Sie sind auf Seite 1von 23

[1] ENISA, “A Security Analysis of Next Generation Web Standards,” Enisa, 2013.

[Online]. Available: http://www.enisa.europa.eu/.


[2] IBM, “IBM X-Force 2012 Mid-year Trend and Risk Report,” 2012.
[3] D. Vinod and S. Chandarasekaran, “Information Security Assurance Model for
Collaborating Business Processes,” in Proceedings of the 15th WSEAS, 2011, pp. 350–
357.
[4] D. L. Owen, T. Swift, and K. Hunt, “Questioning the role of stakeholder
engagement in social and ethical accounting, auditing and reporting,” Account.
Forum, vol. 25, no. No 3, pp. 264–282, 2001.
[5] R. Geambasu, J. P. John, S. D. Gribble, T. Kohno, and H. M. Levy, “Keypad,” in
Proceedings of the sixth conference on Computer systems - EuroSys ’11, 2011, p. 1.
[6] J. A. Hall and S. L. Liedtka, “The Sarbanes-Oxley Act: Implications for Large-
Scale IT Outsourcing,” Commun. ACM, vol. 50, no. 3, pp. 95–100, 2007.
[7] C. P. Skinner, “An International Law Response to Economic Cyber Espionage,”
Conn. Law Rev., vol. 46, no. 4, pp. 1165–1207, 2013.
[8] BIS, “Revised Government Buying Standards for Furniture Impact Assessment (IA)
Summary: Intervention and Options Summary: Analysis and Evidence Policy Option 1,”
London, 2013.
[9] W. Baker, M. Goudie, A. Hutton, D. C. Hylender, J. Miemantsverdriet, C. Novak,
D. Ostertag, M. Rosen, B. Sartiin, and P. Tippett, “2010 Data breach investigations
report: A study conducted by the Verizon RISK Team in cooperation with the United
States Secret Service . 2010 Data Breach Investigations Report,” 2010.
[10] G. Owen, “Automated forensic extraction of encryption keys using behavioral
analysis,” 2012.
[11] D. G. Baird and R. K. Rasmussen, “Law & Economics: Four (or Five) Easy Lessons
From Enron,” Vanderbilt Law Rev., vol. 55, no. 2, pp. 1–28, 2002.
[12] R. Gray, “Accounting and environmentalism: An exploration of the challenge of
gently accounting for accountability, transparency and sustainability,” Accounting,
Organ. Soc., vol. 17, no. 5, pp. 399–425, 1992.
[13] A. Beautement and D. Pym, “Structured Systems Economics for Security
Management,” in Weis, 2010, pp. 1–20.
[14] NSA, “Your Home Network Secure Host-Based Recommendations,” 2011.
[15] P. C. Van Oorschot, “System Security, Platform Security and Usability,” Proc.
fifth ACM Work. Scalable Trust. Comput., pp. 1–2, 2010.
[16] A. A. SHACKELFORD, SCOTT J. Proia and A. N. Martell, Brenton & CRAIG, “Toward
a Global Cybersecurity Standard of Care?: Exploring the Implications of the 2014
NIST Cybersecurity Framework on Shaping Reasonable National and International
Cybersecurity Practices,” Tex. Int. Law J., vol. 50, no. 2, pp. 303–353, 2015.
[17] J. Broberg, S. Venugopal, and R. Buyya, “Market-oriented Grids and Utility
Computing: The state-of-the-art and future directions,” J. Grid Comput., vol. 6,
no. 3, pp. 255–276, 2008.
[18] Kaspersky, “Global IT Security Risks,” 2011.
[19] A.-C. Orgerie, M. Dias de Assuncao, and L. Lefevre, “A Survey on Techniques
for Improving the Energy Efficiency of Large Scale Distributed Systems,” ACM
Comput. Surv., vol. 46, no. 4–47, pp. 1–35, 2013.
[20] Veracode, “Read Our Predictions for 2013 and Beyond State of Software Security
Report,” 2013.
[21] B. Duncan and M. Whittington, “Compliance with standards, assurance and
audit,” in Proceedings of the 7th International Conference on Security of
Information and Networks - SIN ’14, 2014, pp. 77–84.
[22] Kaspersky, “The ‘TeamSpy’ Story - Abusing TeamViewer in Cyberespionage
Campaigns,” 2013.
[23] F. S. Chapin, G. P. Kofinas, and C. Folke, Principles of ecosystem
stewardship: Resilience-based natural resource management in a changing world. New
York: Springer, 2009.
[24] C. Kavanagh and M. Carrieri, “Cyber Dialogue 2012 Briefs: Whither ‘Rules of
the Road’ for Cyberspace?,” in Cyberdialogue2012, 2012, pp. 1–18.
[25] P. Inglesant and M. A. Sasse, “The True Cost of Unusable Password Policies:
Password Use in the Wild,” in CHI 2010 - Security, 2010, pp. 383–392.
[26] A. Kantee, “The Rise and Fall of the Operating System,” Login:, pp. 6–9, 2015.
[27] Cisco, “Cisco 2010 Annual Security Report,” 2010.
[28] B. Thompson, S. Haber, W. G. Horne, T. Sander, and D. Yao, “Privacy-Preserving
Computation and Verification of Aggregate Queries on Outsourced Databases,” Lect.
Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes
Bioinformatics), vol. 5672 LNCS, no. August, pp. 185–201, 2009.
[29] R. E. Kasperson, O. Renn, P. Slovic, H. S. Brown, J. Emel, R. Goble, J. X.
Kasperson, and S. Ratick, “The Social Amplification of Risk: A Conceptual
Framework,” Risk Anal., vol. 8, no. 2, pp. 177–187, Jun. 1988.
[30] Z. Zheng and M. R. Lyu, “Selecting an Optimal Fault Tolerance Strategy for
Reliable Service-Oriented Systems with Local and Global Constraints,” IEEE Trans.
Comput., vol. 64, no. 1, pp. 219–232, 2015.
[31] B. Densham, “Three cyber-security strategies to mitigate the impact of a data
breach,” Netw. Secur., vol. 2015, no. 1, pp. 5–8, 2015.
[32] Symantec, “Internet Security Threat Report: 2011,” 2011.
[33] Verizon Business, “2011 Data Breach Investigations Report ( DBIR ),” 2011.
[34] Cisco, “Cisco 2011 Annual Security Report,” 2011.
[35] M. E. Hathaway and J. E. Savage, “Stewardship of Cyberspace Duties of Internet
Service Providers,” in Cyberdialogue2012, 2012, p. 24.
[36] Great Britain. Department for Business Innovation and Skills, “2014
Information Security Breaches Survey: Technical Report,” 2014.
[37] K. Goldman, R. Sailer, D. Pendarakis, and D. Srinivasan, “Scalable Integrity
Monitoring in Virtualized Environments,” Proc. ACM Conf. Comput. Commun. Secur.,
pp. 73–78, 2010.
[38] S. Salsano, N. Blefari-Melazzi, F. Lo Presti, G. Siracusano, and P. L. Ventre,
“Generalized Virtual Networking: an enabler for Service Centric Networking and
Network Function Virtualization,” in 2014 16th International Telecommunications
Network Strategy and Planning Symposium, Networks 2014, 2014, p. 7.
[39] M. T. Dlamini, J. H. P. Eloff, and M. M. Eloff, “Information security: The
moving target,” Comput. Secur., vol. 28, no. 3–4, pp. 189–198, May 2009.
[40] BIS, “2013 Information Security Breaches Survey,” London, 2013.
[41] H. T. T. Truong, C.-L. Ignat, and P. Molli, “Authenticating Operation-based
History in Collaborative Systems,” Proc. 17Th Acm Int. Conf. Support. Gr. Work, pp.
131–140, 2012.
[42] H. Susanto, M. N. Almunawar, and Y. C. Tuan, “Information Security Challenge
and Breaches: Novelty Approach on Measuring ISO 27001 Readiness Level,” Int. J.
Eng. Technol., vol. 2, no. 1, pp. 67–75, 2012.
[43] HM Government, “2015 Information Security,” London, 2015.
[44] Verizon, “2012 Data Breach Investigations Report,” 2012.
[45] W. Baker, M. Goudie, A. Hutton, D. Hylender, J. Niemantsverdriet, C. Novak, D.
Ostertag, C. Porter, M. Rosen, B. Sartin, P. Tippett, T. Bosschert, E. Brohm, C.
Chang, M. Dahn, R. Dormido, B. Van Erck, K. Evans, E. Gentry, J. Grim, C. Hill, A.
Kunsemiller, K. Lee, W. Lee, K. Long, R. Perelstein, E. Telemaque, D. Todd, Y.
Uzawa, J. A. Valentine, N. Villatte, M. Van Der Wel, P. Wright, T. Beeferman, C.
Dismukes, P. Goulding, and C. Neal, “2010 Data Breach Investigations Report,” 2010.
