| ش | ی | د | س | چ | پ | ج |
| 1 | 2 | 3 | ||||
| 4 | 5 | 6 | 7 | 8 | 9 | 10 |
| 11 | 12 | 13 | 14 | 15 | 16 | 17 |
| 18 | 19 | 20 | 21 | 22 | 23 | 24 |
| 25 | 26 | 27 | 28 | 29 | 30 | 31 |
Computer Standards & Interfaces 38 (2015) 44–50 0920-5489/© 2014 Elsevier B.V. All rights reserved.Contents lists available at ScienceDirectComputer Standards & Interfaces Scalable risk assessment method for cloud computing using gametheory (CCRAM)Evrim Furuncu, Ibrahim Sogukpinar a b s t r a c t Cloud computing is one of themost popular information processing concepts of today's ITworld. The security of thecloud computing is complicated because each servicemodel uses differen ...