M. Pauly, T-Systems' Cloud-Based Solutions for Business Applications
DOI : 10.1002/9780470940105.ch11

W. C. David, Cloud computing Key Initiative Overview Available online at: http://www.gartner.com/it/initiatives/pdf, KeyInitiativeOverview_CloudComputing .pdf, vol.5, 2010.

S. Leimeister, R. Christoph, B. Markus, and K. Helmut, The Business Perspective of Cloud Computing: Actors, Roles and Value Networks, European Conference on Information Systems, 2010.

P. Mell and T. Grance, The NIST Definition of Cloud Computing Available online at: http://csrc.nist.gov/publications, 2011.

T. S. Mohan, J. Buyya, A. Broberg, and . Goscinski, Migrating into a Cloud, in Cloud Computing: Principles and Paradigms, 2011.

D. Craig, How Are SMBs Viewing the Cloud? Available online at: http://www.constructioncloudcomputing.com/2012/02/16/how-are-smbs-viewing- the-cloud Accessed on 1, 2012.

C. Perry, A. Cavaye, and L. Coote, Technical and social bonds within business???to???business relationships, Journal of Business & Industrial Marketing, vol.17, issue.1, pp.75-88, 2002.
DOI : 10.1177/009207039502300414

B. Lozano and A. E. Marks, Executive's Guide to Cloud Computing, 2010.

M. Brookbanks, More Clouds Coming. IT Now Magazine, pp.16-19, 2010.
DOI : 10.1093/itnow/bwq163

. Gogrid, Cloud computing adoption slower than expected Available online at: http://www.gogrid.com/newscloud-computing-adoption-slower-than- expected (2012) Accessed on 1, 2012.

M. Almorsy, J. Grundy, and A. Ibrahim, Collaboration-Based Cloud Computing Security Management Framework, 2011 IEEE 4th International Conference on Cloud Computing, 2011.
DOI : 10.1109/CLOUD.2011.9

U. Star, Can Cloud Computing give you the freedom to be more strategic? ? UK businesses' attitudes to Cloud Computing revealed. White paper. Available online at: http://www.montal.com/newsletters, 2009.

F. Sabahi, Cloud Computing Security Threats and Responses Available online at, 2011.
DOI : 10.1109/iccsn.2011.6014715

.. S. Devine, Flying too Close to the Sun Can be a Risky Business Business Technology E-Magazine, Available online at Accessed on 1, 2011.

B. R. Kandukuri, V. R. Paturi, and A. Rakshit, Cloud Security Issues, 2009 IEEE International Conference on Services Computing, pp.517-537, 2009.
DOI : 10.1109/SCC.2009.84

M. Mcintosh and P. Austel, XML Signature Element Wrapping Attacks and Countermeasures, SWS '05: Preceedings of the 2005 Workshop on Secure Web Services, pp.20-27, 2005.

M. Jensen, N. Gruschka, and L. Iacono, On Technical Security Issues in Cloud Computing, 2009 IEEE International Conference on Cloud Computing, pp.109-116, 2009.
DOI : 10.1109/CLOUD.2009.60

F. Research, Top Corporate Software Priority Is Modernizing Legacy Applications, 2009.

W. Jansen and T. Grance, Guidelines on Security and Privacy in Public Cloud Computing, NIST Draft Special Publication, pp.800-144, 2011.
DOI : 10.6028/NIST.SP.800-144

A. Morsy, M. Grundy, J. Müller, and I. , An Analysis of The Cloud Computing Security Problem, Proceedings of APSEC 2010 Cloud Workshop, 2010.

C. S. Yoo, Cloud Computing:, International Journal of Organizational and Collective Intelligence, vol.5, issue.3, 2010.
DOI : 10.4018/ijoci.2015070103

G. S. Machado, D. Hausheer, and B. Stiller, Considerations on the Interoperability of and between Cloud Computing Standards Available online at Accessed on 1, 2009.

D. Craig, constructing cloud computing Available online at: http://www.constructioncloudcomputing.comcan-we-talk- interoperability-and-portability-hold-the-keys Accessed on 1, 2010.