1. Yandong, Z., Yongsheng, Z.: “Cloud computing and cloud security challenges”. In International Symposium on Information Technologies in Medicine and Education, vol. 2, pp. 1084–1088. IEEE, 2012.
2. Zhu, Y., Ma, D., Hu, C. J., Huang, D.: How to use attribute-based encryption to implement role-based access control in the cloud. In Proceedings of the 2013 international workshop on Security in cloud computing pp. 33–40, (2013)
3. Danzi’s, G.: “Introducing traffic analysis, attacks, defenses and public policy issues.” In: Proceedings of the Santa’s Crypto Get-together (2005)
4. Institute, I.S.: “DDoS attack categorization.” University of Southern California
5. Lam, L.K., Smith, B.: “Theft on the web: prevent session hijacking.” In: TechNet Magazine: Microsoft (2005)