1. Mell P, Grance T (2011) The NIST definition of cloud computing. National Institute of Standards and Technology, U.S. Department of Commerce, Special Publication 800-145
2. Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson DA, Rabkin A, Stoica I, Zaharia M (2009) Above the clouds: a Berkeley view of cloud computing, Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley.
https://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html
3. Baghel S, Theng D (2016) Multilevel security model for cloud third-party authentication. In: Shetty N, Prasad N, Nalini N (eds) Emerging research in computing, information, communication and applications. Springer, Singapore
4. AlZain M, Pardede E, Soh B, Thom J (2012) Cloud computing security: from single to multi-clouds. In: 2012 45th Hawaii international conference on system science (HICSS), pp 5490–5499, Jan 2012
5. Athena J, Sumathy V (2017) Survey on public key cryptography scheme for securing data in cloud computing. Circ Syst 8:77–92