1. Younis, Y.A., Kifayat, K., Merabti, M.: An access control model for cloud computing. J. Inf. Secur. Appl. 19, 45–60 (2014)
2. Xiong, H., Chen, X., Zhang, B., Wang, G.: A finer-grained resource management model oriented to role-based access control. In: CCIS 2014—Proceedings of 2014 IEEE 3rd International Conference on Cloud Computing Intelligence System, pp. 198–206 (2014)
3. Lin, W., Wang, J.Z., Liang, C., Qi, D.: A threshold-based dynamic resource allocation scheme for cloud computing. Proc. Eng. 23, 695–703 (2011)
4. Moreno, I.S., Garraghan, P., Townend, P., Xu, J.: Analysis, modeling and simulation of workload patterns in a large-scale utility cloud. IEEE Trans. Cloud Comput. 2, 208–221 (2014)
5. Zhang, W., Liu, J., Liu, C., Zheng, Q., Zhang, W.: Workload modeling for virtual machine-hosted application. Expert Syst. Appl. 42, 1835–1844 (2015)