2Cloud Security Alliance. Security Guidance for Critical Areas of Focus In Cloud Computing 3.0[EB/OL]. (2011-1-1) [2013-1-20]. http : //www.cloudsecurityalliance.org/.
3MA D, TSUDIK G. A New Approach to Secure Logging[J]. ACMTrans. Storage, 2009, 5(1): 1-21.
4MILLIGAN G W, COOPER M C. A Study of Standardization of Variables in Cluster Analysis[J]. Journal of Classification, 1988, 5: 181-204.
5Kalagiakos,P."Cloud Computing learning,". Application of Information and Communication Technologies (AICT) . 2011
6Jiehui Ju,Ya Wang,Jianqing Fu,Jiyi Wu,Zhijie Lin.Research on Key Technology in SaaS. Proceedings - 2010 International Conference on Intelligent Computing and Cognitive Informatics, ICICCI . 2010
7CHENG Tong-lv,QING Li,ZHOU Lei,et al.PaaS: a revolution for information technologyplatforms. Proc of International Conference on Educational and Network Technology . 2010
8Alabbadi M M.Cloud Computing for Education and Learning:Education and Learning as a Service (ELaaS). InteractiveCollaborative Learning (ICL),14th International Conferenceon . 2011
9Yang Xiao-qiang,,Deng Yue-jin.Exploration of Cloud Compu-ting Technologies for Geographic Information Services. Geoinformatics,18th International Conference on . 2010
10Banerjee,Srikanth,Cukic.Log-Based Reliability Analysis ofSoftware as a Service (SaaS). Software Reliability Engi-neering (ISSRE),IEEE 21st International Symposium on . 2010