1. Security Attacks in Cloud Computing and Corresponding Defending Mechanisms
2. Nawaf Alhebaishi , LingyuWang, Sushil Jajodia , and Anoop Singhal . 2016 . Threat Modeling for Cloud Data Center Infrastructures. In International Symposium on Foundations and Practice of Security. Springer International Publishing, Québec City , Québec, Canada, 302--319. https://doi.org/10.1007/978--3--319--5 1966--1_20 10.1007/978--3--319--51966--1_20 Nawaf Alhebaishi, LingyuWang, Sushil Jajodia, and Anoop Singhal. 2016. Threat Modeling for Cloud Data Center Infrastructures. In International Symposium on Foundations and Practice of Security. Springer International Publishing, Québec City, Québec, Canada, 302--319. https://doi.org/10.1007/978--3--319--51966--1_20
3. Hype and heavy tails: A closer look at data breaches
4. Archana Ganapathi , Yanpei Chen , Armando Fox , Randy Katz , and David Patterson . 2010 . Statistics-driven Workload Modeling for the Cloud. In International Conference on Data Engineering Workshops. IEEE , Long Beach, CA, USA, 87--92. https://doi.org/10.1109/ICDEW. 2010.5452742 10.1109/ICDEW.2010.5452742 Archana Ganapathi, Yanpei Chen, Armando Fox, Randy Katz, and David Patterson. 2010. Statistics-driven Workload Modeling for the Cloud. In International Conference on Data Engineering Workshops. IEEE, Long Beach, CA, USA, 87--92. https://doi.org/10.1109/ICDEW.2010.5452742
5. Assurance of Security and Privacy Requirements for Cloud Deployment Models