1. Data breach statistics by year, industry, more - breach level index. http://breachlevelindex.com/ . Accessed 21 May 2017
2. Baracaldo, N., Palanisamy, B., Joshi, J.: G-sir: an insider attack resilient geo-social access control framework. IEEE Trans. Dependable Sec. Comput. (2017)
3. Beloglazov, A., Buyya, R., Lee, Y.C., Zomaya, A., et al.: A taxonomy and survey of energy-efficient data centers and cloud computing systems. Adv. Comput. 82(2), 47–111 (2011)
4. Bisong, A., Rahman, M., et al.: An overview of the security concerns in enterprise cloud computing. arXiv preprint (2011). arXiv:1101.5613
5. Bunn, M., Sagan, S.D.: A worst practices guide to insider threats: lessons from past mistakes. Lang. Magaz. 3, 1 (2017)