1. Ahmad, M. (2010). Security risks of cloud computing and its emergence as 5th utility service. Information Security and Assurance. Communications in Computer and Information Science, 76, 209–219.
2. Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., & Konwinski, A.et al. (2009). Above the clouds: A Berkeley view of cloud computing. Retrieved 1 March, 2011, from http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf
3. Bayrak, E., Conley, J. P., & Wilkie, S. (2011). The economics of cloud computing, No 1118, Working Papers, Department of Economics, Vanderbilt University. Retrieved 1 March, 2012, from, http://EconPapers.repec.org/RePEc:van:wpaper:1118
4. Betcher, T.J. (2010). Cloud computing: Key IT-related risks and mitigation strategies for consideration by IT security practitioners. Retrieved 9 December, 2010, from http://www.academicroom.com/dissertation/cloud-computing-key-it-related-risks-and-mitigation-strategies-consideration-it-securit?discipline=385837
5. Bhardwaj, S., Jain, L., & Jain, S. (2010). Cloud computing: A Study of Infrastructure as a Service (IaaS). International Journal of Engineering and Information Technology, 2(1), 60–63.