1. Ken Presti, “Halfway Approach to Cloud Security Leaves Huge Channel Play”, May 03, 2013, pp.1, http://www.crn.com/news/cloud/240154180/halfway-approach-to-cloud-security-leaves-huge-channel-play.htm. [Accessed: 20-Jun-2013]
2. Alistair Barr, “Data mining puts cloud security back on agenda”, Jun 19, 2013, http://www.reuters.com/article/2013/06/20/us-summit-cloud-idUSBRE95J01720130620. [Accessed: 22-Jun- 2013]
3. Rajesh Piplode, Umesh Kumar Singh, “An Overview and Study of Security Issues & Challenges in Cloud Computing”, IJARCSSE, Vol. 2, Issue 9, September 2012, pp.115
4. CSA, “Security Guidance for Critical Areas of Focus in Cloud Computing V2.1”, Cloud Security Alliance, 2009, [Accessed: 22-Jun-2013] https://Cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf.
5. “Cloud computing: A new era of IT opportunity and challenges”. ZDNet. March 3rd, 2009. pp.261, [Accessed: 23-Jun-2013], http://blogs.zdnet.com/Hinchcliffe/?
6. Minqi Z; Rong Z; Wei X; Weining Q; Aoying Z, “Security and Privacy in Cloud Computing: A Survey”, Sixth international conference on Semantics Knowledge and Grid (SKG), Nov. 1-3 ,2010, pp. 105.