References [1] Larry Dignan, “Cloud's price race to zero: Microsoft cuts Azure pricing, eyes Amazon,” www.zdnet.com. http://www.zdnet.com/blog/btl/clouds-price-race-to-zero-microsoft-cuts-azure-pricing-eyes-amazon/71246, March 9, 2012. [2] S. M. Habib, S. Ries, M. Mühlhäuser, “Cloud computing landscape and research challenges regarding trust and reputation,” in Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, Xi'an, China, pp. 410-415, 2010. [3] S. Pearson, “Taking account of privacy when designing cloud computing services,” In ICSE Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, Canada, pp. 44-52, May 2009. [4] M. Nelson, “The Cloud, the crowd, and public policy,” Issues in Science And Technology, vol. 25, no. 4, 2009. [5] H. Takabi, J.B.D. Joshi, G.J. Ahn. ”Security and privacy challenges in Cloud computing environments,” IEEE Security & Privacy, vol. 8, no. 6, pp. 24-31, 2010. [6] L. Yan, C. Rong, G. Zhao. “Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography,” in The First International Conference on Cloud Computing, pp. 167-177, 2009. [7] K. Hwang, S. Kulkarni, and Y. Hu, “Cloud security with virtualized defense and reputation-based trust management,” IEEE International Conference on Dependable, Autonomic, and Secure Computing (DASC 09), IEEE CS Press, 2009. [8] P. Resnick, R. Zeckhauser, “Trust among strangers in Internet transactions: empirical analysis of eBay’s reputation system,” working Paper for the NBER Workshop on Empirical Studies of Electronic Commerce, 2000. [9] A. Jøsang, R. Ismail, C. Boyd, “A survey of trust and reputation systems for online service provision,” Decis. Support Syst. vol. 43, pp. 618–644, 2007. [10] R. Axelrod, “The Evolution of Cooperation,” Basic Books: New York, 1984. [11] A. M. Spence, “Job market signaling,” Quarterly Journal of Economics, vol. 87, no. 3, pp. 355-374, 1973. [12] A. Lopez-Paredes, M. Posada, C. Hernandez, J. Pajares, “Agent-based experimental economics in signaling games in complexity and artificial markets,” Lecture Notes in Economics and Mathematical Systems, vol. 614, pp. 121-129, 2008. [13] A. Patcha, J. Park, “A game theoretic formulation for intrusion detection in mobile ad hoc networks,” International Journal of Network Security, vol. 2, no. 2, pp.131-137, 2006. [14] T. Ahn, J. Esarey “A dynamic model of generalized social trust,” Journal of Theoretical Politics, vol. 20, no. 2, pp. 151–180, 2008. [15] M. Head, K. Hassanein, “Trust in e-commerce: evaluating the impact of third-party seals,” Quarterly Journal of Electronic Commerce, vol. 3, no. 3, pp. 307-325, 2002. [16] S. Kim, J. Hwang, “Theoretical analysis and simulation to investigate the fundamental rules of trust signaling games in network-based transactions,” Third International Conference on Future Computational Technologies and Applications, 2011. [17] J. Hwang, S. Kim, H. Kim, J. Park, “An optimal trust management method to protect privacy and strengthen objectivity in utility computing services,” International Journal of Information Technology & Decision Making, vol. 10, no. 2, pp. 287-308, 2011.