書籍:
[1]李允中、王小璠、蘇木春 (2003)。模糊理論及其應用。台北市:全華科技圖書股份有限公司。
[2]許志義 (1984) 。多目標決策。台北市:五南圖書出版有限公司。
[3]許志義 (2003) 。多目標決策-第二版。台北市:五南圖書出版有限公司。
[4]陳瀅 (2010) 。雲端策略:雲端運算與虛擬化技術-第三版。台北市:天下雜誌股份有限公司。
[5]Hamid R. M., Strphenson, B., & Singhal, S. (2009). Outsourcing Business to Cloud Computing Service: Opportunity and Challenges, Palo Alto: Hewlett-Packard (HP).
[6]Hwang, C. L., & Yoon, K. (1981). Multiple attribute decision making: Methods and applications: a state-of-the-art survey, Springer-Verlag: Heidelberg.
[7]Revelle, C. S., Whitlatch, E., & Wright, J. (2003). Civil and Environmental Systems Engineering, New Jersey: Prentice Hall.
期刊論文:
[8]鐘嘉德、高天助、楊嘉栩(2010)。雲端運算與產業發展。研考雙月刊,34(4), 20-31。[9]Amid, A., Grodsypour, S. H., & O’Brien, C. (2009). A Weighted additive fuzzy multiobjectvie model for the supplier selection problem under price brecks in a supply Chain, International Journal of Production Economics, Vol. 121, No. 2, pp. 323-332.
[10]Bellman, R. E., & Zadeh, L. A. (1970). Decision-Making in a Fuzzy Environment, Management Science, Vol. 17, No. 4, pp. 141-164.
[11]Carroll, J. M. (1983). Decision support for risk analysis, Computer and Security, Vol. 2, No. 3, pp. 230-236.
[12]Durkee, D. (2010). Why Cloud Computing Will Never Be Free, Communications of The Acm, Vol. 53, No. 5, pp. 62-69.
[13]Erdogmus, H. (2009). Cloud Computing: Does Nirvana Hide behind the Nebula? IEEE software, Vol. 26, No. 2, pp. 4-6.
[14]Grossman, R. L. (2009). The case for cloud computing, IT Professional, Vol. 11, No. 2, pp. 23-27.
[15]Lai, Y. J., Liu, T. Y, Hwang, C. L. (1994) TOPSIS for MODM, European Journal of Operational Research, Vol. 76, No. 3, pp. 486-500.
[16]Leavitt, N. (2009). Is cloud computing really ready for prime time? IEEE Computer Society, Vol. 42, No. 1, pp. 15-20.
[17]Li, S., Member, S., & Hu, C. (2007). Two-Step Interactive Satisfactory Method for Fuzzy Multiple Objective Optimization With Preemptive Priorities, Fuzzy Sets and Systems, Vol. 15, No. 3, pp. 417-425.
[18]Lin, C. C. (2007). Using the weighted max–min approach for stochastic fuzzy goal programming: A case of fuzzy weights, Fuzzy Sets and Systems, Vol. 188, No.1, pp. 456-461.
[19]Lin, G., Fu, D., Zhu, J., & Dasmalchi, G. (2009). Cloud computing: IT as a server, IT professional, Vol. 11, No. 2, pp. 10-13.
[20]Lombardi, F., & Pietro, R. D. (2011). Secure virtualization for cloud computing, Journal of Network and Computer applications, Vol. 34, No. 4, pp. 1113-1122.
[21]Misra, S. C., & Mondal, A. (2011). Identification of a company''s sutiability for the adoption of cloud computing and modelling its corresponding Retrun on Investment, Mathematical and Computer Modelling, Vol. 53, No. 3-4, pp. 504-521.
[22]Rosenthal, A., Mork, P., Li, M. H., Stanford, J., Koester, D., & Reynolds, P. (2010). Cloud Computing: A new business paradigm for biomedical information sharing, Journal of Biomedical Information, Vol. 43, No. 2, pp. 342-353.
[23]Shi, Y., & Zeleny, M. (1975). The Set of all Nondominated Solutions in Linear Cases and a Multicriteria Simplex Method, Journal of Mathematical Analysis and Applications, Vol. 49, No. 2, pp. 430-468.
