1. Ahmed, A., Zhang, N., 2010. An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation. In: Proc. SECURWARE, pp. 251–260.
2. AlZain, M., Pardede, E., Soh, B., Thom, J., 2012. Cloud Computing Security: From Single to Multi-clouds. In: Proc. HICSS, pp. 5490–5499.
3. A metric-based approach to assess risk for “on cloud” federated identity management;Arias-Cabarcos;J. Netw. Syst. Manag.,2012
4. Bernabe, J., Perez, J., Calero, J., Clemente, F., Perez, G., Skarmeta, A., 2011. Towards an authorization system for cloud infrastructure providers. In: Proc. SECRYPT, pp. 333–338.
5. Borst, W., 1997. Construction of Engineering Ontologies for Knowledge Sharing and Reuse. pH.D. thesis, University of Twente.