References
- A. Squicciarini, S. Sundareswaran, D. Lin, Preventing Information.
- Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., Lee, G...Zaharia, M. (2010, April). A view of cloud computing. Communications of the ACM, 53(4), 50-58. DOI: 10.1145/1721654.1721672.
- Aslam, U., Ullah, I, & Ansara, S. (2010, November). Open-source private cloud computing. Interdisciplinary Journal of Contemporary Research in Business. 2(7), 399-407.
- Carraro, G., & Chong, F. (2006, October). Software as a service: An enterprise perspective. Retrieved from: http://msdn.microsoft.com/en-us/library/aa905332.aspx#enterprisertw_topic3
- Cisco. (2009). Infrastructure as a Service: Accelerating time to profitable new revenue streams. Retrieved from http://www.cisco.com/en/US/solutions/collateral/ns341/ns991/ns995/IaaS_BDM_WP.pdf
- Cole, B. (2012). Looking at business size, budget when choosing between SaaS and hosted ERP. E-guide: Evaluating SaaS vs. on premise for ERP systems. Retrieved from: http://docs.media.bitpipe.com/io_10x/io_104515/item_548729/SAP_sManERP_IO%23104515_EGuide_061212.pdf
- ComputureWeekly.com. (2009, March). Hardware as a service. Retrieved from http://www.computerweekly.com/feature/Hardware-as-a-Service
- Coronel, C., Morris, S., & Rob, P. (2013). Database Systems: Design, Implementation, and Management, (10th Ed.). Boston: Cengage Learning.
- D.P. Bertsekas, Nonlinear programming, (1999).
- C. Tankard, Big data security, Netw. Secur. 2012 (2012) 5-8.
- P. Malik, Governing big data: principles and practices, IBM J. Res. Dev. 57 (1) (2013) 1. (-1: 13). https://doi.org/10.1147/JRD.2013.2240581
- D. Agrawal, C.C. Aggarwal, On the design and quantification of privacy preserving data mining algorithms, in: Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, ACM, Santa Barbara, California, USA, 2001, pp. 247-255.
- D. Loshin, Chapter 5 - data governance for big data analytics: considerations for data policies and processes, in: D. Loshin (Ed.), Big Data Analytics, Morgan Kaufmann, Boston, 2013, pp. 39-48.
- S. Soares, Big Data Governance, Sunilsoares, 2012.
- P.P. Tallon, Corporate governance of big data: perspectives on value, risk, and cost, Computer 46 (2013) 32-38. https://doi.org/10.1109/MC.2013.155
- M.D. Assuncao, R.N. Calheiros, S. Bianchi, M.A. Netto, R. Buyya, Big Data Computing and Clouds: Challenges, Solutions, and Future Directions, arXiv preprint arXiv:1312.4722, (2013). https://doi.org/10.1016/j.jpdc.2014.08.003
- Khan, Abdul Nasir, et al. BSS: block-based sharing scheme for secure data storage services in mobile cloud environment. The Journal of Supercomputing (2014) 1-31.
- Khan, Abdul Nasir, et al., Incremental proxy re-encryption scheme for mobile cloud computing environment, The Journal of Supercomputing 68 (2) (2014) 624-651. https://doi.org/10.1007/s11227-013-1055-z
- Eaton, Deroos, Deutsch, Lapis, & Zikopoulos. (2012). Understanding big data: Analytics for enterprise class Hadoop and streaming data. New York: McGraw-Hill.
- Geczy, P., Izumi, N., & Hasida, K. (2012). Cloudsourcing: Managing cloud adoption. Global Journal of Business Research, 6(2), 57-70.