1. Misuse cases: use cases with hostile intent
2. Strategies for developing policies and requirements for secure electronic commerce systems.;A. I.Anton;E-Commerce Security and Privacy,2000
3. Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., & Kowwinski, A. …Zaharia, M. (2009). Above the clouds: A Berkeley view of cloud computing (Tech. Rep. UCB/EECS-2009-28). Berkeley, CA: University of California, Berkeley.
4. BreakingPoint. (2010). Rethink firewall testing. Retrieved August 4, 2010, from http://www.google.com