[1] M. Armbrust, & et al., "A view of cloud computing," Commun. ACM., vol. 53., no. 4, pp. 50-58, 2010.
[2] P. Mell & T. Grance, "The NIST definition of cloud computing", 2011.
[3] T. H. Noor, Q. Z. Sheng, & A. Bouguettaya, "Trust Management in Cloud Services," Springer, 2014.
[4] Y. Fu, Z. Hu, & Q. Zhang, "Bayesian Network based QoS Trustworthiness Evaluation Method in Service Oriented Grid," in Proceedings of the The 9th International Conference for Young Computer Scientists, pp. 293-298, 2008.
[5] S. Rizvi, K. Karpinski, B. Kelly, & T. Walker, "Utilizing Third Party Auditing to Manage Trust in the Cloud," Procedia Comput. Sci., vol. 61, pp. 191-197, 2015.
[6] A. Mani & A. Nagarajan, "Understanding quality of service for Web services," IBM Dev, 2002.
[7] D. Trabay, A. Asem, I. El-Henawy, & W. Gharibi, "A hybrid technique for evaluating the trust of cloud services," International Journal of Information Technology, vol. 13, pp. 687-695, 2021.
[8] Kefeng Liu, Lizhi Yang, & Ming Li, "Application of Cloud Model and Bayesian Network to Piracy Risk Assessment," Hindawi Mathematical Problems in Engineering," vol. 202, 2021.
[9] A Selvaraj, & S Sundararajan, "Dynamic Multi Attribute Trust Evaluation System for IaaS Services," in International Journal of Applied Science and Engineering, vol. 17, no. 1, pp. 1-10, 2020.
[10] Y. Wang, S. Chandrasekhar, M. Singhal, & J. Ma, "A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing," Cluster Comput, vol. 19, no. 2, pp. 647-662, 2016.
[11] S. S. Yau, Y. Yao, & A. B. Buduru, "An adaptable distributed trust management framework for large-scale secure service-based systems," Computing, vol. 96, no. 10, pp. 925-949, 2014.
[12] D. Manuel, S. T. Selvi, & M. I. Abd-El Barr, "Trust management system for grid and cloud resources," in Advanced Computing, 2009. ICAC 2009. First International Conference on, Chennai India, pp. 176-181, 2009.
[13] M. Li, S. Yu, N. Cao, & W. Lou, "Authorized private keyword search over encrypted data in cloud computing," in Distributed Computing Systems (ICDCS), 31st International Conference on, pp. 383-392, 2011.
[14] P. Zhang & Z. Yan, "A QoS-aware system for mobile cloud computing," in Cloud Computing and Intelligence Systems (CCIS), IEEE International Conference on, Beijing, China, pp. 518-522, 2011.
[15] M. Chiregi, & N.J. Navimipour, "Trusted services identification in the cloud environment using the topological metrics," Karbala Int. J. Mod. Sci. 2, pp. 203-210, 2016.
[16] S.K. Chong, J. Abawajy, M. Ahmad, & I.R.A. Hamid, "Enhancing Trust Management in Cloud Environment," Procedia - Soc. Behav. Sci. 129, pp. 314-321, 2014.
[17] X. Wu, R. Zhang, B. Zeng, & S. Zhou, "A Trust Evaluation Model for Cloud Computing," Procedia Comput. vol. 17, pp.1170–1177, 2013.
[18] V. Hosseinnezhad, & A. A. pourhaji kazem, "Bayesian Networks Based Trust Model in Social Networks", Scientific Journal of Electronic and Cyber Defense, Vol. 6, No. 2, 2018. (In Persian)
[19] CloudArmmor Prohect Web Site, URL: https://cs.adelaide.edu.au/~cloudarmor/ds.html.