[46] Trend, “2012 Annual Security Roundup: Evolved Threats in a ‘Post-PC’ World,”
pp. 1–20, 2012.
[47] B. Pfaff, J. Pettit, T. Koponen, K. Amidon, M. Casado, and S. Shenker,
“Extending Networking into the Virtualization Layer,” in 8th ACM Workshop on Hot
Topics inNetworks (2009), 2009, p. 6.
[48] D. M. Thompson, D. B. Ligon, J. C. Patton, and M. Papeş, “Effects of life-
history requirements on the distribution of a threatened reptile,” Brussels, 2017.
[49] K. Beckers, S. Faßbender, M. Heisel, J.-C. Kuster, and H. Schmidt, “Supporting
the Development and Documentation of ISO 27001 Information Security Management
Systems through Security Requirements Engineering Approaches,” Eng. Secur. Softw.
Syst., no. 256980, pp. 14–21, 2012.
[50] International Group of Experts, Tallinn manual on the international law
applicable to cyber warfare. 2013.
[51] I. S. Survey, “Managing cyber risks in an interconnected world Key findings
from The State of Information Security Survey,” 2015.
[52] A. Dyck, A. Morse, L. Zingales, J. Donohue, J. Hartzell, J. Karpoff, A.
Metrick, and S. Rajgopal, “Who Blows the Whistle on Corporate Fraud?,” 2009.
[53] Cyberedge group, “2014 Cyberthreat Defense Report. North America & Europe,”
CyberEdge Gr., 2015.
[54] PWC, “Key findings from The Global State of Information Security ® Survey
2013,” 2013.
[55] A. A. Yavuz and P. Ning, “BAF: An Efficient Publicly Verifiable Secure Audit
Logging Scheme for Distributed Systems,” in Proceedings - Annual Computer Security
Applications Conference, ACSAC, 2009, no. ii, pp. 219–228.
[56] J. C. . J. . Coffee and A. A. . Berle, “The Future as History: The Prospects
for Global Convergence in Corporate Governance and its Implications,” Corp. Gov.,
vol. 7201, no. 212, pp. 1–141, 1998.
[57] L. Da Xu, S. Member, W. He, and S. Li, “Internet of Things in Industries : A
Survey Internet of Things in Industries : A Survey,” IEEE Trans. Ind. Informatics,
vol. 10, no. November, pp. 2233–2243, 2014.
[58] W. House, “Administration Strategy on Mitigating the Theft of U.S. Trade
Secrets,” Washington DC, 2013.
[59] PWC, “UK Information Security Breaches Survey - Technical Report 2012,”
London, 2012.
[60] S. Abel, “Uncertainty modeling: The computational Economists’ view on
Cyberwarfare,” Stud. Comput. Intell., vol. 563, pp. 267–278, 2015.
[61] Fujitsu, “Fujitsu Information Security Report: 2011,” 2011.
[62] Verizon, “2014 Data Breach Investigations Report,” 2014.
[63] Cisco2014, “Cisco 2014 annual security report,” 2014.
[64] H. Labs, “Building the Foundation for the Virtualized Infrastructure,” 2011.
[65] T. Baums and K. E. Scott, “Taking Shareholder Protection Seriously? Corporate
Governance in the United States and Germany,” Am. J. Comp. Law, vol. 53, no. 1, pp.
31–75, 2005.
[66] D. T. Hartgen, “Hubris or humility? Accuracy issues for the next 50 years of
travel demand modeling,” Transportation (Amst)., vol. 40, no. 6, pp. 1133–1157,
2013.
[67] M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker, DDoS
defense by offense, vol. 28, no. 1. 2010.
[68] W. W. Bratton, “Enron and the Dark Side of Shareholder Value,” Power, no. May,
pp. 1–79, 2002.
[69] T. Fresh, A. States, and G. C. Council, “Call for contributions,” 2016.
[70] C. Ioannidis, D. Pym, and J. Williams, “Sustainability in Information
Stewardship: Time Preferences, Externalities and Social Co-Ordination,” in Weis
2013, 2013, pp. 1–24.
[71] S. Marsh, P. Briggs, K. El-Khatib, B. Esfandiari, and J. A. Stewart, “Defining
and Investigating Device Comfort,” J. Inf. Process., vol. 19, no. 7, pp. 231–252,
2011.
[72] M. Vieira, H. Madeira, K. Sachs, and S. Kounev, “Resilience Benchmarking,”
Resil. Assess. Eval. Comput. Syst., pp. 283–301, 2012.
[73] J. Singh, J. Bacon, and D. Eyers, “Policy Enforcement Within Emerging
Distributed, Event-based Systems,” Proc. 8th ACM Int. Conf. Distrib. Event-Based
Syst. - DEBS ’14, pp. 246–255, 2014.
[74] D. Larson and V. Chang, “A Review and Future Direction of Agile, Business
Intelligence, Analytics and Data Science,” Int. J. Inf. Manage., pp. 1–25, 2016.
[75] C. Kuner, “Regulation of Transborder Data Flows under Data Protection and
Privacy Law: Past, Present, and Future,” Leg. Stud., no. 16, pp. 1–90, 2010.
[76] R. S. Gynther, “Accounting Concepts and Behavioral Hypotheses,” Account. Rev.,
vol. 42, no. 2, pp. 274–290, 1967.
[77] V. Chang, R. Newman, R. J. Walters, and G. B. Wills, “Review of Economic
Bubbles,” 2014.
[78] I. Standards, P. W. Item, N. Proposal, W. Draft, C. Draft, F. C. Draft, D. I.
Standard, F. Draft, D. I. Standard, I. Standard, I. E. C. Jtc, and R. Iso, “ISO
27000 Series of Standards :,” 2009.
[79] T. Vase, “Advantages of Docker,” University of Jyväskylä, 2015.
[80] Verizon, “2013 Data Breach Investigation Report: A study conducted by the
Verizon RISK Team in cooperation with the United States Secret Service and Others,”
2013.
[81] J. Singh and J. M. Bacon, “On middleware for emerging health services,” J.
Internet Serv. Appl., vol. 5, no. 1, p. 6, 2014.
[82] B. Burns, B. Grant, D. Oppenheimer, E. Brewer, and J. Wilkes, “Lessons learned
from three container- management systems over a decade,” Acmqueue, p. 24, 2016.
[83] H. S. B. Herath and T. C. Herath, “IT security auditing: A performance
evaluation decision model,” Decis. Support Syst., vol. 57, pp. 54–63, Jan. 2014.
[84] I. Bojanova, G. Hurlburt, and J. Voas, “Imagineering an internet of anything,”
Computer (Long. Beach. Calif)., vol. 47, no. 6, pp. 72–77, 2014.
[85] A. Calder, “It Governance: The Way Ahead,” in Governance An International
Journal Of Policy And Administration, 2009, no. May, pp. 1–16.
[86] Verizon, “Verizon Security Breach Report 2017,” 2017.
[87] Kaspersky, “Global IT Security Risks: 2012,” 2012.
[88] Lloyds, “Managing digital risk Trends, issues and implications for business,”
2010.
[89] S. L. Reed, “Bitcoin Cooperative Proof of Stake,” pp. 1–16, 2014.
[90] A. Alusi, R. G. Eccles, A. C. Edmondson, and T. Zuzul, “Sustainable Cities:
Oxymoron or the Shape of the Future?,” 2011.
[91] K. E. Boulding, “General Systems Theory - The Skeleton of Scienceienc,”
Manage. Sci., vol. 2, no. 3, pp. 197–208, 1956.
[92] Trend, “The Future of Threats and Threat Technologies How the Landscape Is
Changing,” 2010.
[93] B. Watkins, “The Impact of Cyber Attacks on the Private Sector,” 2014.
[94] J. Singh, T. F. J. M. Pasquier, and J. Bacon, “Securing tags to control
information flows within the Internet of Things,” 2015 Int. Conf. Recent Adv.
Internet Things, RIoT 2015, 2015.
[95] B. Krekel, P. Adams, and G. Bakos, “Occupying the Information High Ground:
Chinese Capabilities for Computer Network Operations and Cyber Espionage,” 2014.
[96] W. Vogels, “Eventually Consistent,” Queue, vol. 6, no. 6, p. 14, 2008.
[97] D. E. Porter, S. Boyd-Wickizer, J. Howell, R. Olinsky, and G. C. Hunt,
“Rethinking the library OS from the top down,” in ACM SIGPLAN Notices, 2011, vol.
46, no. 3, pp. 291–304.
[98] P. M. Vasudev, “Corporate Governance at Nortel – Revisiting Board Functions,”
Ssrn, pp. 1–42, 2014.
[99] CESG, “Executive Companion - 10 Steps to Cyber Security,” pp. 1–20, 2012.
[100] A. Verma, L. Pedrosa, M. Korupolu, D. Oppenheimer, E. Tune, and J. Wilkes,
“Large-scale cluster management at Google with Borg,” Proc. Tenth Eur. Conf.
