1. Acıicmez, O., Koc, C. K., & Seifert, J. P. (2007). Predicting secret keys via branch prediction. In Proceeding of RSA Conference (LNCS), (vol. 4377, pp. 225–242). Berlin: Springer.
2. Amazon, A. W. S. (2011). Public Data Sets on AWS. Retrieved November 15, 2011, from aws.amazon.com/publicdatasets
3. Amazon EC2. (2011). Amazon EC2 Pricing, Amazon: USA. Retrieved August 26, 2012, from http://aws.amazon.com/ec2/pricing
4. Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., & Konwinski, A. (2009). Above the Clouds: A Berkeley view of cloud computing. Retrieved March 10, 2011, from http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.pdf
5. Data access, integration, and management;M.Atkinson;The Grid: Blueprint for a New Computing Infrastructure,2004