M. Armbrust, A. Fox, R. Grith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia, “A View of Cloud Computing,” Communications of the ACM, Vol. 53, No. 4, 2010, pp. 50-58.
 S. Subashini and V. Kavitha, “A Survey on Security Issues in Service Delivery Models of Cloud Computing,” Journal of Network and Computer Applications, Vol. 34, No. 1, 2011, pp. 1-11.
 B. R. Kandukuri, V. R. Paturi and A. Rakshit, “Cloud Security Issues,” Proceedings of the 2009 IEEE International Conference on Services Computing, Washington DC, 21-25 September 2009, pp. 517-520.
 P. Mell and T. Grance, “The NIST Definition of Cloud Computing,” Computer Security Division, IT Laboratory, National Institute of Standards and Technology, Gaithersburg, 2011.
 M. Jensen, J. Schwenk, N. Gruschka and L. Iacono, “On Technical Security Issues in Cloud Computing,” IEEE International Conference on Cloud Computing, Bangalore, 21-25 September 2009, pp. 109-116.
 D. Zissis and D. Lekkas, “Addressing Cloud Computing Security Issues,” Future Generation Computer Systems, Vol. 28, No. 3, 2012, pp. 583-592.
 D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” International Conference on Computer Science and Electronics Engineering, Vol. 1, Hangzhou, 23-25 March 2012, pp. 647-651.
 A. Lenk, M. Klems, J. Nimis, S. Tai and T. Sandholm, “What’s Inside the Cloud? An Architectural Map of the Cloud Landscape,” Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, Washington DC, 23 May 2009, pp. 23-31.
 J. Shamsi, M. Khojaye and M. Qasmi, “Data-Intensive Cloud Computing: Requirements, Expectations, Challenges, and Solutions,” Journal of Grid Computing, Vol. 11, No. 2, 2013, pp. 281-310.
 A. Aleem and C. R. Sprott, “Let Me in the Cloud: Analysis of the Benet and Risk Assessment of Cloud Platform,” Journal of Financial Crime, Vol. 20, No. 1, 2013, pp. 6-24.