Alam, T. (2020). Cloud computing and its role in information technology. IAIC Transactions on Sustainable Digital Innovation (ITSDI), 1(2), 108-115.
Chang, V. I. (2020). A proposed framework for cloud computing adoption. In Sustainable Business: Concepts, Methodologies, Tools, and Applications (pp. 978-1003). IGI Global.
Chang, V., Kuo, Y. H., & Ramachandran, M. (2016). Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, 24-41.
Chaturvedi, C., & Gupta, B. B. (2020). Cloud computing security: Taxonomy of issues, challenges, case studies, and solutions. In Handbook of Research on Intrusion Detection Systems (pp. 306-325). IGI Global.
Dargazi Khojin, M. G. (2015). Introduction of a new method for data protection against data attacks in mobile cloud computing. Tehran Payam-e Noor University. (Original work published in Persian)
Delgado, V. (2010). Exploring the limits of cloud computing. Master of Science Thesis, Stockholm, Sweden.
Ebayi Khorasani, F. (2016). Introduction of a method to enhance information security in cloud computing. Shahab Danesh Superior Education Institute-Computer and Electronic Faculty. (Original work published in Persian)
Erl, T., Cope, R., & Naserpour, A. (2015). Cloud computing design patterns. Prentice Hall Press.
Garg, K., & Singh, J. (2017). A Proposed Technique for Cloud Computing Security. In Innovations in Computer Science and Engineering (pp. 89-95). Springer, Singapore.
Juels, A., Oprea, A., & Bowers, K. D. (2017). Security Issues for Cloud Computing. Meta, 4(5).
Kanwal, A., Masood, R., Ghazia, U. E., Shibli, M. A., & Abbasi, A. G. (2013, August). Assessment criteria for trust models in cloud computing. In Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing (pp. 254-261). IEEE.
Khayer, A., Talukder, M. S., Bao, Y., & Hossain, M. N. (2020). Cloud computing adoption and its impact on SMEs’ performance for cloud supported operations: A dual-stage analytical approach. Technology in Society, 60, 101225.
Mondal, A., Paul, S., Goswami, R. T., & Nath, S. (2020, January). Cloud computing security issues & challenges: A Review. In 2020 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-5). IEEE.
PourMohamad, R. (2016). Introduction an access control model based on dynamic trust in cloud computing environment. Master's Thesis, Tabriz University. (Original work published in Persian)
Pourya Mameghani, K. (2015). Quality control model for information technology security threats in cloud computing. Shahed University, Engineering and Technical Faculty. (Original work published in Persian)
Qiu, M., & Gai, K. (2017). Mobile cloud computing: Models, implementation, and security. Chapman and Hall/CRC.
Rebollo, O., Mellado, D., Fernández-Medina, E., & Mouratidis, H. (2015). Empirical evaluation of a cloud computing information security governance framework. Information and Software Technology, 58, 44-57.
Rittinghouse, J. W., & Ransome, J. F. (2017). Cloud computing: Implementation, management, and security. CRC Press.
Salehi, A. (2017). Introduction of cloud computing acceptation model in Tehran hospitals. Tarbiat Modares University, Faculty of Accounting and Management. (Original work published in Persian)
Shoeibi, D. (2016). Introduction of a distributed penetration detection system to enhance security in cloud computing. Kerman Industrial and Technological Graduate Education, Privilege Sciences and Technologies University. (Original work published in Persian)
Singh, J., Pasquier, T., Bacon, J., Ko, H., & Eyers, D. (2015). Twenty security considerations for cloud-supported Internet of Things. IEEE Internet of Things Journal, 3(3), 269-284.
Tsugawa, M., Matsunaga, A., & Fortes, J. A. (2014). Cloud computing security: What changes with software-defined networking? In Secure Cloud Computing (pp. 77-93). Springer New York.