Cloud Accountability project (2016). A4Cloud.
http://www.a4cloud.eu/objectives Accessed
on 22/08/2016.
Cloud Security Alliance (2015a). Cloud trust protocol.
https://cloudsecurityalliance.org/group/
cloudtrust-protocol/ Accessed on 22/08/2016.
Cloud Security Alliance (2015b). Cloud trust proto-
col daemon prototype. https://github.com/
cloudsecurityalliance/ctpd Accessed on
07/09/2016.
CUMULUS project (2016). Certification infrastruc-
ture for multi-layer cloud services. http://www.
cumulus-project.eu/ Accessed on 22/08/2016.
Das, T. and Teng, B. S. (1996). Risk types and inter-firm
alliance structures. Journal of management studies,
33(6):827–843.
Deitz, G. and DenHartog, D. (2006). Measuring trust inside
organizations. JPersonnel Review, 35(5):557–588.
Emeakaroha, V., Fatema, K., Vanderwerff, L., Healy, P.,
Lynn, T., and Morrison, J. (2016). A trust label sys-
tem for communicating trust in cloud services. IEEE
Transactions on Services Computing, PP(99):1–1.
Gefen, D. (2003). TAM or just plain habit: A look at expe-
rienced online shoppers. Journal of End User Com-
puting, 15(3):1–13.
Gens, F. (2014). Worldwide and regional public cloud it ser-
vices 2014-2018 forecast. https://www.idc.com/
research/viewtoc.jsp?containerId=251730
Accessed on 20/10/2016. IDC Market Analysis.
Hogan, M., Liu, F., Sokol, A., and Tong, J. (2011). Nist
cloud computing standards roadmap. NIST Special
Publication, 35.
Hwang, K. and Li, D. (2010). Trusted cloud computing
with secure resources and data coloring. IEEE Inter-
net Computing, 14(5):14 –22.
Kim, W. (2009). Cloud computing: Today and tomorrow.
Journal of object technology, 8:65 – 72.
Leimbach, T., Hallinan, D., Bachlechner, D., Weber, A.,
Jaglo, M., Hennen, L., Nielsen, R., Nentwich, M.,
Strau, S., Lynn, T., and Hunt, G. (2014). Potential
and impacts of cloud computing services and social
network websites. Science and Technology Op-
tions Assessment (STOA) http://www.europarl.
europa.eu/RegData/etudes/etudes/join/2014/
513546/IPOL-JOIN_ET(2014)513546_EN.pdf
Accessed on 15/08/2016.
Lewicki, R. and Bunker, B. (1996). Developing and main-
taining trust in work relationships. Technical report,
Trust in organizations: Frontiers of theory and re-
search. edited by Roderick M. Kramer, Tom R. Tyler.
Low, C., Chen, Y., and Wu, M. (2011). Understanding the
determinants of cloud computing adoption. Industrial
management and data systems, 111:1006 – 1023.
Lynn, T., Healy, P., McClatchey, R., Morrison, J., Pahl, C.,
and Lee, B. (2013). The case for cloud service trust-
marks and assurance-as-a-service. In Intl. Conference
on Cloud Computing and Services Science Closer,
pages 8–10.
Lynn, T., van der Werff, L., Hunt, G., and Healy, P. (2016).
Development of a cloud trust label: A delphi ap-
proach. Journal of Computer Information System,
56(3):185–193.
Masevic, I., van der Werff, L., Emeakaroha, V., Morrison,
J., and Lynn, T. (2016). Validating a cloud trust label:
Influencing consumer trust. In Cloud British Academy
of Management Conference.
Mcknight, D. H., Carter, M., Thatcher, J. B., and Clay, P. F.
(2011). Trust in a specific technology: An investi-
gation of its components and measures. ACM Trans.
Manage. Inf. Syst., 2(2):12:1–12:25.
McKnight, D. H. and Chervany, N. L. (2001). What trust
means in e-commerce customer relationships: An in-
terdisciplinary conceptual typology. Int. J. Electron.
Commerce, 6(2):35–59.
NIST (2016). Security content automation proto-
col. https://scap.nist.gov/revision/1.2/
index.html Accessed on 22/08/2016.
Pavlou, P. A. and Gefen, D. (2004). Building effective on-
line marketplaces with institution-based trust. Info.
Sys. Research, 15(1):37–59.
Pearson, S. (2013). Privacy, security and trust in cloud com-
puting. In Computer Communications and Networks,
pages 3 – 42.
Pearson, S. and Benameur, A. (2010). Privacy, security
and trust issues arising from cloud computing. In
Cloud Computing Technology and Science (Cloud-
Com), 2010 IEEE Second International Conference
on, pages 693–702.
Ron Knode (2010). Cloud trust 2.0. https:
//scap.nist.gov/events/2010/itsac/
presentations/day2/Security_Automation_
for_Cloud_Computing-CloudTrust_2.0.pdf
Accessed on 22/08/2016.
Rousseau, D. M. and Sitkin, S. B. (1998). Not so different
after all: A cross-discipline view of trust. Academy of
Management Review, 23(3):393–404.
SPECS project (2016). Secure provisioning of cloud
service based on SLA management. http://
www.specs-project.eu/project/description/
Accessed on 22/08/2016.
Subashini, S. and Kavitha, V. (2011). A survey on security
issues in service delivery models of cloud computing.
Journal of network and computer applications, 34:1 –
11.
Zissis, D. and Lekkas, D. (2012). Addressing cloud com-
puting security issues. Future Generation computer
systems, 28(3):583 – 592.
Establishing Trust in Cloud Services via Integration of Cloud Trust Protocol with a Trust Label System
597