1. Al-sabri, H.M., Al-saleem, S.M.: Building a cloud storage encryption (CSE) architecture for enhancing cloud security. IJCSI Int. J. Comput. Sci. 10(2), 259–266 (2013)
2. ASD: Top four mitigation strategies to protect your ICT system. Australian Signals Directorate (ASD) (2012). http://www.asd.gov.au/publications/protect/Top_4_Mitigations.pdf . Accessed 22 Aug 2014
3. ASD: Australian Government Information Security Manual Controls. Australian Signals Directorate (ASD), Australian Signals Directorate (2014a). http://www.asd.gov.au/publications/Information_Security_Manual_2014_Principles.pdf . Accessed 12 Oct 2014
4. ASD: Strategies to mitigate targeted cyber intrusions - mitigation details. Australian Signals Directorate (ASD). Australian Signals Directorate (2014b). www.asd.gov.au/publications/Mitigation_Strategies_2011.pdf . Accessed 16 Aug 2014
5. Baldwin, D.: The concept of security. Rev. Int. Stud. 23(01), 5–26 (1997)