Issues. Telkomnika Indonesian Journal of Electrical Engineering, 15(1), pp. 151-161.
[17] B.P. Rimal, Choi Eunmi, I. Lumb, ―A Taxonomy and Survey of Cloud Computing Systems‖, Intl. Joint Conference on INC, IMS and IDC, 2009, pp. 44-51,Seoul, Aug, 2009. DOI: 10.1109/NCM.2009.218
[18] B. R. Kandukuri, R. Paturi V, A. Rakshit, ―Cloud Security Issues, In Proceedings of IEEE International Conference on Services Computing, pp. 517-520, 2009.
[19] Saurabh Bagchi, Muhammad-Bilal Siddiqui, Paul Wood, Heng Zhang, “Dependability in Edge Computing” Communications of the ACM, January 2020, Vol. 63 No. 1, Pages 58-66.
[20] Shi, Weisong; Cao, Jie; Zhang, Quan; Li, Youhuizi; Xu, Lanyu, "Edge Computing: Vision and Challenges". IEEE Internet of Things Journal. 3 (5), Oct 2016, 637–646.
[21] Weisong shi, George Pallis, Zhiwei xu, “Edge Computing”, proceedings of the IEEE , Vol. 107, No. 8, August 2019.
[22] Blesson Varghese ; Nan Wang ; Sakil Barbhuiya ; Peter Kilpatrick ; Dimitrios S, “Challenges and Opportunities in Edge Computing”, 2016 IEEE International Conference on Smart Cloud.
[23] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.
[24] Volkan Gezer, Jumyung Um, Martin Ruskowski, “An Introduction to Edge Computing and A Real-Time Capable Server Architecture”, International Journal of Intelligent Systems 11, July 2018.
[25] Ejaz ahmed, Arif Ahmed, Ibrar Yaqoob, Junaid Shuja, “Bringing computation closer towards user network: Is edge computing the solution?” IEEE Communications Magazine 55(11):138 – 144, Nov 2017.
[26] James McElhannon, “Future Edge Cloud and Edge Computing for Internet of Things Applications”, IEEE Internet of Things Journal, Volume: 5 , Issue 1, Feb. 2018, pp 439 – 449.