1. AlertLogic. An empirical analysis of real world threats: State of cloud security report (2012),
http://www.alertlogic.com/resources/state-of-cloud-security-report/
2. Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors – a survey. Proceedings of the IEEE 94(2), 357–369 (2006)
3. Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the Art of Virtualization. In: 19th ACM Symposium on Operating Systems Principles (SOSP 2003). ACM (2003)
4. Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: 15th ACM Conference on Computer and Communications Security (CCS 2008). ACM (2008)
5. Berger, S., Cáceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vtpm: virtualizing the trusted platform module. In: 15th Conference on USENIX Security Symposium. USENIX (2006)