References
[1]. Moritz Borgmann, Tobias Hahn, Michael Herfert,
Thomas Kunz, Marcel Richter, Ursula Viebeg, and Sven
Vowé. (2012). “On the security of cloud storage
services”,
Fraunhofer Institute for Secure Information Technology-
SIT, Tech. Rep. SIT-TR-001.
[2]. Armando Fox, Rean Gri_th, A Joseph, R Katz, A
Konwinski, G Lee, D Patterson, A Rabkin, and I Stoica.
(2009). “Above the clouds: A berkeley view of cloud
computing”, Dept. Electrical Eng. and Comput. Sciences,
University of California, Berkeley, Rep. UCB/EECS, 28.
[3]. Iulia Ion, Niharika Sachdeva, Ponnurangam
Kumaraguru, and Srdjan .apkun. (2011). “Home is safer
than the cloud!: privacy concerns for consumer cloud
storage”, In Proceedings of the Seventh Symposium on
Usable Privacy and Security, page 13. ACM.
[4]. Harry Katzan Jr et al. (2011). “On the privacy
of cloud
computing”, International Journal of Management &
Information Systems (IJMIS), Vol. 14, No. 2.
[5]. William Jeremy Robison. (2009). “Free at what
cost:
Cloud computing privacy under the stored
communications act” The George town Law Journals,
Vol. 98, pp. 1196-1232.
[6]. Christopher Soghoian (2010). “Caught in the
cloud:
Privacy, encryption, and government back doors in the
web 2.0 era”, J. on Telecomm. & High Tech. L., Vol. 8, pp.
359.
[7]. Christopher Soghoian (2012). “The Spies We
Trust:
Third Party Service Providers And Law Enforcement
Surveillance”. Ph.D thesis, Indiana University.
[8]. Christopher Soghoian and Sid Stamm. (2012).
“Certi_ed lies: Detecting and defeating government
interception attacks against ssl (short paper)”. In Financial
Cryptography and Data Security, Vol. 7035, pp. 250-259,
Springer,19
[9]. Stephen S. Yau and Ho G. An (2010).
“Confidentiality
Protection in Cloud Computing Systems”, Int J Software
Informatics, Vol.4, No.4, pp. 35-1365.
[10]. T. Ristenpart, E. Tromer, H. Shacham, and S.
Savage,
(2009). “Hey, you, get off of my cloud: exploring
information leakage in third-party compute clouds,” Proc.
1 6 t h ACM Conference on Computer and
Communications Security, pp. 199-212.
[11]. B. D. Payne, M. Carbone, and W. Lee, (2007).
“Secure and Flexible Monitoring of Virtual Machines,” In
Proc. ACSAC'07, pp. 385-397.
[12]. Venkatesh, V. (2000). “Determinants of
percieved
ease of use: Integrating control, intrinsic motivation, and
emotion into the technology acceptance model”,
Information Systems Research, Vol. 11, No. 4, pp. 342-
365.
[13]. Igbaria, M., & Iivari, J. (1995). “The
effects of selfefficacy
on computer usage”, Omega, Vol. 23, No. 6, pp.
587-605.
[14]. Garbarino, E., & Johnson, M. S. (1999).
“The different
roles of satisfaction, trust and commitment in customer
relationships”, Journal of Marketing, Vol. 63, No. 1, pp. 70-
87
[15]. Brodkin, J. (2008). “Gartner: Seven cloud-
computing
security risks”, Retrieved September 23, 2009, from
Network World, from http://www.networkworld.com/news
/2008/070208-cloud.html
[16]. Gartner (2008). “Assessing the Security Risks
of Cloud
Computing ” , Retrieved December 5 , 2009 ,
http://www.networkworld.com/news
/2008/070208-cloud.html
http://www.gartner.com/DisplayDocument?id=685308
[17]. Spiekermann, S. and Cranor, L. F. (2009).
“Engineering Privacy”, IEEE Transactions on Software
Engineering, Vol. 35, No. 1, pp. 67-82.
[18]. Bardin, J., Callas, J., Chaput, S., Fusco, P.,
Gilbert, F. et al. (2009). “Security Guidance for Critical Areas of
Focus in Cloud Computing v2.1”, Retrieved January 28,
2010, from Cloud Security Alliance, from http://www.
cloudsecurityalliance.org/guidance/
[19]. Karat, C. and Blom, J. (2004). “Designing
personalized user experiences in e-Commerce”, Kluwer
Academic Publishers
[20]. Price, M. and Partners, A. (2008). “The
Paradox of Security in Virtual Environments”, Computer, Vol. 41, No.
11, pp. 22-28.
[21]. Vaughan-Nichols, S. (2008). “Virtualization
sparks security concerns”, Computer, Vol. 41, No. 8, pp. 13-15.