[1] Peter Mell, Timothy Grance, “The NIST Definition of Cloud Computing (Draft)”, Special Publication 800-145 (Draft). Recommendations of the National Institute of Standards and Technology. U.S. Department of commerce. January 2011.
[2] Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing. J Network Comput Appl (2010), doi:10.1016/j.jnca.2010.07.006.
[3] Anu Gopalakrishnan, “Cloud Computing Identity Management” SETLabs Briefings VOL 7 NO 7 2009.
[4] Audun Jøsang, Simon Pope “User Centric Identity Management”, AusCERT Conference 2005. Co-operative Research Centre for Enterprise Distributed Systems Technology (DSTC) through the Australian Federal Government’s CRC Programme (Department of Education, Science, and Training).
[5] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andrew Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, Matei Zaharia “Above the Clouds: A Berkeley View of Cloud Computing” Technical Report No. UCB/EECS-2009-28. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
[6] R. Buyya, et al., Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems (2009), doi:10.1016/j.future.2008.12.001.
[7] Qi Zhang , Lu Cheng, Raouf Boutaba “Cloud computing: state-of-the-art and research challenges” J Internet Serv Appl (2010) 1: 7–18. DOI 10.1007/s13174-010-0007-6 © The Brazilian Computer Society 2010, Springer.
[8] Siani Pearson “Taking Account of Privacy when Designing Cloud Computing Services”, HP Laboratories, HPL-2009-54. ©Copyright 2009 Hewlett-Packard Development Company, L.P.
[9] Jian wang, Yan zaoh, Jiajin le “Providing Privacy Preserving in Cloud Computing”, 978-1-4244-7562-9/10/$26.00 ©2010 IEEE.
[10] Deyan Chen, Hong Zhao “Data Security and Privacy Protection Issues in Cloud Computing” 2012 International Conference on Computer Science and Electronics Engineering. 978-0-7695-4647-6/12 $26.00 © 2012 IEEE. DOI 10.1109/ICCSEE.2012.193.
[11] Wayne Jansen, Timothy Grance “Guidelines on Security and Privacy in Public Cloud Computing” Special Publication 800-145 (Draft). Recommendations of the National Institute of Standards and Technology. U.S. Department of commerce. December 2011.
[12] Rohit Ranchal, Bharat Bhargava, Lotfi Ben Othmane, Leszek Lilien, “Protection of Identity Information in Cloud Computing without Trusted Third Party”, 1060-9857/10 $26.00 © 2010 IEEE. DOI 10.1109/SRDS.2010.57.
[13] Gail-Joon Ahn, Moonam Ko and Mohamed Shehab “Privacy-enhanced User-Centric Identity Management”, 978-1-4244-3435-0/09/$25.00 ©2009 IEEE.
[14] GailJoon Ahn, John Lam “Managing Privacy Preferences for FederatedIdentity Management”, DIM’05, November 11, 2005, Fairfax, Virginia,USA.Copyright 2005 ACM 1595932321/05/0011 ...$5.00.
[15] Michael Koch, Wolfgang Worndl, “Community Support and Identity Management”, Proceedings of the Seventh European Conference on Computer-Supported Cooperative Work, 16-20 September 2001, Bonn, Germany, pp 319-338 © 2001 Kluwer Academic Publishers Printed in the Netherlands.
[16] Eve Maler, Drummond Reed, “The Venn of Identity: Options and Issues in Federated Identity Management”, Published by the IEEE Computer society, 1540-7993/08/$25.00 © 2008 IEEE.
[17] Abha Sachdev, Mohit Bhansali, “Enhancing Cloud Computing Security using AES Algorithm”, Published by the International Journal of Computer Applications(0975-8887), Volume 67-N0.9, April 2013.
[18] Safiyyah srour, Gary Taylor, “Cloud Computing Based Cryptography”, Published by the European Journal of Computer Science and Engineering, Vol.10 2013, ISSN(paper) 2668-3113 ISSN(online) 2668-3415.
[19] Zhiwei Wang, Guozi Sun, Danwei Chen, “ A New definition of Homomorphic signature for identity management in mobile cloud computing” Published by the Journal of Computer and System Sciences (2013), http://dx.doi.org/10.1016/j.jcss.2013.06.010.
[20] Rohit Ranchal, Bharat Bhargava, Lotfi Ben Othmane, Leszek Lilien, Anya Kim, myong Kand, Mark Linderman, “Protection of Identify Information Cloud Computing without Trusted Third Party”, Published by 29th IEEE International Symposium on Reliable Distributed Systems. DOI 10.1109/SRDS.2010.57.