1. Evaluating Risk Appetite: A Fundamental Process of Enterprise Risk Management;Barnes,2006
2. Cloud security assessment and identity management;Bhardwaj,2011
3. Carroll, M., der Merwe, A.V., Kotze, P., 2011. Secure cloud computing. In: Information Security South Africa (ISSA), Johannesburg, August 15–17, 2011, pp. 1–9.
4. Cloud Computing Strategies;Chorafas,2011
5. Security Guidance for Critical Areas of Focus in Cloud Computing;Cloud security alliance,2009