1. Foster, I., Zhao, Y., Raicu, I., Lu, S. Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, 2008. GCE ‘08. 2008, p. 1-10. doi:10.1109/GCE. 2008.4738445.
2. Iankoulova, I., Daneva, M. Cloud computing security requirements: A systematic review. In: Research Challenges in Information Science (RCIS), 2012 Sixth International Conference on. 2012, p. 1-7. doi:10.1109/RCIS. 2012.6240421.
3. Popovic, K., Hocenski, Z. Cloud computing security issues and challenges. In: MIPRO, 2010 Proceedings of the 33rd International Convention. 2010, p. 344-349.
4. Zhang, Q., Cheng, L., Boutaba, R. Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Applications. 2010; 1(1):7-18. URL: http://dx.doi.org/10.1007/s13174-010-0007-6. doi:10.1007/s13174-010-0007-6.
5. Us national institute of standards and technology. http://csrc.nist.gov/; 2013.