1. European Network and Information Security Agency (ENISA) (2009) Cloud computing: benefits, risks and recommendations for information security.
http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment
. Accessed on July 2010
2. International Data Corporation (2010) IDC ranking of issues of cloud computing model.
http://blogs.idc.com/ie/?p=210
. Accessed on July 2010
3. Kandukuri BR, Paturi R, Rakshit A (2009) Cloud security issues. In: Proceedings of the (2009) IEEE international conference on services computing, pp 517–520
4. Chaves SAD, Westphall CB, Lamin FR (2010) SLA perspective in security management for cloud computing. In: Sixth international conference on networking and services, Cancun, Mexico, pp 212–217
5. National Institute of standards and technology (NIST) The federal information security management act (FISMA), U.S. Government Printing 2002, Washington.
http://csrc.nist.gov/drivers/documents/FISMA-final.pdf
. Accessed on Aug 2010