Comput. Syst. - EuroSys ’15, pp. 1–17, 2015.
[101] C. Wysopal, “State of Software Security Report,” 2011.
[102] J. Rothschild, “Protecting the Digital Consumer : The Limits of Cyberspace
Utopianism,” Control, pp. 1–106, 1997.
[103] T. Esposito, R. Mauro, F. Russo, and G. Dell’Acqua, “Speed prediction models
for sustainable road safety management,” in Procedia - Social and Behavioral
Sciences, 2011, vol. 20, no. December, pp. 568–576.
[104] H. Cavusoglu, B. Mishra, and S. Raghunathan, “The Effect of Internet Security
Breach Announcements on Market Value: Capital Market Reactions for Breached Firms
and Internet Security Developers,” Int. J. Electron. Commer., vol. 9, no. 1, pp.
69–104, 2004.
[105] A. Ahmad, S. B. Maynard, and S. Park, “Information security strategies:
Towards an organizational multi-stage perspective,” J. Intell. Manuf., vol. 25, no.
2, pp. 357–370, 2014.
[106] S. P. Kaluvuri, H. Koshutanski, F. Di Cerbo, and A. Mana, “Security Assurance
of Services through Digital Security Certificate,” in Proceedings - IEEE 20th
International Conference on Web Services, ICWS 2013, 2013, pp. 539–546.
[107] G. O. Karame, A. Francillon, and S. Capkun, “Pay as you Browse:
Microcomputations as Micropayments in Web-based Services,” in WWW 2011 - I Can,
2011, pp. 307–316.
[108] D. Marcus and R. Sherstobitoff, “Dissecting Operation High Roller,” White
Pap. McAfee, vol. 0, pp. 1–20, 2012.
[109] ONCIX, “October 2011,” Oct. 2011.
[110] Cisco, “Cisco 2011 Annual Security Report,” 2011.
[111] H. W. Gottinger, “Internet Economics of Distributed Systems,” in Society for
Science and Education, 2015, vol. 2, no. 6, pp. 55–70.
[112] PWC, “Information Security Breaches Survey 2010 Technical Report,” pp. 1–22,
2010.
[113] M. Stamatelatos and H. Dezfuli, “Probabilistic Risk Assessment Procedures
Guide for NASA Managers and Practitioners,” 2002.
[114] B. Born and J. Pfeifer, “Policy risk and the business cycle,” J. Monet.
Econ., vol. 68, pp. 68–85, 2014.
[115] E. Bugnion, S. Devine, M. Rosenblum, J. Sugerman, and E. Y. Wang, “Bringing
Virtualization to the x86 Architecture with the Original VMware Workstation,” ACM
Trans. Comput. Syst. ACM Ref. Format Bugnion, ACM Trans. Comput. Syst, vol. 30, no.
12, p. 51, 2012.
[116] T. F. J. M. Pasquier, J. Bacon, and B. Shand, “FlowR: Aspect Oriented
Programming for Information Flow Control in Ruby,” Proc. 13th …, pp. 1–12, 2014.
[117] Cabinet Office, “The UK cyber security strategy,” 2016.
[118] P. G. Neumann, “Risks to the public,” ACM SIGSOFT Softw. Eng. Notes, vol. 34,
no. 3, p. 16, Mar. 2009.
[119] T. Pasquier, B. Shand, and J. Bacon, “Information Flow Control for a Medical
Records Web Portal,” Cl.Cam.Ac.Uk, pp. 1–8, 2013.
[120] S. Nabi and M. N. A. Khan, “An Analysis of Application Level Security in
Service Oriented Architecture,” Int. J. Mod. Educ. Comput. Sci., vol. 6, no. 2, pp.
27–32, 2014.
[121] C. Ioannidis, D. Pym, and J. Williams, “Fixed Costs, Investment Rigidities,
and Risk Aversion in Information Security: A Utility-theoretic Approach,” Work.
Econ. Inf. Secur., pp. 1–16, 2011.
[122] N. Bohm, I. Brown, and B. Gladman, “Electronic Commerce: Who Carries the Risk
of Fraud?,” J. Information, Law Technol., no. February, pp. 1–43, 2000.
[123] A. D. Brucker, I. Hang, G. Lückemeyer, and R. Ruparel, “SecureBPMN: Modeling
and Enforcing Access Control Requirements in Business Processes,” in Proceedings of
the 17th ACM symposium on Access Control Models and Technologies - SACMAT ’12,
2012, p. 123.
[124] Trustwave, “2012 Global Security Report,” 2012.
[125] Trendlabs, “2013 Annual Security Roundup,” pp. 1–34, 2013.
[126] OMG, “Object Management Group,” Context, 2003. [Online]. Available:
http://www.cloud-council.org/.
[127] I. Technologies, “The MIPS Architecture and Virtualization,” 2016. [Online].
Available: https://imagination-technologies-cloudfront-
assets.s3.amazonaws.com/mips-downloads/m51xx/The-MIPS-architecture-and-
virtualization-for-web-download.pdf. [Accessed: 01-Jan-2016].
[128] FedRamp, “FedRamp,” The Federal Risk and Authorization Management Program,
2014. [Online]. Available: http://cloud.cio.gov/fedramp.
[129] B. Snaith, M. Hardy, and A. Walker, “Emergency ultrasound in the prehospital
setting: the impact of environment on examination outcomes,” Gaithersburg, MD,
2011.
[130] K. Wilhoit, “Who’s Really Attacking Your ICS Equipment?,” 2013.
[131] C. Soghoian, “The Law Enforcement Surveillance Reporting Gap,” Soc. Sci. Res.
Netw., pp. 1–26, 2011.
[132] O. Tene, “Privacy: The New Generations,” Int. Data Priv. Law, vol. 1, no. 1,
pp. 15–27, 2011.
[133] M. Felici, “Cyber Security and Privacy: Trust in the Digital World and Cyber
Security and Privacy EU Forum 2013 Brussels, Belgium, April 18-19, 2013 Revised
Selected Papers,” in Communications in Computer and Information Science, vol. 182
CCIS, Springer International Publishing, 2013, pp. 77–88.
[134] O. Data, “Open Data Center Alliance Usage: Service Catalog,” pp. 1–16, 2011.
[135] Trustwave, “Dear reader,” 1960.
[136] Cisco, “2013 Cisco Annual Security Report,” 2013.
[137] A. Madhavapeddy and D. J. Scott, “Unikernels: Rise of the Virtual Library
Operating System,” Commun. ACM, vol. 57, no. 1, pp. 61–69, 2014.
[138] CAMM, “Common Assurance Maturity Model,” 2010.
[139] J. Gubbi, R. Buyya, and S. Marusic, “1207.0203,” Futur. Gener. Comput. Syst.,
vol. 29, no. 1, pp. 1–19, 2013.
[140] CAMM, “Common Assurance Maturity Model,” 2011.
[141] Sophos, “Security Threat Report 2013,” 2013.
[142] B. Duncan, M. Whittington, and V. Chang, “Enterprise Security: Why Do We Make
It So Difficult?,” in 33rd Euro-Asia Management Studies Association (EAMSA) Annual
Conference, 2016, no. October, pp. 1–6.
[143] M. Suby, “The 2013 (ISC) 2 Global Information Security Workforce Study,” vol.
2013, pp. 1–28, 2013.
[144] Fujitsu, “Information Security Report 2012,” 2010.
[145] Trend, “A Look Back at 2011,” 2011.
[146] M. Kandias, N. Virvilis, and D. Gritzalis, “Critical Information
Infrastructure Security,” in Critical Information Infrastructure Security, vol.
6983, 2013, pp. 93–103.
[147] OASIS, “Organization for the Advancement of Structured Information
Standards,” 2014. [Online]. Available: https://www.oasis-open.org/standards.
[148] S. Parkin, A. van Moorsel, P. Inglesant, and M. A. Sasse, “A stealth approach
to usable security,” Proc. 2010 Work. New Secur. Paradig. - NSPW ’10, p. 33, 2010.
[149] F. J. De Graaf and H. Velthuijsen, “Network Governance for Dealing with IT-
enabled Interorganizational Cooperation,” Groningen, The Netherlands, 2011.
[150] Trustwave, “2016 Trustwave Global Security Report,” Chicago, 2016.
[151] D. Zhao, K. Burlingame, C. Debains, P. Alvarez-Tabio, and I. Raicu, “Towards
High-Performance and Cost-Effective Distributed Storage Systems with Information
Dispersal Algorithms,” in 2013 IEEE International Conference on Cluster Computing
(CLUSTER), 2013, pp. 1–5.
[152] I. Foster, “Computing Outside the Box,” Proc. 23rd Int. Conf. Conf.
Supercomput. - ICS ’09, p. 3, 2009.
[153] O. Data, “Open Data Center Alliance Usage: Standard Units of Measure for
IAAS,” 2011.
