1. Chen, J., Wang, Y., & Wang, X. (2012). On-Demand Security Architecture for Cloud Computing. Computer, 45(7), 73–78. https://doi.org/10.1109/MC.2012.120.
2. Tari, Z. (2014). Security and Privacy in Cloud Computing. IEEE Cloud Computing, 1(1), 54–57.
3. European Network and Information Security Agency [ENISA] 2009 Cloud Computing: Benefits, risks and recommendations for information security.
4. Grobauer, B., Walloschek, T., & Stocker, E. (2011). Understanding Cloud Computing Academy of Science Engineering and Technology 28, pp 51-56.
5. Amazon (2010) Amazon Web Services: Overview of Security Processes.