References
[1]. J.Staten, et al., (2008). "Is Cloud Computing Ready for
Enterprise?" Published in Forrester Research, March
7,2008.
[2]. Parks R., Harvey J. (2008). “Cloud Computing: What to
Ask When the Clouds Roll In”, Presentation to the ACC
Information Technology & Ecommerce Committee June
5, 2008.
[3]. P. Mell and T. Grance (2011), “The NIST definition of
cloud computing”, NIST special publication, Vol. 800, No.
145.
[4]. S. Roschke, et aI., (2007). “Intrusion Detection in the
Cloud ”, 8 IEEE International Conference on
Dependable, AutonomIc and Secure Computing,
Chengdu, China.
[5]. A. Singh and M. Shrivastava, (2012).“Overview of
attacks on cloud computing,” International Journal of
Engineering and Innovative Technology (IJEIT), Vol. 1, No.
4, pp.321-323.
[6]. http://www.mbaskool.com/business -articles/operations/5005-cloud-computing-a-betterwayto-do-it-.html CLOUD CCOMPUTING- A BETTER WAY TO
DO IT. April 24th, 2014.
[7]. http://www.dman.com/cloud-computing-multi- tenancy- and - application-security.html. Cloud Computing Security. April 20th ,2014.
[8]. Farzad Sabahi, (2011). “Cloud computing security
threats and responses”, IEEE, pp.245-249.
[9]. Jeff Beckham, (2011). “The Top 5 Security Risks of Cloud Computing”, CISCO BLOG, May 3.
[10]. http://resources.idgenterprise.com/original/AST- 0036145_G2A_demystifying_cloud_security.pdf. ForSecurity & Risk Professionals. April 20th, 2014.
[11]. http://www.networkworld.com/news/2008/070208-cloud.html. Gartner: Seven cloud computing security
risks. April 24th, 2014.
[12]. Krutz, Ronald L., and Russell Dean Vines (2010).
"Cloud Computing Security Architecture." Cloud Security:
A Comprehensive Guide to Secure Cloud Computing.
Indianapolis, IN: Wiley, pp. 179-80. Print.