[154] Y. Zhu, H. Hu, G. J. Ahn, and M. Yu, “Cooperative provable data possession
for integrity verification in multicloud storage,” in IEEE Transactions on Parallel
and Distributed Systems, 2012, vol. 23, no. 12, pp. 2231–2244.
[155] Trustwave, “Executive summary,” pp. 1–4, 2013.
[156] ISO, “International Standard ISO/IEC 27001 Information Technology - Security
Techniques - Information Security Management Systems - Requirements,” Geneva,
Switzerland, 2013.
[157] P. Dunleavy and H. Margetts, “The Second Wave of Digital Era Governance,” Am.
Polit. Sci. Assoc. Conf., pp. 1–32, 2010.
[158] A. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa, “DepSky,” in
Proceedings of the sixth conference on Computer systems - EuroSys ’11, 2011, p. 31.
[159] O. Alliance, “Open Data Center Alliance Usage: Carbon Footprint Values,”
2011.
[160] Z. Hao, S. Zhong, and N. Yu, “A Privacy-Preserving Remote Data Integrity
Checking Protocol with Data Dynamics and Public Verifiability,” IEEE Trans. Knowl.
Data Eng., vol. 23, no. 9, pp. 1432–1437, 2011.
[161] MirageOS, “MirageOS,” 2016. [Online]. Available: https://mirage.io/.
[Accessed: 24-Feb-2016].
[162] O. D. C. Alliance, “Open Data Center Alliance Usage: Security Monitoring,”
pp. 1–9, 2011.
[163] R. C. Picker, “Online Advertising, Identity and Privacy,” Identity, vol. 475,
no. June, pp. 1–49, 2009.
[164] C. Steinfield, M. L. Markus, and R. T. Wigand, “Through a Glass Clearly:
Standards, Architecture, and Process Transparency in Global Supply Chains,” J.
Manag. Inf. Syst., vol. 28, no. 2, pp. 75–108, 2011.
[165] C. Guo, G. Lu, H. J. Wang, S. Yang, C. Kong, P. Sun, W. Wu, and Y. Zhang,
“SecondNet: A Data Center Network Virtualization Architecture with Bandwidth
Guarantees,” in Proceedings of the 6th International COnference (2010), 2010, p.
12.
[166] A. Kivity, D. Laor, G. Costa, P. Enberg, N. Har’El, D. Marti, and V.
Zolotarov, “OSv—Optimizing the Operating System for Virtual Machines,” Proc. 2014
USENIX Annu. Tech. Conf., pp. 61–72, 2014.
[167] R. Ramesh, A. Y. Du, S. Das, and R. D. Gopal, “Risk Hedging in Storage Grid
Markets: Do Options Add Value to Forwards?,” Management, vol. 2, no. 2, pp. 1–23,
2011.
[168] N. Husted, V. Garg, and J. Camp, “Organized Digital Crime: The Smuggling
Theory Approach (a short paper),” Bloomington, 2010.
[169] M. Hammock, “A Review of the Economics of Information Security Literature,”
Available at SSRN 1625853, 2010. [Online]. Available:
http://ssrn.com/abstract=1625853.
[170] O. D. C. Alliance, “Open Data Center Alliance Usage: Regulatory Framework,”
pp. 1–25, 2011.
[171] S. Sankh and V. Priya, “Survey of Approaches to Improve Inter Virtual Machine
Communication Efficiency on Xen Platform,” Int. Adv. Res. J. Sci. Eng. Technol.,
vol. 2, no. 3, pp. 64–67, 2015.
[172] A. Lefray, “Security for Virtualized Distributed Systems: from Modelization
to Deployment,” Ecole Normale Superieure de Lyon, 2015.
[173] O. Data, “Open Data Center Alliance Usage : Virtual Machine ( VM )
Interoperability,” no. Vm, pp. 1–10, 2011.
[174] G. Wang and T. S. E. Ng, “The Impact of Virtualization on Network Performance
of Amazon EC2 Data Center,” in Proceedings - IEEE INFOCOM, 2010, p. 9.
[175] O. D. C. Alliance, “Open Data Center Alliance Usage: Provider Security
Assurance,” pp. 1–14, 2011.
[176] A. Y. Du, S. Das, R. D. Gopal, and R. Ramesh, “Risk Hedging in Storage Grid
Markets: Do Options Add Value to Forwards?,” ACM Trans. Manag. Inf. Syst., vol. 2,
no. 2, pp. 1–23, 2011.
[177] M. Mattetti, A. Shulman-Peleg, Y. Allouche, A. Corradi, S. Dolev, and L.
Foschini, “Securing the infrastructure and the workloads of linux containers,” 2015
IEEE Conf. Commun. NetworkSecurity, CNS 2015, no. September, pp. 559–567, 2015.
[178] K. Bernsmed and S. Fischer-Hübner, “Secure IT Systems: 19th Nordic
Conference, NordSec 2014 Tromsø, Norway, October 15-17, 2014 Proceedings,” Lect.
Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes
Bioinformatics), vol. 8788, pp. 3–24, 2014.
[179] D. S. Evans and R. Schmalensee, “Innovation in Payments,” in Moving money:
the future of consumer payments., Brookings Institution Press, 2008, pp. 1–46.
[180] O. D. C. Alliance, “Open Data Center Alliance Usage: Input/Output (IO)
Controls,” 2011.
[181] W. Hurst, N. Shone, A. El Rhalibi, A. Happe, B. Kotze, and B. Duncan,
“Advancing the Micro-CI Testbed for IoT Cyber-Security Research and Education,” in
Cloud Computing 2017: The Eighth International Conference on Cloud Computing,
GRIDs, and Virtualization, 2017, pp. 1–6.
[182] A. Bratterud and H. Haugerud, “Maximizing hypervisor scalability using
minimal virtual machines,” in Cloud Computing Technology and Science (CloudCom),
2013 IEEE 5th International Conference on, 2013, vol. 1, pp. 218–223.
[183] C. C. V, “Security research alliance to promote network security,” 1999.
[184] R. Dua, A. R. Raja, and D. Kakadia, “Virtualization vs containerization to
support PaaS,” in Proceedings - 2014 IEEE International Conference on Cloud
Engineering, IC2E 2014, 2014.
[185] Z. Ou, H. Zhuang, J. K. Nurminen, A. Yla-Jaaski, and P. Hui, “Exploiting
Hardware Heterogeneity within the Same Instance Type of Amazon EC2,” in Proceedings
of the 4th USENIX conference on Hot Topics in Cloud Ccomputing, 2012, pp. 4–8.
[186] M. Godse and S. Mulik, “An Approach for Selecting Software-as-a-Service
(SaaS) Product Manish,” CLOUD 2009 - 2009 IEEE Int. Conf. Cloud Comput., pp. 155–
158, 2009.
[187] A. R. Reyes Zuniga and M. G. Jaatun, “Passing the Buck: Outsourcing Incident
Response Management,” in 2015 IEEE 7th International Conference on Cloud Computing
Technology and Science (CloudCom), 2015, pp. 503–508.
[188] J. Singh, T. F. J. M. Pasquier, J. Bacon, and D. Eyers, “Integrating
messaging middleware and Information Flow Control,” Proc. - 2015 IEEE Int. Conf.
Cloud Eng. IC2E 2015, pp. 54–59, 2015.
[189] T. F. J. M. Pasquier, J. Singh, and J. Bacon, “Information Flow Control for
Strong Protection with Flexible Sharing in PaaS,” Proc. - 2015 IEEE Int. Conf.
Cloud Eng. IC2E 2015, pp. 279–282, 2015.
[190] B. Duncan, A. Happe, and A. Bratterud, “Enterprise IoT Security and
Scalability: How Unikernels can Improve the Status Quo,” in 9th IEEE/ACM
International Conference on Utility and Cloud Computing (UCC 2016), 2016, pp. 1–6.
[191] T. F. J. Pasquier, J. Singh, J. Bacon, and O. Hermant, “Managing Big Data
with Information Flow Control,” in Cloud Computing Technology and Science
(CloudCom), 2015 IEEE 7th International Conference, 2015, vol. 2, pp. 1–8.
[192] A. Bratterud and H. Haugerud, “Maximizing Hypervisor Scalability Using
Minimal Virtual Machines,” 2013 IEEE 5th Int. Conf. Cloud Comput. Technol. Sci.,
pp. 218–223, 2013.
[193] M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia, “Oblivious
RAM simulation with efficient worst-case access overhead,” in Proceedings of the
3rd ACM workshop on Cloud computing security workshop, 2011, pp. 95–100.
[194] A. J. Younge, R. Henschel, J. T. Brown, G. Von Laszewski, J. Qiu, and G. C.
Fox, “Analysis of Virtualization Technologies for High Performance Computing
Environments,” in Cloud Computing (CLOUD), 2011 IEEE International Conference on,
2011, pp. 9–16.
