1. Chunming Rong, Son T. Nguyen, Martin Gilje Jaatun, "Beyond lightning: A survey on security challenges in cloud computing" Computers and Electrical Engineering 39 (2013) 47--54
2. P. Mell and T. Grance, "The NIST Definition of Cloud Computing" in NIST Special Publication, pp. 800--145, Available from http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf, (2011).
3. H. Takabi, J. B. D. Joshi, and G.J. Ahn, "SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments" in Proc. of the 1st IEEE International Workshop Emerging Applications for Cloud Computing (CloudApp 2010), pp. 393--398, Seoul, South Korea, (2010).
4. Cloud Security Alliance, "Security Guidance for Critical Areas of Focus in Cloud Computing V3.0", pp. 136--156, Available from https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf, 2011.
5. Imad M. Abbadi, A framework for establishing trust in Cloud provenance, Int. J. Inf. Secur. (2013) 12:111--128,DOI 10.1007/s10207-012-0179-0