1. Westphall, C.B., Lamin, F.R.: SLA Perspective in Security Management for Cloud Computing. In: Proc. of the Int. Conf. on Networking and Services (ICNS), pp. 212–217 (2010)
2. IFIP AICT;M. Ficco,2012
3. Kossmann, D., Loesing, S.: An evaluation of alternative architectures for transaction processing in the cloud. In: Proc. of the Int. Conf. on Manag. of Data (2010)
4. Emeakaroha, V.C., Maurer, M., Dustdar, S., Acs, S., Kertesz, A., Kecskemeti, G.: LAYSI: A Layered Approach for SLA-Violation Propagation in Self-manageble Cloud Infrastructures. In: Proc. of the IEEE 34th Conf. on Computer Software and Applications, pp. 365–370 (November 2010)
5. Ostermann, S., Iosup, A., Yigitbasi, N., Prodan, R., Fahringer, T., Epema, D.: An Early Performance Analysis of Cloud Computing Services for Scientific Computing. TU Delft/PDS Technical Report PDS-2008-12 (December 2008)