[1. Cooper, C. W., E. Rhodes. Measuring the Efficiency of Decision Making Units. - European Journal of Operational Research, Vol. 2, 1978, No 6, pp. 429-444.10.1016/0377-2217(78)90138-8]Search in Google Scholar
[2. Lin, G., D. Wang, Y. Bie, M. Lei. MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing Information Security. China Communications, 2014, pp. 154-162.10.1109/CC.2014.6827577]Search in Google Scholar
[3. Fan, W., H. Perros. A Novel Trust Management Framework for Multi-Cloud Environments Based on Trust Service Providers. - Knowledge-Based Systems, Vol. 70, 2014, pp. 392-406.10.1016/j.knosys.2014.07.018]Search in Google Scholar
[4. Ouedraogo, M., H. Mouratidis. Selectinga Cloud Service Provider in the Age of Cybercrime. - Computers & Security, Vol. 38, 2013, pp. 3-13.10.1016/j.cose.2013.01.007]Search in Google Scholar
[5. Tang, C., J. Liu. Selectinga Trusted Cloud Service Provider for Your Saa S Program. - Computers & Security, Vol. 50, 2015, pp. 60-73.10.1016/j.cose.2015.02.001]Search in Google Scholar
[6. Huang, J., D. M. Nico l. Trust Mechanisms for Cloud Computing. - Journal of Cloud Computing: Advances, Systems and Applications, Vol. 2, 2013, No 9.10.1186/2192-113X-2-9]Search in Google Scholar
[7. Tan, W. A., Y. Sun, L. X. Li, G. Z. Lu, T. Wang. A Trust Service-Oriented Scheduling Model for Workflow Applications in Cloud Computing. - IEEE Systems Journal, Vol. 8, 2014, No 3, pp. 868-878.10.1109/JSYST.2013.2260072]Search in Google Scholar
[8. Habib, S. M., S. Hauke, S. Ries, M. Muhlhauser. Trust asa Facilitator in Cloud Computing: A Survey. - Journal of Cloud Computing: Advances, Systems and Applications, Vol. 1, 2012, No 19.]Search in Google Scholar
[9. Wißne r, M., S. Hammer, E. Kurdyukova, E. André. Trust-Based Decision-Making for the Adaptation of Public Displays in Changing Social Contexts. - Journal of Trust Management, Vol. 1, 2014, No 6.10.1186/2196-064X-1-6]Search in Google Scholar
[10. Dolev, S., N. Gilboa, M. Kopeetsk y. Efficient Private Multi-Party Computations of Trust in the Presence of Curious and Malicious Users. - Journal of Trust Management, Vol. 1, 2014, No 8.10.1186/2196-064X-1-8]Search in Google Scholar
[11. Yuan, W., D. Guan, Y.-K. Lee, S. Lee, S. J. Hur. Improved Trust-Aware Recommender System Using Small-Worldness of Trust Networks. - Knowledge-Based Systems, Vol. 23, 2010, pp. 232-238.10.1016/j.knosys.2009.12.004]Search in Google Scholar
[12. Li, X., J. Du. Adaptive and Attribute-Based Trust Model for Service Level Agreement Guarantee in Cloud Computing. - IET Information Security, Special Issue - Trust and Identity Management in Mobile and Internet Computing and Communications, Vol. 7, 2013, No 1, pp. 39-50.10.1049/iet-ifs.2012.0232]Search in Google Scholar
[13. Wang, W., G. Zeng, D. Tang, J. Yao. Cloud-DLS: Dynamic Trusted Scheduling for Cloud Computing. - Expert Systems with Applications, Vol. 39, 2012, pp. 2321-2329.10.1016/j.eswa.2011.08.048]Search in Google Scholar
[14. Gu, L., J. Zhong, C. Wang, Z. Ni, Y. Zhang. Trust Model in Cloud Computing Environment Based on Fuzzy Theory. - International Journal of Computers Communications & Control, Vol. 9, 2014, No 5, pp. 570-583.10.15837/ijccc.2014.5.1276]Search in Google Scholar
