Duncan, B. and Whittington, M. (2016a). Cloud cyber-
security: Empowering the audit trail. Int. J. Adv. Se-
cur., 9(3 & 4):169–183.
Duncan, B. and Whittington, M. (2016b). Creating an Im-
mutable Database for Secure Cloud Audit Trail and
System Logging. In Cloud Comput. 2017 8th Int.
Conf. Cloud Comput. GRIDs, Virtualization, pages
54–59, Athens, Greece. IARIA, ISBN: 978-1-61208-
529-6.
Fehling, C., Leymann, F., Retter, R., Schupeck, W., and Ar-
bitter, P. (2014). Cloud Computing Patterns: Funda-
mentals to Design, Build, and Manage Cloud Appli-
cations. Springer Publishing Company, Incorporated.
Fernandes, D. A. B., Soares, L. F. B., Gomes, J. V. P., Freire,
M. M., and In
´
acio, P. R. M. (2014). Security issues in
cloud environments: a survey. Int. Journal of Infor-
mation Security.
Fu, Q., Lou, J.-G., Wang, Y., and Li, J. (2009). Execution
Anomaly Detection in Distributed Systems through
Unstructured Log Analysis. In 2009 Ninth IEEE Int.
Conf. on Data Mining.
Grozev, N. and Buyya, R. (2014). Inter-Cloud architectures
and application brokering: taxonomy and survey. Soft-
ware: Practice and Experience, 44(3).
Gupta, S., Singhal, A., and Kapoor, A. (2016). A literature
survey on social engineering attacks: Phishing attack.
2016 International Conference on Computing, Com-
munication and Automation (ICCCA), pages 537–540.
Han, S., Shen, H., Kim, T., Krishnamurthy, A., Anderson,
T. E., and Wetherall, D. (2015). MetaSync: File Syn-
chronization Across Multiple Untrusted Storage Ser-
vices. In USENIX Annual Technical Conference.
Hindman, B., Konwinski, A., Zaharia, M., Ghodsi, A.,
Joseph, A. D., Katz, R. H., Shenker, S., and Stoica,
I. (2011). Mesos: A Platform for Fine-Grained Re-
source Sharing in the Data Center. In 8th USENIX
Conf. on Networked systems design and implementa-
tion (NSDI’11), volume 11.
Kratzke, N. (2017). Smuggling Multi-Cloud Support into
Cloud-native Applications using Elastic Container
Platforms. In Proc. of the 7th Int. Conf. on Cloud
Computing and Services Science (CLOSER 2017).
Kratzke, N. (2018a). About an Immune System Un-
derstanding for Cloud-native Applications - Biology
Inspired Thoughts to Immunize the Cloud Forensic
Trail. In Proc. of the 9th Int. Conf. on Cloud Comput-
ing, GRIDS, and Virtualization (CLOUD COMPUT-
ING 2018, Barcelona, Spain).
Kratzke, N. (2018b). About the complexity to transfer cloud
applications at runtime and how container platforms
can contribute? In Cloud Computing and Service Sci-
ences: 7th International Conference, CLOSER 2017,
Revised Selected Papers, Communications in Com-
puter and Information Science (CCIS). Springer In-
ternational Publishing. to be published.
Kratzke, N. and Peinl, R. (2016). ClouNS - a Cloud-Native
Application Reference Model for Enterprise Archi-
tects. In 2016 IEEE 20th Int. Enterprise Distributed
Object Computing Workshop (EDOCW).
Kratzke, N. and Quint, P.-C. (2015). About Automatic
Benchmarking of IaaS Cloud Service Providers for a
World of Container Clusters. Journal of Cloud Com-
puting Research, 1(1).
Kratzke, N. and Quint, P.-C. (2017). Understanding Cloud-
native Applications after 10 Years of Cloud Comput-
ing - A Systematic Mapping Study. Journal of Sys-
tems and Software, 126(April).
Krombholz, K., Hobel, H., Huber, M., and Weippl, E.
(2015). Advanced social engineering attacks. Jour-
nal of Information Security and Applications, 22.
Newman, S. (2015). Building Microservices. O’Reilly Me-
dia, Incorporated.
Petcu, D. and Vasilakos, A. V. (2014). Portability in clouds:
approaches and research opportunities. Scalable Com-
puting: Practice and Experience, 15(3).
Pulls, T. and Peeters, R. (2015). Balloon: A Forward-Secure
Append-Only Persistent Authenticated Data Structure.
Springer International Publishing, Cham.
Stine, M. (2015). Migrating to Cloud-Native Application
Architectures. O’Reilly.
Toosi, A. N., Calheiros, R. N., and Buyya, R. (2014). In-
terconnected Cloud Computing Environments. ACM
Computing Surveys, 47(1).
Wang, G., Koshy, J., Subramanian, S., Paramasivam, K.,
Zadeh, M., Narkhede, N., Rao, J., Kreps, J., and Stein,
J. (2015). Building a Replicated Logging System with
Apache Kafka. In Proc. of the VLDB Endowment, vol-
ume 8.
Wurzenberger, M., Skopik, F., Fiedler, R., and Kastner, W.
(2017). Applying High-Performance Bioinformatics
Tools for Outlier Detection in Log Data. In CYB-
CONF.
Zawoad, S., Dutta, A. K., and Hasan, R. (2016). To-
wards building forensics enabled cloud through secure
logging-as-a-service. IEEE Transactions on Depend-
able and Secure Computing, 13(2):148–162.
CLOSER 2018 - 8th International Conference on Cloud Computing and Services Science
472