1. Gartner Inc Gartner identifies the Top 10 strategic technologies for 2011.
2. Online. Available: http://www.gartner.com/it/page.jsp?id=1454221Accessed: 15- Jul-2011
3. Cloud Security Alliance (2011) Security guidance for critical areas of focus in CloudComputingV3.0.e
4. Rosado DG, Gómez R, Mellado D, Fernández-Medina E (2012) Security analysis in the migration to cloud environments. Future Internet 4(2):469-487
5. FarzadSabahi,”Cloud Computing Security Threats and Responses”, 27-29 May 2011 PP:245 - 249
6. ZhidongShen ,”The Security of Cloud Computing System enabled by Trusted Computing Technology”, 2nd International Conference on Signal Processing Systems (ICSPS) , 2010International School of Software, Wuhan University,
7. Jian Yang, Zhibin Chen,” Cloud computing Research and security issues” Published in: Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on ,10-12 Dec. 2010
8. Weili Huang,” New security based on cloud computing”, Educational Technology and Computer Science(ETCS), 2010 Second International work shop on Cloud computing(vol.3), pp 604-609
9. Xiao Zhang; Hong-tao Du; Jian-quan Chen; Yi Lin; Lei-jieZeng,”