[195] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J.
Molina, “Controlling data in the cloud,” in Proceedings of the 2009 ACM workshop on
Cloud computing security - CCSW ’09, 2009, p. 85.
[196] C. Thompson, “Effective Data Protection In The Cloud,” 2015. [Online].
Available: http://www.tomsitpro.com/articles/cloud-data-encryption,2-913.html.
[197] A. Daniel, S. Montemayor, J. F. Lopez, and J. C. Álvarez, “Critical Factors
Affecting the Utilization of Cloud Computing,” in CBU International Conference on
Innovation, TEchnology Transfer and Education, 2014, vol. 2, pp. 331–336.
[198] A. Act, “Records management and the cloud — a checklist,” 1983.
[199] A. J. Berre, D. Roman, E. Landre, W.-J. van den Heuvel, L. A. Skår, M. Udnæs,
R. Lennon, and A. Zeid, “Towards Best Practices in Designing for the Cloud,” in
Proceeding of the 24th ACM SIGPLAN conference companion on Object oriented
programming systems languages and applications - OOPSLA ’09, 2009, pp. 697–698.
[200] J. Bughin, M. Chui, and J. Manyika, “Clouds, Big Data, and Smart Assets: Ten
Tech-Enabled Business Trends to Watch,” McKinsey Q., vol. 56, no. 1, pp. 75–86,
2010.
[201] M. Jouini, A. Ben Aissa, L. Ben Arfa Rabai, and A. Mili, “Towards
quantitative measures of Information Security: A Cloud Computing case study,” Int.
J. Cyber-Security Digit. Forensics, vol. 1, no. 3, pp. 248–262, 2012.
[202] S. Pearson, Y. Shen, and M. Mowbray, “A privacy manager for cloud computing,”
Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes
Bioinformatics), vol. 5931 LNCS, pp. 90–106, 2009.
[203] HPLabs, “Cloud Stewardship,” 2011. [Online]. Available:
http://www.hpl.hp.com/bristol/cloud_stewardship.htm.
[204] T. Lynn, P. Healy, R. McClatchey, J. Morrison, C. Pahl, and B. Lee, “The Case
for Cloud Service Trustmarks and Assurance-as-a-Service,” in CLOSER 2013 -
Proceedings of the 3rd International Conference on Cloud Computing and Services
Science, 2013, pp. 110–115.
[205] Verdantix, “Carbon Disclosure Project Study 2011 Cloud Computing – The IT
Solution for the 21st Century,” 2011.
[206] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, “Cloud
Computing – The Business Perspective,” Decis. Support Syst., vol. 51, no. 1, pp.
176–189, 2011.
[207] S. Ramgovind, M. M. Eloff, and E. Smith, “The management of security in cloud
computing,” in Proceedings of the 2010 Information Security for South Africa
Conference, ISSA 2010, 2010, pp. 1–7.
[208] C. Yoo, “Cloud Computing: Architectural and Policy Implications,” Rev. Ind.
Organ., vol. 38, no. 4, pp. 405–421, 2011.
[209] B. S. Kaliski-Jr and W. Pauley, “Toward Risk Assessment as a Service in Cloud
Environments,” in Proceedings of the 2nd USENIX conference on Hot topics in cloud
computing, 2010, vol. 63, no. 2, pp. 1–7.
[210] R. Blandford, “Information security in the cloud,” Netw. Secur., vol. 2011,
no. 4, pp. 15–17, 2011.
[211] B. Grobauer and T. Schreck, “Towards Incident Handling in the Cloud:
Challenges and Approaches,” ACM Work. Cloud Comput. Secur. Work., pp. 77–85, 2010.
[212] S. Pearson, V. Tountopoulos, D. Catteddu, M. Sudholt, R. Molva, C. Reich, S.
Fischer-Hubner, C. Millard, V. Lotz, M. G. Jaatun, R. Leenes, C. Rong, and J.
Lopez, “Accountability for Cloud and Other Future Internet Services,” in CloudCom
2012 - Proceedings: 2012 4th IEEE International Conference on Cloud Computing
Technology and Science, 2012, pp. 629–632.
[213] R. Sprague, “Cloud Privacy : Normative Standards Needed to Foster
Innovation,” Management, pp. 1–11, 2010.
[214] R. Pavlicek, “Unikernel-based microservices will transform the cloud for the
IoT age,” 2016. [Online]. Available: http://techbeacon.com/unikernel-based-
microservices-will-transform-cloud-iot-age.
[215] S. Creese, P. Hopkins, S. Pearson, and Y. Shen, “Data protection-aware design
for cloud services,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif.
Intell. Lect. Notes Bioinformatics), vol. 5931 LNCS, no. December, pp. 119–130,
2009.
[216] S. N. Dhage, B. B. Meshram, R. Rawat, S. Padawe, M. Paingaokar, and A. Misra,
“Intrusion Detection System in Cloud Computing Environment,” Knowl. Creat. Diffus.
Util., no. Icwet, pp. 235–239, 2011.
[217] J. Singh, J. Bacon, J. Crowcroft, A. Madhavapeddy, T. Pasquier, W. K. Hon,
and C. Millard, “Regional Clouds: Technical Considerations,” no. UCAM-CL-TR-863,
2014.
[218] S. Pearson, Y. Shen, and M. Mowbray, “A Privacy Manager for Cloud Computing,”
Proc. IEEE Int. Conf. Cloud Comput., vol. M, no. 8, pp. 90–106, 2009.
[219] Lee Badger, D. Bernstein, R. Bohn, F. de Vaulx, M. Hogan, J. Mao, J. Messina,
K. Mills, A. Sokol, J. Tong, F. Whiteside, and D. Leaf, “US Government Cloud
Computing Technology Roadmap Volume I Release 1.0 (Draft): High-Priority
Requirements to Further USG Agency Cloud Ccomputing Adoption,” 2011.
[220] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-Preserving Multi-keyword
Ranked Search over Encrypted Cloud Data,” Proc. - IEEE INFOCOM, vol. 25, no. 1, pp.
829–837, 2011.
[221] A. S. Sendi and M. Cheriet, “Cloud Computing: A Risk Assessment Model,” 2014
IEEE Int. Conf. Cloud Eng., pp. 147–152, 2014.
[222] N. Papanikolaou, S. Pearson, M. C. Mont, and R. Ko, “A Toolkit for Automating
Compliance in Cloud Computing Services,” Int. J. Cloud Comput., vol. x, no. x, pp.
45–68, 2014.
[223] M. Theoharidou, N. Papanikolaou, S. Pearson, and D. Gritzalis, “Privacy risk,
security, accountability in the cloud,” in Proceedings of the International
Conference on Cloud Computing Technology and Science, CloudCom, 2013, vol. 1, pp.
177–184.
[224] A. Lenk and S. Tai, “Cloud Standby: Disaster Recovery of Distributed Systems
in the Cloud,” Serv. Cloud Comput., pp. 32–46, 2014.
[225] Y. Zhu, H. Wang, Z. Hu, G. Ahn, H. Hu, S. S. Yau, H. I. Storage, and R.
Information, “Efficient Provable Data Possession for Hybrid Clouds,” in Proceedings
of the 17th ACM Conference on Computer and communications security, 2010, pp. 756–
758.
[226] S. Sundareswaran, A. Squicciarini, D. Lin, and S. Huang, “Promoting
Distributed Accountability in the Cloud,” in Proceedings - 2011 IEEE 4th
International Conference on Cloud Computing, CLOUD 2011, 2011, pp. 113–120.
[227] O. Rebollo, D. Mellado, E. Fernández-Medina, and H. Mouratidis, “Empirical
evaluation of a cloud computing information security governance framework,” Inf.
Softw. Technol., vol. 58, pp. 44–57, 2015.
[228] M. A. Vouk, “Cloud Computing – Issues, Research and Implementations,” ITI
2008 - 30th Int. Conf. Inf. Technol. Interfaces, vol. 16, no. 4, pp. 235–246, 2008.
[229] A. Bessani, R. Kapitza, D. Petcu, P. Romano, S. V. Gogouvitis, D. Kyriazis,
and R. G. Cascella, “A look to the old-world_sky: EU-funded dependability cloud
computing research,” ACM SIGOPS Oper. Syst. Rev., vol. 46, no. 2, p. 43, 2012.
[230] S. Carlin and K. Curran, “Cloud Computing Security,” Artif. Intell., vol. 3,
no. March, pp. 14–16, 2011.
[231] M. Almorsy, J. Grundy, and I. Müller, “An analysis of the cloud computing
security problem,” 17th Asia-Pacific Softw. Eng. Conf. (APSEC 2010) Cloud Work.
Aust., no. December, p. 7, 2010.
[232] I. Walden, “Cloud Panopticon: Legal frameworks,” no. October, pp. 1–9, 2014.
