1. Alhadeff J et al (2010) Requirements: privacy, governance and contractual options, pp 1–122, TAS3 Deliverable, WP6, D6.1, Version 3.0
http://cordis.europa.eu/docs/projects/cnect/7/216287/080/deliverables/002-TAS3D06p1Privacyre-quirementsv3p0.pdf
. Accessed May 10, 2019
2. Andrieux A et al (2007) Web Services Agreement Specification (WS-Agreement), Global Forum American Heritage Dictionary
https://www.ahdictionary.com/word/search.html?q=risk&submit.x=872&submit.y
=. Accessed May 10, 2019
3. Barnatt C (2010) A brief guide to cloud computing: an essential guide to the next computing revolution. Kindle Edition, s.l, p 11
4. Batre D et al (2007) Gaining Users’ Trust by Publishing Failure Probabilities. Security and Privacy in Communications Networks and the Workshops, SecureComm 2007. Proceedings of the Third International Conference on Security and Privacy in Communication Networks, Nice, p 193
5. Beckers K (2015) Pattern and security requirements: engineering-based establishment of security standards. Springer, Cham, p 457