[1] P. Mell and T. Grance, “The NIST definition of cloud computing,” 2011.
[2] W. Voorsluys, J. Broberg, R. Buyya, and others, “Introduction to cloud computing,” Cloud Comput. Princ. Paradig., pp. 1–44, 2011.
[3] T. Velte, A. Velte, and R. Elsenpeter, Cloud computing, a practical approach. McGraw-Hill, Inc., 2009.
[4] A. S. Horvath and R. Agrawal, “Trust in cloud computing,” in SoutheastCon 2015, 2015, pp. 1–8, doi: 10.1109/SECON.2015.7132885.
[5] F. Rosenberg, P. Celikovic, A. Michlmayr, P. Leitner, and S. Dustdar, “An end-to-end approach for QoS-aware service composition,” in Proceedings of the 13th IEEE international conference on Enterprise Distributed Object Computing, 2009, pp. 128–137.
[6] J.-Z. Luo, J.-Y. Zhou, and Z.-A. Wu, “An adaptive algorithm for QoS-aware service composition in grid environments,” Serv. Oriented Comput. Appl., vol. 3, pp. 217–226, 2009, [Online]. Available: http://dx.doi.org/10.1007/s11761-009-0047-6.
[7] A. Liu, L. Huang, and Q. Li, “QoS-Aware Web Services Composition Using Transactional Composition Operator,” in Advances in Web-Age Information Management, vol. 4016, J. Yu, M. Kitsuregawa, and H. Leong, Eds. Springer Berlin / Heidelberg, 2006, pp. 217–228.
[8] F. Lécué, “Optimizing QoS-Aware Semantic Web Service Composition,” in The Semantic Web, ISWC 2009, vol. 5823, A. Bernstein, D. Karger, T. Heath, L. Feigenbaum, D. Maynard, E. Motta, and K. Thirunarayan, Eds. Springer Berlin / Heidelberg, 2009, pp. 375–391.
[9] W. Wiesemann, R. Hochreiter, and D. Kuhn, “A Stochastic Programming Approach for QoS-Aware Service Composition,” in Proceedings of the 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid, 2008, pp. 226–233, doi: http://dx.doi.org/10.1109/CCGRID.2008.40.
[10] A. Mani and A. Nagarajan, “Understanding quality of service for Web services,” IBM Dev., 2002.
[11] S.-Y. Hwang, H. Wang, J. Tang, and J. Srivastava, “A probabilistic approach to modeling and estimating the QoS of web-services-based workflows,” Inf. Sci., vol. 177, no. 23, pp. 5484–5503, 2007, doi: http://dx.doi.org/10.1016/j.ins.2007.07.011.
[12] A. Selvaraj and S. Sundararajan, “Evidence-based trust evaluation system for cloud services using fuzzy logic,” Int. J. Fuzzy Syst., vol. 19, no. 2, pp. 329–337, 2017.
[13] Y. Wang, S. Chandrasekhar, M. Singhal, and J. Ma, “A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing,” Cluster Comput., vol. 19, no. 2, pp. 647–662, 2016.
[14] S. S. Yau, Y. Yao, and A. B. Buduru, “An adaptable distributed trust management framework for large-scale secure service-based systems,” Computing, vol. 96, no. 10, pp. 925–949, 2014.
[15] P. D. Manuel, S. T. Selvi, and M. I. Abd-El Barr, “Trust management system for grid and cloud resources,” in Advanced Computing, 2009. ICAC 2009. First International Conference on, 2009, pp. 176–181.
[16] M. Li, S. Yu, N. Cao, and W. Lou, “Authorized private keyword search over encrypted data in cloud computing,” in Distributed Computing Systems (ICDCS), 2011 31st International Conference on, 2011, pp. 383–392.
[17] P. Zhang and Z. Yan, “A QoS-aware system for mobile cloud computing,” in Cloud Computing and Intelligence Systems (CCIS), 2011 IEEE International Conference on, 2011, pp. 518–522.
[18] T. H. Noor, Q. Z. Sheng, and A. Bouguettaya, Trust Management in Cloud Services. Springer, 2014.
[19] M. Chiregi and N. J. Navimipour, “Trusted services identification in the cloud environment using the topological metrics,” Karbala Int. J. Mod. Sci., vol. 2, no. 3, pp. 203–210, 2016, doi: http://dx.doi.org/10.1016/j.kijoms.2016.06.002.
[20] S.-K. Chong, J. Abawajy, M. Ahmad, and I. R. A. Hamid, “Enhancing Trust Management in Cloud Environment,” Procedia - Soc. Behav. Sci., vol. 129, pp. 314–321, 2014, doi: http://dx.doi.org/10.1016/j.sbspro.2014.03.682.
[21] X. Wu, R. Zhang, B. Zeng, and S. Zhou, “A Trust Evaluation Model for Cloud Computing,” Procedia Comput. Sci., vol. 17, pp. 1170–1177, 2013, doi: http://dx.doi.org/10.1016/j.procs.2013.05.149.
[22] T. H. Noor, Q. Z. Sheng, L. Yao, S. Dustdar, and A. H. H. Ngu, “CloudArmor: Supporting reputation-based trust management for cloud services,” IEEE Trans. parallel Distrib. Syst., vol. 27, no. 2, pp. 367–380, 2015.
[23] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, “The WEKA data mining software: an update,” SIGKDD Explor., vol. 11, no. 1, pp. 10–18, 2009, doi: 10.1145/1656274.1656278.
[24] U. M. Fayyad and K. B. Irani, “Multi-interval discretization of continuous-valued attributes for classification learning,” in Proceedings of the Thirteenth International Joint Conference on Artificial Intelligence, IJCAI ’93, 1993, pp. 1022–1029.
[25] B. Lerner and R. Malka*, “Investigation of the K2 algorithm in learning Bayesian network classifiers,” Appl. Artif. Intell., vol. 25, no. 1, pp. 74–96, 2011.
[26] I. J. Myung, “Tutorial on maximum likelihood estimation,” J. Math. Psychol., vol. 47, no. 1, pp. 90–100, 2003.
[27] D. Heckerman, “A Tutorial on Learning with Bayesian Networks,” in Innovations in Bayesian Networks, vol. 156, D. Holmes and L. Jain, Eds. Springer Berlin / Heidelberg, 2008, pp. 33–82.
[28] S. L. Lauritzen and D. J. Spiegelhalter, “Local computations with probabilities on graphical structures and their application to expert systems,” J. R. Stat. Soc. B, vol. 50, pp. 157–224, 1988.