[233] A. Baldwin, D. Pym, M. Sadler, and S. Shiu, “Information stewardship in cloud
ecosystems: Towards models, economics, and delivery,” Proc. - 2011 3rd IEEE Int.
Conf. Cloud Comput. Technol. Sci. CloudCom 2011, pp. 784–791, Nov. 2011.
[234] S. Thorpe, T. Grandison, A. Campbell, J. Williams, K. Burrell, and I. Ray,
“Towards a Forensic-based Service Oriented Architecture Framework for Auditing of
Cloud Logs,” in Proceedings - 2013 IEEE 9th World Congress on Services, SERVICES
2013, 2013, pp. 75–83.
[235] S. Srinivasamurthy, F. Wayne, and D. Q. Liu, “Security and Privacy in Cloud
Computing : A Survey Security and Privacy in Cloud Computing :,” in 2010 Sixth
International Conference on Semantics, Knowledge and Grids, 2013, vol. 2, pp. 126–
149.
[236] L. Badger, D. Bernstein, R. Bohn, F. de Vaulx, M. Hogan, M. Iorga, J. Mao, J.
Messina, K. Mills, E. Simmon, A. Sokol, J. Tong, F. Whiteside, and D. Leaf, “US
Government Cloud Computing Technology Roadmap,” 2014.
[237] W. K. Hon, E. Kosta, C. Millard, and D. Stefanatou, “Cloud Accountability:
The Likely Impact of the Proposed EU Data Protection Regulation,” SSRN Electron.
J., no. 172, pp. 1–54, 2014.
[238] M. L. Hale and R. Gamble, “SecAgreement: Advancing Security Risk Calculations
in Cloud Services,” in Proceedings - 2012 IEEE 8th World Congress on Services,
SERVICES 2012, 2012, pp. 133–140.
[239] K. Lee, “Security Threats in Cloud Computing Environments,” Int. J. Secur.
its Appl., vol. 6, no. 4, pp. 25–32, 2012.
[240] K. Popovic and Z. Hocenski, “Cloud computing security issues and challenges,”
MIPRO, 2010 Proc. 33rd Int. Conv., pp. 344–349, 2010.
[241] C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward secure and dependable
storage services in cloud computing,” IEEE Trans. Serv. Comput., vol. 5, no. 2, pp.
220–232, 2012.
[242] Y. Zhu, H. Hu, G. J. Ahn, and S. S. Yau, “Efficient audit service outsourcing
for data integrity in clouds,” J. Syst. Softw., vol. 85, no. 5, pp. 1083–1095,
2012.
[243] A. Joint, E. Baker, and E. Eccles, “Hey, you, get off of that cloud?,”
Comput. Law Secur. Rev., vol. 25, no. 3, pp. 270–274, 2009.
[244] O. Wenge, M. Siebenhaar, U. Lampe, D. Schuller, and R. Steinmetz, “Much ado
about security appeal: Cloud provider collaborations and their risks,” Lect. Notes
Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes
Bioinformatics), vol. 7592 LNCS, no. 1, pp. 80–90, 2012.
[245] C. Millard and K. Hon, “Calls for ‘EU-only cloud’, post-Snowden,” in MCCRC
Symposium, 2014, no. November 2013, pp. 1–7.
[246] B. Duncan, Y. Zhao, and M. Whittington, “Corporate Governance, Risk Appetite
and Cloud Security Risk: A Little Known Paradox. How Do We Square the Circle?,” in
Cloud Computing 2017: The Eighth International Conference on Cloud Computing,
GRIDs, and Virtualization, 2017, pp. 1–6.
[247] L. F. B. Soares, D. a B. Fernandes, J. V Gomes, M. M. Freire, and P. R. M.
Inácio, “Security, Privacy and Trust in Cloud Systems,” in Security, Privacy and
Trust in Cloud Systems, Springer, 2014, pp. 3–44.
[248] B. C. Tak, B. Urgaonkar, and A. Sivasubramaniam, “ToMove or Not toMove: The
Economics of Cloud Computing,” Proc. 3rd USENIX Conf. Hot Top. cloud Comput., pp.
5–5, 2011.
[249] J. Du, W. Wei, X. Gu, and T. Yu, “RunTest: Assuring Integrity of Dataflow
Processing in Cloud Computing Infrastructures,” Proc. 5th ACM Symp. Information,
Comput. Commun. Secur. - ASIACCS ’10, p. 293, 2010.
[250] K. Hon, C. Millard, and I. Walden, “The Problem of `Personal Data’ in Cloud
Computing - What Information is Regulated ?,” London, Legal Studies Research Paper
No. 75/2011, 2011.
[251] J. Crowcroft and J. Singh, “Regional Clouds: Technical Considerations,” no.
September, pp. 8–9, 2011.
[252] S. Tanimoto, R. Sato, K. Kato, M. Iwashita, Y. Seki, H. Sato, and A. Kanai,
“A Study of Risk Assessment Quantification in Cloud Computing,” 2014 17th Int.
Conf. Network-Based Inf. Syst., pp. 426–431, 2014.
[253] W. Itani, A. Kayssi, and A. Chehab, “Privacy as a service: Privacy-aware data
storage and processing in cloud computing architectures,” 8th IEEE Int. Symp.
Dependable, Auton. Secur. Comput. DASC 2009, pp. 711–716, Dec. 2009.
[254] T. Sang, “A Log-based Approach to Make Digital Forensics Easier on Cloud
Computing,” Proc. 2013 3rd Int. Conf. Intell. Syst. Des. Eng. Appl. ISDEA 2013, pp.
91–94, 2013.
[255] S. Sharma, V. Chang, U. S. Tim, J. Wong, and S. Gadia, “Cloud-based emerging
services systems,” Int. J. Inf. Manage., pp. 1–19, 2016.
[256] M. Ramachandran and V. Chang, “Recommendations and Best Practices for Cloud
Enterprise Security,” 2014 IEEE 6th Int. Conf. Cloud Comput. Technol. Sci., pp.
983–988, 2014.
[257] T. F. J.-M. Pasquier, J. Bacon, and D. Eyers, “FlowK: Information Flow
Control for the Cloud,” 6th Int. Conf. Cloud Comput. Technol. Sci., pp. 1–8, 2014.
[258] S. Sengupta, V. Kaulgud, and V. S. Sharma, “Cloud Computing Security - Trends
and Research Directions,” 2011 IEEE World Congr. Serv., no. October, pp. 524–531,
2011.
[259] D. Pym and M. Sadler, “Information Stewardship in Cloud Computing,” Int. J.
Serv. Sci. Manag. Eng. Technol., vol. 1, no. 1, pp. 50–67, 2010.
[260] A. Weiss, “Computing in the Clouds,” netWorker, vol. 11, no. 4, pp. 16–25,
Dec. 2007.
[261] M. Almorsy, J. Grundy, and A. S. Ibrahim, “Collaboration-Based Cloud
Computing Security Management Framework,” in Proceedings - 2011 IEEE 4th
International Conference on Cloud Computing, CLOUD 2011, 2011, pp. 364–371.
[262] S. M. Han, M. M. Hassan, C.-W. Yoon, and E.-N. Huh, “Efficient Service
Recommendation System for Cloud Computing Market,” Commun. Comput. Inf. Sci., vol.
63, pp. 117–124, 2009.
[263] N. Papanikolaou, T. Rübsamen, and C. Reich, “A Simulation Framework to Model
Accountability Controls for Cloud Computing,” CLOUD Comput. 2014, Fifth Int. Conf.
Cloud Comput. GRIDs, Virtualization, no. c, pp. 12–19, 2014.
[264] M. Mizan, M. L. Rahman, R. Khan, M. Haque, and R. Hasan, “Accountable proof
of ownership for data using timing element in cloud services,” Proc. 2013 Int.
Conf. High Perform. Comput. Simulation, HPCS 2013, pp. 57–64, 2013.
[265] W. Jansen and T. Grance, “Guidelines on Security and Privacy in Public Cloud
Computing,” 2011.
[266] SNIA, “Cloud data management interface,” 2010.
[267] K. Ruan, J. James, J. Carthy, and T. Kechadi, “Key terms for service level
agreements to support cloud forensics,” in IFIP Advances in Information and
Communication Technology, vol. 383 AICT, 2012, pp. 201–212.
[268] G. O’Donnell, N. McKelvey, and K. Curran, “Cloud Computing,” in Springer
Gabler Verlag, 2015, pp. 1033–1038.
[269] B. Xavier, T. Ferreto, and L. Jersak, “Time Provisioning Evaluation of KVM,
Docker and Unikernels in a Cloud Platform,” in Proceedings - 2016 16th IEEE/ACM
International Symposium on Cluster, Cloud, and Grid Computing, CCGrid 2016, 2016.
[270] B. Duncan and M. Whittington, “Company Management Approaches — Stewardship or
Agency: Which Promotes Better Security in Cloud Ecosystems?,” in Cloud Computing
2015, 2015, pp. 154–159.
