References: [1] Zhou, J., Cao, Z., Dong, X., Lin, X. (2015). Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions, In: IEEE Wireless Communications, 22 (2), p 136-144, 2015. [2] Huang, J., et al. (2016). Modeling and Analysis on Access Control for Device-to-Device Communications in Cellular Network: A Network-Calculus-Based Approach, In: IEEE Transactions on Vehicular Technology, 65 (3), p 1615-1626. [3] Bousselmi, K., Brahmi, Z., Gammoudi, M. M. (2014). Cloud Services Orchestration: A Comparative Study of Existing Approaches, 2014, 28th International Conference on Advanced Information Networking and Applications Workshops, Victoria, BC, 2014, p 410-416. [4] Jain, P., Datt, A., Goel, A., Gupta, S.C. (2016). Cloud service orchestration based architecture of OpenStack Nova and Swift, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, 2016, p 2453-2459. [5] Brahmi, Z., Ben Ali, J. (2015). Cooperative agents-based decentralized framework for cloud services orchestration, 2015 6th International Conference on Information Systems and Economic Intelligence (SIIE), Hammamet, 2015, p 46-51. [6] Weingärtner, R., Bräscher, G. B., Westphall, C. B. (2016). A Distributed Autonomic Management Framework for Cloud Computing Orchestration, 2016 IEEE World Congress on Services (SERVICES), San Francisco, CA, 2016, p 9-17. [7] Open Mobile Alliance, Diagnostics and Monitoring Management Object. OMA-TS-DiagMonTrapMO-V1_0-20090414- C, 2009. [8] Open Mobile Alliance, Diagnostics and Monitoring Trap Events Specifications, OMA-TS-DiagMonTrapEvents-V1_2- 20131008- A, 2013. [9] 3GPP Technical Specification Group Services and System Aspects; Policy and charging control architecture, Release 13, v13.7.0, 2016. |