References
1. Amazon Web Services. 2006. The AWS Home Page. [Online] Available from: http://aws.
amazon.com/.
2. Amazon Web Services. 2009. AWS Multi-Factor Authentication, [Online] Available from:
http://aws.amazon.com/mfa/.
3. Cloud Identity Summit. 2010. [Online] Available from:
http://www.cloudidentitysummit.com/.
4. Cloud Security Alliance (CSA). The CSA Home Page. [Online] Available from:
www.cloudsecurityalliance.org/.
5. Cloud Security Alliance. 2009. Security Guidance for Critical Areas of Focus in Cloud
Computing, v2.1. [Online] Available from: www.cloudsecurityalliance.org/csaguide.pdf.
6. Cloud Security Alliance, 2010. Top Threats to Cloud Computing, v1.0. [Online] Available
from: www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf.
7. Distributed Management Task Force, Inc., 1992. The DMTF Home Page. [Online]
Available from: http://www.dmtf.org/.
8. EMVCo, 2009. The EMVCo Home Page. [Online] Available from:
http://www.emvco.com/,
9. EvilPacket.net, 2009. Theft of a Rackspace Cloud API Key. [Online] Available from:
http://evilpacket.net/2009/jul/9/theft-rackspace-cloud-api-key/.
10. Garnaat, M. 2009. Managing Your AWS Credentials (Part 2). [Online] Available from:
http://www.elastician.com/2009/06/managing-your-aws-credentials-part-2.html.
11. Gemalto. 2006. .NET Card, [Online] Available from: http://www.gemalto.com/
products/dotnet_card/.
12. Jurgensen, T.M. and Guthery, S.B. 2002. Smart Cards – The Developer’s Toolkit. Prentice
Hall PTR, Upper Saddle River, NJ 07458.
13. Microsoft. 2010. Windows Azure Platform. [Online] Available from:
http://www.microsoft.com/windowsazure/.
14. M'Raihi, D. et al, 2005. HOTP: An HMAC-Based One-Time Password Algorithm. IETF
RFC 4226. [Online] Available from: http://www.ietf.org/rfc/rfc4226.txt.
15. Open Cloud Computing Interface. 2011. The OCCI Home Page. [Online] Available from:
http://occi-wg.org/.
16. Oracle. 2010. Oracle Cloud Resource Model API, version 1.0. [Online] Available from:
http://www.oracle.com/technetwork/topics/cloud/oracle-cloud-resource-model-api-154279.pdf.
17. Project Kenai. 2009. The Sun Cloud API. [Online] Available from:
http://kenai.com/projects/suncloudapis/pages/Home.
18. Rackspace. 2006. The Rackspace Cloud. [Online] Available from:
http://www.rackspacecloud.com/
19. Sachdeva, K., Lu, H.K. and Krishna, K. 2009. A Browser-Based Approach to Smart Card
Connectivity. IEEE Workshop on Web 2.0 Security and Privacy, Oakland, California, May 21.
20. SOAtothecloud.com, 2010. Cloud Security Podcast - The question of API Keys. [Online]
Available from: http://www.soatothecloud.com/2010/09/cloud-security-podcast-question-
of-api.html.
21. Swidler, S. 2009. How to Keep Your AWS Credentials on an EC2 Instance Securely.
[Online] Available from: http://shlomoswidler.com/2009/08/how-to-keep-your-aws-
credentials-on-ec2.html.
22. Terremark. 2011. Enterprise Cloud Computing from Terremark. [Online] Available from:
http://www.terremark.com/services/cloudcomputing.aspx.
23. Vordel. 2009. Cloud Service Broker. [Online] Available from:
http://www.vordel.com/products/cloud_service_broker/.
24. Witteman, M. 2002. Advances in Smartcard Security. Information Security Bulletin, July,
page 11-22.
38