[271] Oracle, “Oracle Optimized Solution for Secure Enterprise Cloud
Infrastructure,” 2015.
[272] T. Takahashi, Y. Kadobayashi, and H. Fujiwara, “Ontological Approach toward
Cybersecurity in Cloud Computing Categories and Subject Descriptors,” in Science
And Technology, 2010, pp. 100–109.
[273] B. Duncan, “FAST-CCS: Finding a Solution to Cloud Cyber Security,” in The
Eighth International Conference on Cloud Computing, GRIDs, and Virtualization,
2017, pp. 1–3.
[274] R. Sandhu, R. Boppana, R. Krishnan, J. Reich, T. Wolff, and J. Zachry,
“Towards a discipline of mission-aware cloud computing,” Proc. 2010 ACM Work. Cloud
Comput. Secur. Work. - CCSW ’10, vol. Di, no. 13, p. 13, 2010.
[275] S. Pearson, “Towards Accountability in the Cloud,” IEEE Internet Comput.,
vol. 15, no. 4, pp. 64–69, Jul. 2011.
[276] A. Madhavapeddy, R. Mortier, C. Rotsos, D. Scott, B. Singh, T. Gazagnaire, S.
Smith, S. Hand, and J. Crowcroft, “Unikernels: Library operating systems for the
cloud,” ACM SIGPLAN Not., vol. 48, no. 4, pp. 461–472, 2013.
[277] D. Durkee, “Why Cloud Computing Will Never Be Free,” Commun. ACM, vol. 53,
no. 5, p. 62, May 2010.
[278] S. Fraser, R. Biddle, S. Jordan, K. Keahey, B. Marcus, E. M. Maximilien, and
D. Thomas, “Cloud Computing Beyond Objects: Seeding the Cloud,” Communications, pp.
847–850, 2009.
[279] J. Yao, S. Chen, C. Wang, D. Levy, and J. Zic, “Accountability as a service
for the cloud: From concept to implementation with BPEL,” in Proceedings - 2010 6th
World Congress on Services, Services-1 2010, 2010, pp. 91–98.
[280] X.-Y. Li, L.-T. Zhou, Y. Shi, and Y. Guo, “A Trusted Computing Environment
Model in Cloud Architecture,” Mach. Learn. Cybern. (ICMLC), 2010 Int. Conf., vol.
6, no. July, pp. 2843–2848, 2010.
[281] H. Katzan Jr, “On The Privacy Of Cloud Computing,” Int. J. Manag. Inf. Syst.,
vol. 14, no. 2, pp. 1–12, 2011.
[282] A. Korn, C. Peltz, and M. Mowbray, “A Service Level Management Authority in
the Cloud,” Digital Media, 2009. [Online]. Available:
http://www.hpl.hp.com/techreports/2009/HPL-2009-79.html.
[283] S. Sundareswaran, A. Squicciarini, and D. Lin, “Ensuring distributed
accountability for data sharing in the cloud,” in IEEE Transactions on Dependable
and Secure Computing, 2012, vol. 9, no. 4, pp. 556–568.
[284] Y. Chi, H. J. Moon, H. Hacigümüş, and J. Tatemura, “SLA-Tree: A Framework for
Efficiently Supporting SLA-based Decisions in Cloud Computing,” Proc. 14th Int.
Conf. Extending Database Technol. - EDBT/ICDT ’11, p. 129, 2011.
[285] A. Madhavapeddy, R. Mortier, C. Rotsos, D. Scott, B. Singh, T. Gazagnaire, S.
Smith, S. Hand, and J. Crowcroft, “Unikernels: Library Operating Systems for the
Cloud,” ASPLOS ’13 Proc. eighteenth Int. Conf. Archit. Support Program. Lang. Oper.
Syst., vol. 48, pp. 461–472, 2013.
[286] P. Balboni, V. Mascheroni, A. Paolo, and B. Law, “Data Protection and Data
Security Issues Related to Cloud Computing in the EU,” Soc. Sci. Res., vol. 22, no.
22, pp. 1–12, 2010.
[287] S. Pearson, “Privacy and Security for Cloud Computing,” in Privacy and
Security for Cloud Computing, e: Springer, 2013, pp. 3–42.
[288] Z. Chen and J. Yoon, “IT Auditing to Assure a Secure Cloud Computing,” in
Proceedings - 2010 6th World Congress on Services, Services-1 2010, 2010, pp. 253–
259.
[289] N. Sultan, “Cloud computing for education: A new dawn?,” Int. J. Inf.
Manage., vol. 30, no. 2, pp. 109–116, 2010.
[290] J. Prüfer, “How to govern the cloud? Characterizing the optimal enforcement
institution that supports accountability in cloud computing,” Proc. Int. Conf.
Cloud Comput. Technol. Sci. CloudCom, vol. 2, pp. 33–38, 2013.
[291] M. D. Ryan, “Cloud Computing Privacy Concerns on Our Doorstep,” Commun. ACM,
vol. 54, no. 1, p. 36, Jan. 2011.
[292] A. T. Dykstra, Josiah; Sherman, “UNDERSTANDING ISSUES IN CLOUD FORENSICS: TWO
HYPOTHETICAL CASE STUDIES - ProQuest,” Proc. Conf. Digit. Forensics, Secur. Law,
no. 45, pp. 1–10, 2011.
[293] G. Rosen, “The Business of Clouds,” Crossroads, vol. 16, no. 3, pp. 26–28,
Mar. 2010.
[294] N. Leavitt, “Is Cloud Computing Really Ready for Prime Time?,” Computer
(Long. Beach. Calif)., vol. 42, no. January, pp. 15–20, 2009.
[295] H. Wang, Q. Jing, R. Chen, B. He, Z. Qian, and L. Zhou, “Distributed Systems
Meet Economics: Pricing in the Cloud HongyiWang†,” in Hot topics in cloud
computing, 2010, pp. 6–12.
[296] P. Mell and T. Grance, “Effectively and Securely Using the Cloud Computing
Paradigm,” 2009.
[297] D. C. Chou, “Cloud computing: A value creation model,” Comput. Stand.
Interfaces, vol. 38, pp. 72–77, 2015.
[298] I. Walden, “Law Enforcement Access in a Cloud Environment,” Leg. Stud., no.
74, pp. 1–19, 2011.
[299] SNIA, “Information Technology - Cloud Data Management Interface ( CDMI TM ),”
2011.
[300] J. Hollingsworth and D. J. Powell, “Requiring Web-based Cloud and Mobile
Computing in a Computer Science Undergraduate Curriculum,” Faces, pp. 19–24, 2011.
[301] I. Iankoulova and M. Daneva, “Cloud Computing Security Requirements: a
Systematic Review,” in 2012 Sixth International Conference on Research Challenges
in Information Science (RCIS), 2012, pp. 1–7.
[302] K. Bernsmed, W. K. Hon, and C. Millard, “Deploying Medical Sensor Networks in
the Cloud – Accountability Obligations from a European Perspective,” in Cloud
Computing (CLOUD), 2014 IEEE 7th International Conference on, 2014, pp. 898–905.
[303] B. Hay, K. Nance, and M. Bishop, “Storm Clouds Rising: Security Challenges
for IaaS Cloud Computing,” Proc. Annu. Hawaii Int. Conf. Syst. Sci., pp. 1–7, 2011.
[304] D. Van Rooy, “European Cloud Strategy: trusted cloud and public sector
European Cloud Partnership ( ECP ),” EU Symp., no. September, pp. 1–9, 2014.
[305] M. A. AlZain, E. Pardede, B. Soh, and J. A. Thom, “Cloud computing security:
From single to multi-clouds,” in Proceedings of the Annual Hawaii International
Conference on System Sciences, 2011, pp. 5490–5499.
[306] R. Xie and R. Gamble, “A Tiered Strategy for Auditing in the Cloud,” in
Proceedings - 2012 IEEE 5th International Conference on Cloud Computing, CLOUD
2012, 2012, pp. 945–946.
[307] M. Fouquet, H. Niedermayer, and G. Carle, “Cloud Computing for the Masses
Position Paper,” in Proceedings of the 1st ACM workshop on Userprovided networking
challenges and opportunities UNET 09, 2009, pp. 31–36.
[308] J. Wei, X. Zhang, G. Ammons, V. Bala, and P. Ning, “Managing security of
virtual machine images in a cloud environment,” Proc. 2009 ACM Work. Cloud Comput.
Secur. - CCSW ’09, no. Vm, p. 91, 2009.
[309] M. D. De Assunção, A. Costanzo, and R. Buyya, “Evaluating the Cost-Benefit of
Using Cloud Computing to Extend the Capacity of Clusters,” Proc. 18th ACM Int.
Symp. High Perform. Distrib. Comput. HPDC 09, vol. 256, no. 3, pp. 141–150, 2009.
