[1] Xiao, Z. and Xiao, Y. (2013) Security and Privacy in Cloud Computing. IEEE Communications Surveys & Tutorials, 15, 843-859.
[2] Cloud Security Alliance (2010) Top Threat to Cloud Computing.
https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
[3] Amazon: Amazon Glacier. http://aws.amazon.com/glacier/
[4] Quarks Lab (2013) iMessage Privacy. http://blog.quarkslab.com/imessage-privacy.html
[5] Mutch, J. (2010) How to Steal Data from the Cloud.
http://www.cloudbook.net/resources/stories/how-to-steal-data-from-the-cloud
[6] Yorozu, Y., Hirano, M., Oka, K. and Tagawa, Y. (1982) Electron Spectroscopy Studies on Magneto-Optical Media and Plastic Substrate Interface. IEEE Translation Journal on Magnetics in Japan, 2, 740-741.
[7] Amazon: Service Level Agreement. http://aws.amazon.com/ec2-sla/
[8] Kirchgaessner, S. (2013) Cloud Storage Carries Potent Security Risk.
http://www.ft.com/cms/s/0/4729ed7c-3722-11e3-9603-00144feab7de.html
[9] Lemos, R. (2012) Insecure API Implementations Threaten Cloud.
http://www.darkreading.com/cloud/insecure-api-implementations-threaten-cl/232900809
[10] Lemos, R. (2013) Vulnerable APIs Continue to Pose Threat to Cloud.
http://www.darkreading.com/services/vulnerable-apis-continue-to-pose-threat/240146453
[11] Porticor Cloud Security (2013) Did Snowden Compromise the Future of Cloud Security?
http://www.porticor.com/2013/07/cloud-security-snowden/
[12] Amazon: Amazon Web Services. http://aws.amazon.com
[13] SilverSky (2013) The Future of Cloud Computing and the Latest Security Threats.
https://www.silversky.com/blog/the-future-of-cloud-computing-and-the-latest-security-threats
[14] Columbia University (2012) Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud.
http://www.cs.columbia.edu/~angelos/Papers/2012/Fog_Computing_Position_Paper_WRIT_2012.pdf
[15] Amazon: Amazon Machine Image (AMI).
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/AMIs.html
[16] Amazon: Amazon EBS. http://aws.amazon.com/ebs/
[17] Amazon: Amazon EBS Product Details. http://aws.amazon.com/ebs/details/#snapshots
[18] Amazon: Amazon EC2 Instance Store.
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/InstanceStorage.html
[19] MailChimp (2014) About API Keys. http://kb.mailchimp.com/accounts/management/about-api-keys
[20] Janssen, C. Full-Disk Encryption (FDE).
http://www.techopedia.com/definition/13623/full-disk-encryption-fde
[21] Cover, R. (2010) Security Assertion Markup Language (SAML). http://xml.coverpages.org/saml.html
[22] United Sates Department of Veterans Affairs (2014) Keyed-Hash Message Authentication Code (HMAC). http://www.va.gov/trm/StandardPage.asp?tid=5296
[23] Goodin, D. (2009) Zeus Bot Found Using Amazon’s EC2 as C&C Server.
http://www.theregister.co.uk/2009/12/09/amazon_ec2_bot_control_channel/
[24] Nahorney, B. and Nicolas, F. (2010) Trojan.Zbot.
http://www.symantec.com/security_response/writeup.jsp?docid=2010-011016-3514-99
[25] Acunetix: Cross Site Scripting Attack. https://www.acunetix.com/websitesecurity/cross-site-scripting/
[26] Amazon: Multi-Factor Authentication. http://aws.amazon.com/iam/details/mfa/
[27] The Guardian: The NSA Files. http://www.theguardian.com/world/the-nsa-files
[28] SilverSky (2013) About Us. https://www.silversky.com/about-us