1. AWS. (2013). Amazon web services: Risk and compliance. Whitepaper.
http://media.amazonwebservices.com/AWS_Risk_and_Compliance_Whitepaper.pdf
. Accessed 22 Jan 2014.
2. Blum, D. (2009). Cloud computing security in the enterprise. Gartner research report.
3. Carpenter, M., Liston, T., & Skoudis, E. (2007). Hiding virtualization from attackers and malware. IEEE Security and Privacy, 5(3), 62–65.
4. CDW. (2012). Energy efficient IT report.
http://www.cdwnewsroom.com/2012-energy-efficient-it-report/
. Accessed 22 Jan 2014.
5. Chow, R., Gotlle, P., Jakobson, E., Staddon, J., Masuoka, R., & Molina, J. (2009). Controlling data in the cloud: Outsourcing computation without outsourcing control. Proceedings of the 2009 cloud computing workshop on cloud computing security.