1. Amazon web services: overview of security processes,2011
2. Amazon CloudWatch,2013
3. Towards constant bandwidth overhead integrity checking of untrusted data;Clarke,2005
4. Efficient tamper-evident data structures for untrusted servers;Crosby,2009
5. Forensic collection of electronic evidence from infrastructure-as-a-service cloud computing;Dykstra;Richmond Journal of Law and Technology,2012