1.
Singh, A., & Malhotra, M.,“Agent Based Framework for Scalability in Cloud Computing†In International Journal of Computer Science & Engineering Technology 3(4), 2012, pp 41-45.
2.
Malhotra, M., Singh, A., & Juneja, D., “Security Issues in Cloud Computing: An Approach†In National Seminar "The Futuristic Approach to Ethical Hacking & Network Security, Feb, 2014, pp 1-5.
3.
Mather, T., & Kumarswamy, “Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliances" In 1st Edition 2009 of CSA Forum.
4.
Atallah, M., Frikken, K., & Blanton, M. , “Dynamic and Efficient Key Management for Access Hierarchies†In Proceedings of ACM Conference Computer Communication Security, 2005, pp. 190–202.
5.
Mladen, A., & Vouk. Cloud Computing – Issues, Research and Implementations. In Journal of Computing and Information Technology - CIT 16, pp 235–246.
6.
Jungwoo, R., Syed, R., William, A., & John, K., “Cloud Security Auditing: Challenges and Emerging Approachesâ€. Published in IEEE Security and Privacy, 2013, pp 1-13.
7.
Arfeen, M. A., Pawlikowski, K. & Willing, A, “A Framework for Resource Allocation Strategies in Cloud Computing Environmentâ€. Published in Proceedings of 35th IEEE Conference on Computer Software and Application, 2011, pp. 261-266.
8.
Safiriyu, E., Olatunde, A., Ayodeji, O,Adeniran, O., Clement, O., & Lawrence, K. “A User Identity Management Protocol for Cloud Computing Paradigm†In nternational Journal Communications, Network and System Sciences, 4(1), 2011, pp 152- 163.
9.
Zhen, C., Wenyu, D., Hang, Li., Peng, Z., Xinming, C., & Junwei, C., “Collaborative Network Security in Multi-Tenant Data Center for Cloud Computingâ€. Tsinghua Science and Technology,19(1),February 2014, pp82-94.
10.
Philipp, H., Rolf, W., Joachim, S., & Thomas, B., “Virtual Fort Knox: Federative, Secure and Cloud Based Platform for Manufacturing†In Proceedings of 46th Conference on Manufacturing System, indexed in Science Direct, 2013, pp 527-532.
11.
Roland, S., Matthias, S., Christian, S., Simon, M., & Bernd, F., “Increasing Virtual Machine Security in Cloud Environments†In Journal of Cloud Computing, 1(12), 2012, pp 1-12.
12.
Pointcheval, D., & Stern, J., “Security Proofs for Signature Schemes†In Proceedings of Eurocrypt, volume 1070 of LNCS. Springer-Verlag, 1996, pp 387–398.
13.
Qian, W., Cong, W., Kui, R., Wenjing, L., & Jin, L. “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing†In IEEE Transactions on Parallel and Distributed Systems, 22(5), 2011, pp 847-859.
14.
Funmilade, F.,, Rami, B., & Georgios, T ,“A Dynamic Data Driven Simulation Approach for Preventing Service Level Agreement Violations in Cloud Federationâ€. In Proceedings of International Conference on Computational Science, Procedia of Computer Science 2012, pp 1167-1176.
15.
CSA Security Guidance for Critical Areas of Focus in Cloud computing 2009, Cloud Security Alliance, Published on Forum of CSA. 5
16.
Yuefa, D., Bo, W., Yaqiang, G., Quan, Z., & Chaojing, T., “Data Security Model for Cloud Computing†In Journal of International Security and Applications, 2009, pp 141-144.
17.
Huiqi, X., Shumin, G., & Keke, C.,“Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation†In IEEE Transactions on Knowledge and Data Engineering, 26(2), 2014, pp 322-335.
18.
Hossein, R., Elankovan, S., Zulkarnain, M., A., & Abdullah, M., Z., “Encryption as a Service as a Solution for Cryptography in Cloud†In Proceedings of 4th International Conference on Electrical Engineering and Informatics, indexed in Science Direct, 2013, pp 1202-1210.
19.
Xu. X., Bessis, N., Cao, J., “An Autonomic Agent Trust Model for IoT System†In Proceedings of 4th International Conference on Emerging Ubiquitous System,2013, pp 107-113.
20.
Wang, B., Li, B., & Li, H., “Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloudâ€. In IEEE Transaction, 2013, pp 1-14.
21.
Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., & Konwinski, A. “A View of Cloud Computingâ€. In ACM Communication, 53(4), 2010, pp. 50–58.
22.
Bellare, M., Garay, J., & Rabin, T., “Fast Batch Verification for Modular Exponentiation and Digital Signaturesâ€. In Proceedings of Eurocrypt volume 1403 of LNCS. Springer-Verlag, 1998, pp. 236–250.
23.
Ferrara, A. L., Greeny, M., Hohenberger, S., & Pedersen, M. “Practical Short Signature Batch Verification†In Proceedings of CT-RSA, volume 5473 of LNCS. Springer- Verlag, 2009, pp. 309–324.
24.
Goyal, O., Pandey, A., Sahai, & B. Waters , “Attribute-Based Encryption for Fine- Grained Access Control of Encrypted Data†In Proceedings of ACM Conference Computer Communication Security, 2006, pp. 89–98.
25.
Malhotra, M., & Malhotra, R., “Cloud Adaptive Resource Allocation Mechanism for Efficient Parallel Processingâ€. Published in IGI Global, International Journal of Cloud Applications and Computing, 4(4), 2014, pp 1-6.
26.
Messmer, & Ellen,“Cloud Security Alliance Formed to Promote Best Practices†Computerworld, Published on Forum 2009 of CSA.
27.
Sapuntzakis, C., Brumley, D., Chandra, R., Zeldovich, N., Chow, J., Lam, M., & Rosenblum, M., "Virtual Appliances for Deploying and Maintaining Software†In Proceedings of the 17th USENIX Conference on System Administration. USENIX Association, Berkeley, 2008, pp 181–194.
28.
Singh, A., & Malhotra, M.m, “Analysis for Exploring Scope of Mobile Agents in Cloud Computing†In International Journal of Advancements in Technology, 3(3), 2012 pp 172- 183.
29.
Xiaonian W., Runlian Z., Bing, Z &Shengyuan, Z., “A Trust Evaluation Model for Cloud Computing†In Elsevier Proceedings of Information Technology and Quantitative Management, 2013, pp 1170-1177.
30.
Yang, H., & Tate, M., “Where are we at with Cloud Computing?: A Descriptive Literarure Review†In Proceedings of 20th Australasian Conference on Information Systems, 2009, pp 807-819.
31.
Zhang, Q., & Cheng, L., “Cloud computing: State-of-the-art and Research Challengesâ€. Journal of Internet Serv Appl, 2010, pp 7–18 DOI 10.1007/s13174-010-0007-6.
32.
Zhou, L., Varadharajan, V., & Hitchens, M., “Enforcing Role-Based Access Control for Secure Data Storage in the Cloud†In Journal of Computing 54(13), 2011, pp. 1675–1687.
33.
Zhu, Y., Hu, H., Ahn, G., Wang, H., & Wang, S., “Provably Secure Role-Based Encryption with Revocation Mechanismâ€. In Journal of Computer Science and Technology, 26(4), 2011 pp. 697–710.
34.
Zhu, Y., Ma, D., Hu, C., & Huang, D., “How to Use Attribute-Based Encryption to Implement Role-Based Access Control in the Cloudâ€. In Proceedings of International Workshop Security Cloud Computing, 2013 pp. 33– 40.