Anthes, G., "Security in the cloud," Communications of the ACM, vol. 53, no. 11, 2010, pp. 16-18.
Armbrust, M., Fox, O., Griffith, R., Joseph, A. D., Katz, Y., Konwinski, A., and Zaharia, M., "Above the clouds: a Berkeley view of cloud computing, 2009.
Rittinghouse, J. W., and Ransome, J. F., Cloud computing: implementation, management, and security," CRC press., 2009.
[4] Catteddu, D., "Cloud Computing: benefits, risks and recommendations for information security, in Web Application Security," Springer Berlin Heidelberg, pp. 17-17.
"Craig Balding;" ITG2008 World Cloud Computing Summit, 2008.
Gens, F., "New IDC IT Cloud Services Survey: Top Benefits and Challenges," IDC eXchange, 1 August 2015.
Available: http://blogs.idc.com/ie/?p=730
Okuhara, M., Shiozaki, T., and Suzuki, T., "Security architecture for cloud computing," Fujitsu Sci. Tech. J, vol. 46, no. 4, 2010, pp. 397-402.
Sangroya, A., Kumar, S., Dhok, J., and Varma, V. "Towards analyzing data security risks in cloud computing environments,” In Information Systems, Technology and Management, Springer Berlin Heidelberg, 2010, pp. 255-265.