[1]
|
M. Armbrust, A. Fox, R. Grith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, Vol. 53, No. 4, 2010, pp. 50-58. http://dx.doi.org/10.1145/1721654.1721672
|
[2]
|
A. M. Andrew, “Cloud Computing: Views on Cybersyn,” Kybernetes, Vol. 41, No. 9, 2012, pp. 1396-1399. http://dx.doi.org/10.1108/03684921211275450
|
[3]
|
S. Dhar, “From Outsourcing to Cloud Computing: Evolution of It Services,” Management Research Review, Vol. 35, No. 8, 2012, pp. 664-675. http://dx.doi.org/10.1108/01409171211247677
|
[4]
|
S. Subashini and V. Kavitha, “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” Journal of Network and Computer Applications, Vol. 34, No. 1, 2011, pp. 1-11. http://www.sciencedirect.com/science/article/pii/S1084804510001281 http://dx.doi.org/10.1016/j.jnca.2010.07.006
|
[5]
|
B. R. Kandukuri, V. R. Paturi and A. Rakshit, “Cloud Security Issues,” Proceedings of the 2009 IEEE International Conference on Services Computing, Washington DC, 21-25 September 2009, pp. 517-520. http://dx.doi.org/10.1109/SCC.2009.84
|
[6]
|
P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” Computer Security Division, IT Laboratory, National Institute of Standards and Technology, Gaithersburg, 2011. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
|
[7]
|
M. Jensen, J. Schwenk, N. Gruschka and L. Iacono, “On Technical Security Issues in Cloud Computing,” IEEE International Conference on Cloud Computing, Bangalore, 21-25 September 2009, pp. 109-116.
|
[8]
|
D. Zissis and D. Lekkas, “Addressing Cloud Computing Security Issues,” Future Generation Computer Systems, Vol. 28, No. 3, 2012, pp. 583-592. http://www.sciencedirect.com/science/article/pii/S0167739X10002554 http://dx.doi.org/10.1016/j.future.2010.12.006
|
[9]
|
F. Gens, “New IDC It Cloud Services Survey: Top Benefits and Challenges,” 2009. http://blogs.idc.com/ie/?p=730
|
[10]
|
C. Soghoian, “Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 era,” Journal on Telecommunications and High Technology Law, Vol. 8, No. 2, 2010, pp. 359-424.
|
[11]
|
J. Brodkin, “Gartner: Seven Cloud-Computing Security Risks,” InfoWorld, 2008. http://www.infoworld.com/d/security-central/gartner-seven-cloud-computing-security-risks-853
|
[12]
|
D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” International Conference on Computer Science and Electronics Engineering, Vol. 1, Hangzhou, 23-25 March 2012, pp. 647-651.
|
[13]
|
B. Grobauer, T. Walloschek and E. Stocker, “Understanding Cloud Computing Vulnerabilities,” IEEE Security Privacy, Vol. 9, No. 2, 2011, pp. 50-57. http://dx.doi.org/10.1109/MSP.2010.115
|
[14]
|
M. Almorsy, J. Grundy and I. Müller, “An Analysis of the Cloud Computing Security Problem,” Proceedings of the 2010 Asia Pacific Cloud Workshop, Australia, 30 November 2010.
|
[15]
|
N. Leavitt, “Is Cloud Computing Really Ready for Prime Time?” Computer, Vol. 42, No. 1, 2009, pp. 15-20. http://dx.doi.org/10.1109/MC.2009.20
|
[16]
|
K. Popovic and Z. Hocenski, “Cloud Computing Security Issues and Challenges,” Proceedings of the 33rd International Convention in MIPRO, 2010, pp. 344-349.
|
[17]
|
D. Jamil and H. Zaki, “Cloud Computing Security,” International Journal of Engineering Science and Technology, Vol. 3, No. 4, 2011, pp. 3478-3483.
|
[18]
|
C. Wang, Q. Wang, K. Ren and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” Proceedings IEEE in INFOCOM, San Diego, 14-19 March 2010, pp. 1-9.
|
[19]
|
A. Lenk, M. Klems, J. Nimis, S. Tai and T. Sandholm, “What’s Inside the Cloud? An Architectural Map of the Cloud Landscape,” Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, Washington DC, 23 May 2009, pp. 23-31. http://dx.doi.org/10.1109/CLOUD.2009.5071529
|
[20]
|
J. Shamsi, M. Khojaye and M. Qasmi, “Data-Intensive Cloud Computing: Requirements, Expectations, Challenges, and Solutions,” Journal of Grid Computing, Vol. 11, No. 2, 2013, pp. 281-310. http://dx.doi.org/10.1007/s10723-013-9255-6
|
[21]
|
S. Ramgovind, M. Elo and E. Smith, “The Management of Security in Cloud Computing,” Information Security for South Africa, Sandton, 2-4 August 2010, pp. 1-7.
|
[22]
|
C. Weinhardt, A. Anandasivam, B. Blau and J. Stosser, “Business Models in the Service World,” IT Professional, Vol. 11, No. 2, 2009, pp. 28-33. http://dx.doi.org/10.1109/MITP.2009.21
|
[23]
|
A. Aleem and C. R. Sprott, “Let Me in the Cloud: Analysis of the Benet and Risk Assessment of Cloud Platform,” Journal of Financial Crime, Vol. 20, No. 1, 2013, pp. 6-24. http://dx.doi.org/10.1108/13590791311287337
|
[24]
|
F. Gens, “IDC’s Public IT Cloud Services Forecast: New Numbers, Same Disruptive Story,” 2010. http://blogs.idc.com/ie/?p=922
|