1. Leach, J.: The Rise of Service Oriented IT and the Birth of Infrastructure as a Service, March 20, 2008; 2 J. Heiser and M. Nicolett, Accessing the Security Risks of Cloud Computing, Gartner, Inc., Stamford, CT (2008)
2. Armbrust, M., Fox, A., Griffith, R., et al.: Above the Clouds: A Berkeley View of Cloud Computing. Unversity of California, Berkeley (2009)
3. Berger, S., Cáceres, R., Goldman, K.A., et al.: vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th USENIX Security Symposium, Vancouver, B.C (2006)
4. Scarlata, V., Rozas, C., Wiseman, M., et al.: TPM Virtualization: Building a General Framework. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, pp. 43–56. Vieweg+Teubner, Wiesbaden (2008)
5. Krautheim, F.J., Phatak, D.S.: LoBot: Locator Bot for Securing Cloud Compupting Environments. Submitted 2009 ACM Cloud Computing Security Workshop, Chicago, IL (2009)