5. Qian, L., Luo, Z., Du, Y., Guo, L.: Cloud Computing: An Overview. Proceedings of the 1st
International Conference on Cloud Computing 626-631 (2009)
6. Vaquero, L. M., Rodero-Merino, L., Caceres, J., Lindner, M.: A Break in the Clouds:
Towards a Cloud Definition. SIGCOMM Computer Communication Review 39, 50-55
(2009)
7. Mell, P., Grance, T.: The NIST Definition of Cloud Computing v15. National Institute of
Standards and Technology (NIST) (2009)
8. IDC: IDC IT Cloud Services Survey: Top Benefits and Challenges. (2009)
9. Jericho Forum: Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration.
(2009)
10. Cloud Security Alliance: Security Guidance for Critical Areas of Focus in Cloud
Computing V2.1. (2009)
11. Cloud Computing Use Case Discussion Group: Cloud Computing Use Cases White Paper
v4.0, http://cloudusecases.org/. (2010)
12. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud
computing. Journal of Network and Computer Applications 34, 1-11 (2011)
13. Sloan, K.: Security in a virtualised world. Network Security 15-18 (2009)
14. Sriram, I., Khajeh-Hosseini, A.: Research Agenda in Cloud Technologies. 1st ACM
Symposium on Cloud Computing (2010)
15. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Generation
Computer Systems In Press, Corrected Proof, (2011)
16. Yildiz, M., Abawajy, J., Ercan, T., Bernoth, A.: A Layered Security Approach for Cloud
Computing Infrastructure. Proceedings of the 10th International Symposium on Pervasive
Systems, Algorithms, and Networks 763-767 (2009)
17. Catteddu, D., Hogben, G.: Cloud Computing Security Risk Assessment. European Network
and Information Security Agency (ENISA) (2009)
18. Catteddu, D., Hogben, G.: Cloud Computing Information Assurance Framework. European
Network and Information Security Agency (ENISA) (2009)
19. ISACA: Cloud Computing: Business Benefits With Security, Governance and Assurance
Perspectives. (2009)
20. ISACA: Cloud Computing Management Audit/Assurance Program (2010)
21. Jericho Forum: Collaboration Oriented Architecture, http://www.opengroup.org/jericho/
publications.htm. (2008)
22. Cloud Security Alliance: Governance, Risk Management and Compliance Stack,
http://www.cloudsecurityalliance.org/grcstack.html. (2010)
23. Kandukuri, B. R., V, R. P., Rakshit, A.: Cloud Security Issues. Proceedings of the 2009
IEEE International Conference on Services Computing 517-520 (2009)
24. Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise
Perspective on Risks and Compliance. O'Reilly (2009)
25. Open Security Architecture: Cloud Computing Pattern,
http://www.opensecurityarchitecture.org/cms/library/patternlandscape/251-pattern-cloud-
computing. (2008)
26. Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.:
Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control.
Proceedings of the ACM Workshop on Cloud Computing Security 85-90 (2009)
27. Mell, P., Grance, T.: Effectively and Securely Using the Cloud Computing Paradigm v26.
National Institute of Standards and Technology (NIST) (2009)
28. ISO/IEC: ISO/IEC 27002:2005 Information technology - Security techniques - Code of
practice for information security management. (2007)
29. Ahmad, R., Janczewski, L.: Triangulation theory: An approach to mitigate Governance
risks in Clouds. 2nd IEEE International Conference on Cloud Computing Technology and
Science (2010)
12