1. Alebrahim, A., Hatebur, D., Goeke, L.: Pattern-based and ISO 27001 compliant risk analysis for cloud systems. In: 2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), pp. 42–47, August 2014
2. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: a berkeley view of cloud computing. Technical report UCB/EECS-2009-28, EECS Department, University of California, Berkeley.
http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
3. Beckers, K., Schmidt, H., Kuster, J., Fassbender, S.: Pattern-based support for context establishment and asset identification of the ISO 27000 in the field of cloud computing. In: 2011 Sixth International Conference on Availability, Reliability and Security (ARES), pp. 327–333, August 2011
4. CARiSMA: Carisma framework, May 2015.
https://www-secse.cs.tu-dortmund.de/carisma/
5. Cloud Security Alliance: Security guidance for critical areas of focus in cloud computing v3.0 (2011).
https://downloads.cloudsecurityalliance.org/initiatives/guidance/csaguide.v3.0.pdf