7Nurmi D, Wolski R, Grzegorczyk C, et al. Eucalyptus : A Technical Report on an Elastic Utility Computing Architecture Linking Your Programs To Useful Systems[ R ]. Santa Barbara:Univisity of California, 2008.
8Gonzalez JF, Rodriguez MC, Nistal ML, et al. Reverse OAuth: A solution to achieve deleated authorizations in single sign-on e-learning systems. Computers & Security, 2009,28:43-856.