1. Brohi, S.N., Bamiah, M.A., Brohi, M.N., Kamran, R.: Identifying and analyzing security threats to Virtualized Cloud Computing Infrastructures. In: 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM), December 8-10, pp. 151–155 (2012) ISBN: 978-1-4673-4415-9
2. CIOTIMES. 云计算安全架构中的加密. TechTarget China (October 19, 2012),
http://www.ciotimes.com/cloud/cjs/72702.html
3. Han, S., Xing, J.: Ensuring data storage security through a novel third party auditor scheme in cloud computing. In: 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), September 15-17, pp. 264–268 (2011) ISBN: 978-1-61284-203-5
4. Brodkin J. : Gartner: Seven cloud-computing security risks. NetworkWorld (July 2, 2008),
http://www.networkworld.com/article/2281535/data-center/gartner--seven-cloud-computing-security-risks.html
5. Whitman, M.M., Mattord, H.J.: Principles of information security, 4th edn. Cengage Learning (January 1, 2011) ISBN: 978-1111138219