1. Cloud Security Alliance.
www.cloudaudit.org
2. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Provable data possession at untrusted stores, in Proc. 14th ACM Conference on Computer and Communication Security (CCS) (2007)
3. K.D. Bowers, A. Juels, A. Oprea, HAIL: A high-availability and integrity layer for cloud storage, in Proc. 16th ACM Conference on Computer and Communication Security (CCS) (2009)
4. K.D. Bowers, M. van Dijk, A. Juels, A. Oprea, R. Rivest, Remote assessment of fault tolerance, in Proc. 18th ACM Conference on Computer and Communication Security (CCS) (2011)
5. D.Y. Chan, M.A. Vasarhelyi, Innovation and practice of continuous auditing. Int. J. Account. Inf. Syst.
12(2), 152–160 (2011)