M. F. Arlitt and C. L. Williamson, Web Server Workload Characterization: The Search for Invariants, Proceedings of the ACM SIGMETRICS '96 Conference, pp.126-137, 1996.
DOI : 10.1145/233008.233034

P. Mell and T. Grance, The NIST Definition of Cloud Computing (Draft) NIST Special Publication 800-145, pp.6-10, 2011.

F. Cornelli, E. Damiani, S. Vimercati, S. Paraboschi, and P. Samarati, Choosing reputable servents in a P2P network, Proceedings of the eleventh international conference on World Wide Web , WWW '02, pp.65-69, 2002.
DOI : 10.1145/511446.511496

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.9044

F. Douglis, A. Feldmannz, and B. Krishnamurthy, Rate of change and other metrics: a live study of the World Wide Web, Proceedings of USENIX Symposium on Internetworking Technologies and Systems, pp.1-13, 1997.

M. Natu and J. Mirkovic, Fine-grained capabilities for flooding DDoS defense using client reputations, Proceedings of the 2007 workshop on Large scale attack defense , LSAD '07, pp.105-112, 2007.
DOI : 10.1145/1352664.1352668

S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.1-13, 2006.
DOI : 10.1109/INFOCOM.2006.127

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.8279

J. Yu, Z. Li, H. Chen, and X. Chen, A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks, International Conference on Networking and Services (ICNS '07), pp.54-56, 2007.
DOI : 10.1109/ICNS.2007.5

. A. Khajeh-hosseini, D. Greenwood, and I. Sommerville, Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS, 2010 IEEE 3rd International Conference on Cloud Computing, pp.55-65, 2010.
DOI : 10.1109/CLOUD.2010.37

F. Curbera, M. Duftler, R. Khalaf, W. Nagy, N. Mukhi et al., Unraveling the Web services web: an introduction to SOAP, WSDL, and UDDI, IEEE Internet Computing, vol.6, issue.2, pp.86-93, 2002.
DOI : 10.1109/4236.991449

A. Gopalakrishnan, Cloud Computing Identity Management, SETLabs Briefings, Vol7 No7, pp.45-55, 2009.

Y. Xie and S. Yu, A Novel Model for Detecting Application Layer DDoS Attacks Computer and Computational Sciences, IMSCCS '06 First International Multi- Symposiums, 2006.
DOI : 10.1109/imsccs.2006.159