1. The Treacherous 12 – Cloud Computing Top Threats in 2016,2016
2. ALERT LOGIC. Cloud Security Report, 2017. Available: https://www.alertlogic.com/assets/industry-reports/alertlogic-cloud-security-report-2017.pdf.
3. A lattice model of secure information flow;Denning;CACM,1976
4. Protecting privacy using the decentralized label model;Myers;ACM TOSEM,2000
5. CloudFence: data flow tracking as a cloud service;Pappas,2013