1. [1] Furht, B. and Escalante, A.: Chapter 1: Cloud Computing Fundamentals, Handbook of Cloud Computing, Springer (2010).
2. [2] Archer, J., Boehme, A., Cullinane, D., Kurtz, P., Puhlmann, N. and Reavis, J.: Top Threats to Cloud Computing V 1.0, Cloud Security Alliance (2010).
3. [3] Takabi, H., Joshi, J.B.D. and Ahn, G.: Security and Privacy Challenges in Cloud Computing Environments, Proc. IEEE Security & Privacy, Vol.8, No.6, pp.24-31 (2010).
4. [4] Cloud Security Alliance: Cloud Computing Vulnerability Incidents: A Statistical Overview (2013), available from <https://cloudsecurityalliance.org/download/cloud-computing-vulnerability-incidents-a-statistical-overview/> (accessed 2014-06).
5. [5] Mell, P. and Grance, T.: The NIST Definition of Cloud Computing, National Institute of Standards and Technology (2011).