[24]Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing, Journal of network and computer application, Vol. 34, No.1, pp. 1-111.
[25]Sultan, N. (2010). Cloud computing for education: A new dawn? International Journal of Information Management, Vol. 30, No. 2, pp. 109-116.
[26]Svatesson, D., & Clarke, R. (2010). Privacy and consumer risks in cloud computing, Computer Law and Security Review, No. 26, Vol. 4, pp. 391-397.
[27]Tiwari, R. N., Dharmahr, S., & Rao, J. R. (1987). Fuzzy Goal Programming-An additive model, Fuzzy Sets and Systems, Vol. 24, No.1, pp.27-34.
[28]Truong, H. L., & Dustdar, S. (2010). Composable cost estimation and monitoring for computational applications in cloud computing environments, Procedia Computer Science, Vol. 1, No. 1, pp. 2175-2184.
[29]Yang, L., Jones, B, F., & Yang, S. H. (2007). A fuzzy multi-objective programming for optimization of fire station location through genetic algorithms, European Journal of Operational Research, Vol. 181, No, 2. pp. 903-915.
[30]Zimmermann, H. J. (1978). Fuzzy programming and linear programming with several objective functions, Fuzzy Sets and Systems, Vol. 1, No. 1, pp. 45-55.
會議論文:
[31]Lee, J. Y., Lee, J. W., Cheun, D. W., & Kim, S. D. (2009, December). A Quality Model for evaluating Software-as-a-Service in Cloud Computing, 7th, ACIS International Conference on Software Engineering Research, Management and Applications.
[32]Jin, K., Zhang, C., Balasubramaniam, P., & Nage, S. (2009). A Multiple Objective Optimization Model for Environmental Benign Process Planning, 16th, International Conference on Industrial Engineering and Engineering Management, pp. 869-873.
[33]Li, R., Tang, S., & Hu, X. (2010). Thinking the cloud computing in China, 2nd, International Conference on Information Management and Engineering (ICIME).
[34]Zang, S., Zhang, S., Chen, X., & Huo, X. (2010). Cloud Computing Research and Development Trend, 2nd, Inetnational Conference on Future Networks.
[35]Dillom, T. (2010). Cloud Computing: Issues and Challenges, 24th, IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 20-23.
[36]Li, X., Li, Y., Liu, T., Qiu, J., & Wang, F. (2009). The Method and Tool of cost analysis for cloud computing, IEEE International Conference on cloud computing.
[37]Ke, H., & Member, W. M. (2009, August). A Dependent-Chance Programming Model for Fuzzy Time-Cost Trade-off Problem, IEEE International Conference on Fuzzy System, pp. 20-24.
[38]Bao, D., Xiao, Z., Sun, Y., & Zhao, J. (2010, August). A Method and Framework for Quality of Cloud Service Measurement, 3rd, International Conference on Advanced Computer Theory and Engineering.
學位論文:
[39]張佳蓉(2009)。考慮模糊多目標之產品可靠度設計。博士論文,國立成功大學工業與資訊管理學系碩博士班,台南。[40]黃國峰(2008)。模糊多目標線性規劃應用於模具業委外之成本效能分析。碩士論文,屏東科技大學工業管理系所,屏東。[41]羅婉毓(2008) 。結合模糊多目標規劃及模糊品質機能展開之綠色產品設計模式。博士論文,國立成功大學工業與資訊管理學系碩博士班,台南。其他:
[42]Brodkin, J. (2008). Cloud computing hype spurs confusion, Gartner says, Computerworld.
[43]Catteddu, D., & Hogben, G. (2009). Cloud Computing-Benefit, risks and recommendations for information security, European Network and Information Security Agency, pp. 1-125.
[44]IBM,http://www.ibm.com/ibm/cloud/
[45]IDC各項趨勢分析資訊,http://brianmyth.blogspot.com/2010/05/blog-post_31.html
[46]MIC (2009)。雲端運算應用趨勢與我國商機研究,頁1-110。
[47]MIC (2010)。雲端運算服務資訊安全評估,頁1-5。
[48]Salefore.com,http://www.salesforce.com/tw/cloudcomputing/
[49]維基百科,http://zh.wikipedia.org/zh-tw/雲端運算。