[15. Gokulnath, K., R. Uthariaraj. Game Theory Based Trust Model for Cloud Environment. - The Scientific World Journal, Article ID 709827, 2015, Hindawi Publishing Corporation. 10 p.10.1155/2015/709827456217226380365]Search in Google Scholar
[16. Zhou, Y., Z. Yan, N. Li, L. Yu, L. Zhou, L. Chen. Cloud-Data Envelopment Analysis Method Used for Assessment of Restoration Building Block Schemes. - CSEE Journal of Power and Energy Systems, Vol. 1, 2015, No 2, pp. 43-52.10.17775/CSEEJPES.2015.00018]Search in Google Scholar
[17. Kumar, S. G., S. B. Versteeg, R. Buyyaa. A Framework for Ranking of Cloud Computing Services. - Future Generation Computer Systems, Vol. 29, 2013, pp. 1012-1023.10.1016/j.future.2012.06.006]Search in Google Scholar
[18. Li, A., X. Yang, S. Kandula, M. Zhang. Cloud Cmp: Comparing Public Cloud Providers. - In: Proc. of 10th Annual Conference on Internet Measurement, Melbourne, Australia, 2010. ]Search in Google Scholar
[19. Iosup, A., S. Ostermann, N. Yigitbasi, R. Prodan, T. Fahringer, D. Epema. Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing. - IEEE Transactions on Parallel and Distributed Systems, Vol. 22, 2011, No 6, pp. 931-945.10.1109/TPDS.2011.66]Search in Google Scholar
[20. Harmony, Cloudharmony.com, February 2012. http://cloudharmony.com/]Search in Google Scholar
[21. Azadi, M., M. Jafarian, R. F. Saen, S. M. Mirhedayatian. A New Fuzzy DEA Model for Evaluation of Efficiency and Effectiveness of Suppliers in Sustainable Supply Chain Management Context. - Computers & Operations Research, Vol. 54, 2015, pp. 274-285.10.1016/j.cor.2014.03.002]Search in Google Scholar
[22. Razavi, S. H., H. Amoozad, E. K. Zavadskas, S. S. Hashemi. A Fuzzy Data Envelopment Analysis Approach Based on Parametric Programming. - International Journal of Computer Communication, Vol. 8, 2013, No 4, pp. 594-607.10.15837/ijccc.2013.4.580]Search in Google Scholar
[23. De Souza, L. M., M. P. Fernandez. Performance Evaluation Methodology for Cloud Computing Using Data Envelopment Analysis. - In: Proc. of 14th International Conference on Networks, IARIA, 2015, pp. 58-64. ISBN: 978-1-61208-398-8.]Search in Google Scholar
[24. Chen, W.-C., A. L. Johnson. A Unified Model for Detecting Efficient and Inefficient Outliers in Data Envelopment Analysis. - Computers & Operations Research, Vol. 37, 2010, No 2, pp. 417-425.10.1016/j.cor.2009.06.010]Search in Google Scholar
[25. Jin, B., Y. Wang, Z. Liu, J. Xue. A Trust Model Based on Cloud Model and Bayesian Networks. - Procedia Environmental Sciences, Vol. 11, 2011, pp. 452-459.10.1016/j.proenv.2011.12.072]Search in Google Scholar
[26. Shuaibu, B. M., N. M. Norwawi, M. H. Selamat, A. Al-Alwani. Systematic Review of Web Application Security Development Model. - Artificial Intelligence Review, Vol. 43, 2015, pp. 259-276.10.1007/s10462-012-9375-6]Search in Google Scholar
[27. Raja, S., S. Ramaiah. 2S-FAT-Based DLS Model for Cloud Environment. - Arabian Journal for Science and Engineering, Vol. 41, 2016, No 8, pp. 3099-3112.10.1007/s13369-016-2084-8]Search in Google Scholar
[28. Wei, C. P., X. Tang. Possibility Degree Method for Ranking Intuitionistic Fuzzy Numbers. - In: Proc. of IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2010, pp.142-145. 10.1109/WI-IAT.2010.239]Search in Google Scholar