1. Anthes, G., "Security in the cloud," Communications of the ACM, vol. 53, no. 11, 2010, pp. 16-18.
  2. Armbrust, M., Fox, O., Griffith, R., Joseph, A. D., Katz, Y., Konwinski, A., and Zaharia, M., "Above the clouds: a Berkeley view of cloud computing, 2009.
  3. Rittinghouse, J. W., and Ransome, J. F., Cloud computing: implementation, management, and security," CRC press.‏, 2009.
  4. ‎[4] Catteddu, D., "Cloud Computing: benefits, risks and recommendations for information security, in Web Application Security," Springer Berlin Heidelberg, pp. 17-17.
  5. "Craig Balding;" ITG2008 World Cloud Computing Summit, 2008.
  6. Gens, F., "New IDC IT Cloud Services Survey: Top Benefits and Challenges," IDC eXchange, 1 August 2015.
  7. Available: http://blogs.idc.com/ie/?p=730
  8. Okuhara, M., Shiozaki, T., and Suzuki, T., "Security architecture for cloud computing," Fujitsu Sci. Tech. J, vol. 46, no. 4, 2010, pp. 397-402.‏
  9. Sangroya, A., Kumar, S., Dhok, J., and Varma, V. "Towards analyzing data security risks in cloud computing environments,” In Information Systems, Technology and Management, Springer Berlin Heidelberg, 2010, pp. 255-265.