1. Chirag, M., Patel, D., et al.: A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing 63(2), 561–592 (2013). Springer
2. Salah, K., et al.: Using Cloud Computing to Implement a Security Overlay Network. Security & Privacy 11(1), 44–53 (2013). IEEE
3. Vangie, B.: (website visited April 2015).
http://www.webopedia.com/TERM/V/virtualization.html
4. National vulnerability database version 2.2.NIST (website visited mars 2015).
http://web.nvd.nist.gov/view/vuln/searchresults?query=virtual&search%_type=all&cves=on
5. Mariam, K.: A Methodology for Cloud Security Risks Management. Cloud Computing: Challenges, Limitations and R&D Solutions, 75–104 (2014). Springer