1. Julisch, K., Hall, M.: Security and Control in the Cloud. Information Security Journal: A Global Perspective 19(6), 299–309 (2010)
2. Balachandra, R.K., Ramakrishna, P.V., Rakshit, K.: Cloud Security Issues. In: IEEE International Conference on Services Computing, pp. 517–520 (2009)
3. Cheng, G., Jin, H., Zou, D., Zhang, X.: “Building Dynamic and Transparent Integrity Measurement and Protection for Virtualized Platform in Cloud Computing. Concurrency and Computation: Practice and Experience 22, 1893–1910 (2010)
4. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, L., Lee, G.: Above the clouds: A Berkeley View of Cloud Computing. University of California, Berkeley, Tech. Rep. USB-EECS-2009, vol. 28, pp. 23-29 (2009)
5. Zissis, D., Lekkas, D.: Addressing Cloud Computing Security Issues. Future Generation Computer System (2010) Article in Press, http://dx.doi.org/10.1016/j.future.2010.12.006