ACM Symposium on Cloud Computing SOCC 2011. 2011.
8. Christiansen, C. A., C. J. Kolodgy, S. Hudson, and G. Pintal, Identity and Access
Management for Approaching Clouds, in IDC White Paper. 2010.
9. Fredriksson, J. and K. Augustsson, Cloud Service Analysis Choosing between an on-
premise resource and a cloud computing service. 2011, Chalmers University of
Technology, University of Gothenburg.
10. Gens, F. IT Cloud Services User Survey, pt.2: Top Benefits & Challenges. 2008; Available
from: http://blogs.idc.com/ie/?p=210.
11. Gomolski, B., Gartner Perspective on IT Spending 2010. 2010, The Gartner Group.
12. Guitouni, A. and J. M. Martel, Tentative guidelines to help choosing an appropriate MCDA
method. European Journal of Operational Research, 1998. 109(2): p. 501-521.
13. Heckel, R., R. Correia, C. M. P. Matos, M. El-Ramly, G. Koutsoukos, and L. F. Andrade,
Architectural Transformations: From Legacy to Three-Tier and Services. Software
Evolution, 2008: p. 139-170.
14. Huang, C.-Y., W.-C. Tzeng, G.-H. Tzeng, and M.-C. Yuan, Derivations of Information
Technology Strategies for Enabling the Cloud Based Banking Service by a Hybrid MADM
Framework. Smart Innovation, Systems and Technologies, 2011. 10: p. 123-134.
15. Jansen, W. and T. Grance, Guidelines on Security and Privacy in Cloud Computing. 2011,
NIST.
16. Khajeh-Hosseini, A., D. Greenwodd, and I. Sommerville. Cloud Migration: A Case Study
of Migrating an Enterprise IT System to IaaS. in IEEE 3rd Int. Conf. on Cloud Computing
(CLOUD 2010). 2010.
17. Khajeh-Hosseini, A., I. Sommerville, J. Bogaerts, and T. P. Decision Support Tools for
Cloud Migration in the Enterprise. in IEEE 4th Int. Conf. on Cloud Computing (CLOUD
2011). 2011.
18. Künsemöller, J. and H. Kark. A Game-Theoretical Approach to the Benefits of Cloud
Computing. in 8th Intl. Workshop on Economics of Grids, Clouds, Systems, and Services
(Gecon2011). 2011.
19. Madan, B. B., K. Goševa-Popstojanova, K. Vaidyanathan, and K. S. Trivedi, A method for
modeling and quantifying the security attributes of intrusion tolerant systems. Performance
Evaluation, 2004. 56 p. 167–186.
20. Mell, P. and T. Grance, The NIST Definition of Cloud Computing 2011, NIST.
21. Schryen, G. A Fuzzy Model for IT Security Investments. in Sicherheit 2010. 2011.
22. Seacord, R., D. Plakosh, and G. Lewis, Modernizing Legacy Systems: Software
Technologies, Engineering Processes, and Business Practices. 1st ed. Addison-Wesley
Professional. 2003.
23. The Open Group, The Open Group Cloud Computing Survey. 2011, The Open Group
24. Tobin, M. and B. Bass, Federal Application Modernization Road Trip: Express Lane or
Detour Ahead? 2011, Meritalk.
25. Winkler, V. J. R., Introduction to Cloud Computing and Security, in Securing the Cloud.
Cloud Computing Security. Techniques and Tactics., E. Syngress, Editor. 2011. p. 25.
100