1. [ 1 ] Carroll M. van der Merwe A. and Kotze P. 2011. Secure cloud computing: Benefits risks and controls. 2011 Information Security for South Africa. (Aug. 2011). DOI:https://doi.org/10.1109/issa.2011.6027519. 10.1109/issa.2011.6027519 [1] Carroll M. van der Merwe A. and Kotze P. 2011. Secure cloud computing: Benefits risks and controls. 2011 Information Security for South Africa. (Aug. 2011). DOI:https://doi.org/10.1109/issa.2011.6027519.
2. [ 2 ] Catteddu , D. 2010 . Cloud Computing: Benefits, Risks and Recommendations for Information Security. Web Application Security. (2010), 17–17. DOI:https://doi.org/10.1007/978-3-642-16120-9_9. 10.1007/978-3-642-16120-9_9 [2] Catteddu, D. 2010. Cloud Computing: Benefits, Risks and Recommendations for Information Security. Web Application Security. (2010), 17–17. DOI:https://doi.org/10.1007/978-3-642-16120-9_9.
3. [ 3 ] Konstantinou , I. , Floros , E. and Koziris , N . 2012. Public vs private cloud usage costs . Proceedings of the 2nd International Workshop on Cloud Computing Platforms - CloudCP ’12 . ( 2012 ). DOI:https://doi.org/10.1145/2168697.2168700. 10.1145/2168697.2168700 [3] Konstantinou, I., Floros, E. and Koziris, N. 2012. Public vs private cloud usage costs. Proceedings of the 2nd International Workshop on Cloud Computing Platforms - CloudCP ’12. (2012). DOI:https://doi.org/10.1145/2168697.2168700.
4. Cloud Computing: Case Studies and Total Cost of Ownership
5. Security Issues: Public vs Private vs Hybrid Cloud Computing