2012 ? New Models for Delivering Software Available from: http://www.idc.com/getdoc.jsp?containerId=238635#, UM4QauTqmuM. 2. Media, M.R. Global Cloud Computing Market, p.839, 2012. ,
On the Definition of Access Control Requirements for Grid and Cloud Computing Systems, Networks for Grid Applications, vol.37, issue.1, pp.19-26, 2010. ,
DOI : 10.1145/1057977.1057979
Conformance checking of RBAC policy and its implementation. Information Security Practice and Experience, pp.144-155, 2005. ,
Automatic error finding in access-control policies, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011. ,
DOI : 10.1145/2046707.2046727
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.207.9707
Verification and change-impact analysis of access-control policies, Proceedings of the 27th international conference on Software engineering, 2005. ,
Authorization and Access Control, in Security, Privacy, and Trust in Modern Data Management, pp.39-53, 2007. ,
Access control: principle and practice, IEEE Communications Magazine, vol.32, issue.9, pp.40-49, 1994. ,
DOI : 10.1109/35.312842
Cloud computing and grid computing 360-degree compared. in Grid Computing Environments Workshop GCE'08 and Privacy: An Enterprise Perspective on Risks and Compliance, pp.292-304, 2008. ,
DOI : 10.1109/gce.2008.4738445
URL : http://arxiv.org/abs/0901.0131
The NIST definition of cloud computing (draft) NIST special publication 800: p. 145. 13. Sommerville, I. and G. Kotonya, Requirements engineering: processes and techniques, 1998. ,
Principles of model checking, 2008. ,
Model Checking based Software Verification Available from: http://iplu.vtt.fi/digitalo/modelchecking.pdf. 16. Girard, A. and G. Pappas, Verification using simulation, Hybrid Systems: Computation and Control, pp.272-286, 2006. ,
Systems engineering: coping with complexity. 1998: Pearson Education. 18. Gouglidis, A. and I. Mavridis, domRBAC: An access control model for modern collaborative systems, Computers & Security, 2012. ,
Access control in collaborative systems, ACM Computing Surveys, vol.37, issue.1, pp.29-41, 1996. ,
DOI : 10.1145/1057977.1057979
Property Verification for Generic Access Control Models, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008. ,
DOI : 10.1109/EUC.2008.22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.143.3964
Practical combinatorial testing: Beyond pairwise. IT Professional, pp.19-23, 2008. ,
DOI : 10.6028/NIST.SP.800-142
ACPT: A Tool for Modeling and Verifying Access Control Policies, 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, 2010. ,
DOI : 10.1109/POLICY.2010.22