[310] M. Townsend, “Managing a Security Program in a Cloud Computing Environment,”
Computing, pp. 1–6, 2009.
[311] Y. Chen, V. Paxson, and R. H. Katz, “Handbook of Cloud Computing,” Handb.
Cloud Comput., vol. 20, no. 2010, pp. 493–516, 2010.
[312] M. Armbrust, I. Stoica, M. Zaharia, A. Fox, R. Griffith, A. D. Joseph, R.
Katz, A. Konwinski, G. Lee, D. Patterson, and A. Rabkin, “A View of Cloud
Computing: Clearing the clouds away from the true potential and obstacles posed by
this computing capability.,” Commun. ACM, vol. 53, no. 4, pp. 50–58, 2010.
[313] I. Ion, N. Sachdeva, P. Kumaraguru, and S. Čapkun, “Home is safer than the
cloud! Privacy Concerns for Consumer Cloud Storage,” in Soups ’11, 2011, p. 1.
[314] F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, L. Badger, and D. Leaf, “NIST
Cloud Computing Reference Architecture,” 2011.
[315] T. Hey, “Keynote Address The Cloud Computing Revolution,” 2010.
[316] D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud
Computing,” 2012 Int. Conf. Comput. Sci. Electron. Eng., vol. 1, no. 973, pp. 647–
651, 2012.
[317] B. Duncan and M. Whittington, “The importance of proper measurement for a
cloud security assurance model,” in Proceedings - IEEE 7th International Conference
on Cloud Computing Technology and Science, CloudCom 2015, 2015, pp. 517–522.
[318] C. Chang and M. Ramachandran, “Towards Achieving Data Security with the Cloud
Computing Adoption Framework,” IEEE Trans. Serv. Comput., vol. 9, no. 1, pp. 138–
151, 2016.
[319] F. M. Pinguelo and B. W. Muller, “Avoid the Rainy Day: Survey of U. S. Cloud
Computing Caselaw,” Bost. Coll. Intellect. Prop. Technol. Forum J., no. January,
pp. 1–6, 2011.
[320] F. Pallas, “An Agency Perspective to Cloud Computing,” in Lecture Notes in
Computer Science (including subseries Lecture Notes in Artificial Intelligence and
Lecture Notes in Bioinformatics), vol. 8914, Springer, 2014, pp. 36–51.
[321] F. Doelitzscher, C. Fischer, D. Moskal, C. Reich, M. Knahl, and N. Clarke,
“Validating Cloud Infrastructure Changes By Cloud Audits,” in Proceedings - 2012
IEEE 8th World Congress on Services, SERVICES 2012, 2012, pp. 377–384.
[322] Cloud Security Alliance, “The Notorious Nine. Cloud Computing Top Threats in
2013,” Security, no. February, 2013.
[323] M. Ben-Yehuda, O. Peleg, O. A. Ben-Yehuda, I. Smolyar, and D. Tsafrir, “The
nonkernel: A Kernel Designed for the Cloud,” in 4th Asia-Pacific Workshop on
Systems, 2013.
[324] Y. Chen and R. Sion, “On Securing Untrusted Clouds with Cryptography,”
Science (80-. )., pp. 109–114, 2010.
[325] K. Dahbur, B. Mohammad, and A. B. Tarakji, “A Survey of Risks, Threats and
Vulnerabilities in Cloud Computing,” Computing, pp. 1–6, 2011.
[326] A. Bratterud, A. Happe, and B. Duncan, “Enhancing Cloud Security and Privacy:
The Unikernel Solution,” in Cloud Computing 2017: The Eighth International
Conference on Cloud Computing, GRIDs, and Virtualization, 2017, pp. 1–8.
[327] D. Bernstein, E. Ludvigson, K. Sankar, S. Diamond, and M. Morrow, “Blueprint
for the intercloud - Protocols and formats for cloud computing interoperability,”
in Proceedings of the 2009 4th International Conference on Internet and Web
Applications and Services, ICIW 2009, 2009, pp. 328–336.
[328] J. Opara-Martins, R. Sahandi, and F. Tian, “Critical review of vendor lock-in
and its impact on adoption of cloud computing,” Int. Conf. Inf. Soc. i-Society
2014, pp. 92–97, 2015.
[329] Y. Lu and G. Tsudik, “Enhancing Data Privacy in the Cloud,” in Trust
Management V, Springer, 2011, pp. 117–132.
[330] S. Greengard, “Cloud Computing and Developing Nations,” Commun. ACM, vol. 53,
no. 5, p. 18, May 2010.
[331] E. Stefanov and E. Shi, “Oblivistore: High performance oblivious cloud
storage,” in Security and Privacy (SP), 2013 IEEE Symposium on, 2013, pp. 253–267.
[332] V. Chang, R. J. Walters, and G. Wills, “The development that leads to the
Cloud Computing Business Framework,” Int. J. Inf. Manage., pp. 1–22, 2013.
[333] P. S. Hada, “Security Agents: A Mobile Agent Based Trust Model for Cloud
Computing,” vol. 36, no. 12, pp. 12–15, 2011.
[334] M. Albanese, S. Jajodia, R. Jhawar, and V. Piuri, “Secure Cloud Computing,”
in Secure Cloud Computing, 2014, pp. 239–259.
[335] S. Zawoad and R. Hasan, “Digital Forensics in the Cloud,” CrossTalk, no.
October, pp. 17–20, 2013.
[336] B. Duncan and M. Whittington, “Enhancing Cloud Security and Privacy: The
Power and the Weakness of the Audit Trail,” in Cloud Computing 2016: The Seventh
International Conference on Cloud Computing, GRIDs, and Virtualization, 2016, no.
April, pp. 125–130.
[337] M. Ali, S. U. Khan, and A. V. Vasilakos, “Security in cloud computing:
Opportunities and challenges,” Inf. Sci. (Ny)., vol. 305, pp. 357–383, 2015.
[338] A. Li, X. Yang, S. Kandula, and M. Zhang, “CloudCmp: Comparing Public Cloud
Providers,” in Proceedings of the 10th annual conference on Internet measurement -
IMC ’10, 2010, p. 1.
[339] Data Protection Working Party, “Opinion 05/2012 on Cloud Computing,”
Brussels, Article 29 of Directive 95/46/EC, 2012.
[340] H. Takabi, J. B. D. Joshi, and G. J. Ahn, “Security and Privacy Challenges in
Cloud Computing Environments,” IEEE Secur. Priv., vol. 8, no. 6, pp. 24–31, Nov.
2010.
[341] B. Duncan and M. Whittington, “Creating an Immutable Database for Secure
Cloud Audit Trail and System Logging,” in Cloud Computing 2017: The Eighth
International Conference on Cloud Computing, GRIDs, and Virtualization, 2017, pp.
54–59.
[342] T. F. J. Pasquier, J. Singh, J. Bacon, and D. Eyers, “Information Flow Audit
for PaaS Clouds,” 2013.
[343] B. Duncan and M. Whittington, “Cloud cyber-security: Empowering the audit
trail,” Int. J. Adv. Secur., vol. 9, no. 3 & 4, pp. 169–183, 2016.
[344] K. Chard, K. Bubendorfer, and P. Komisarczuk, “High Occupancy Resource
Allocation for Grid and Cloud systems, a Study with DRIVE,” Contract, pp. 73–84,
2010.
[345] F. Doelitzscher, T. Ruebsamen, T. Karbe, M. Knahl, C. Reich, and N. Clarke,
“Sun Behind Clouds - On Automatic Cloud Security Audits and a Cloud Audit Policy
Language,” … J. Adv. …, vol. 6, no. 1, pp. 1–16, 2013.
[346] K. Xiong and X. Chen, “Ensuring Cloud Service Guarantees Via Service Level
Agreement (SLA) -based Resource Allocation,” in Distributed Computing Systems
Workshops (ICDCSW), 2015 IEEE 35th International Conference on, 2015, pp. 35–41.
[347] C. Soghoian, “Caught in the cloud: Privacy, encryption, and government back
doors in the web 2.0 era,” J. Telecomm. High Tech. L., vol. 8, no. 2, pp. 359–424,
2010.
[348] F. Doelitzscher, M. Knahl, C. Reich, and N. Clarke, “Anomaly detection in
IaaS Clouds,” in Proceedings of the International Conference on Cloud Computing
Technology and Science, CloudCom, 2013, vol. 1, pp. 387–394.
[349] J. M. Lopez, T. Ruebsamen, and D. Westhoff, “Privacy-Friendly Cloud Audits
with Somewhat Homomorphic and Searchable Encryption,” in 14th International
Conference on Innovations for Community Services: “Technologies for Everyone”, I4CS
2014 - Conference Proceedings, 2014, pp. 95–103.
[350] S. Subashini and V. Kavitha, “A Survey on Security Issues in Service Delivery
Models of Cloud Computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, 2011.
[351] B. Hayes, “Cloud computing,” Commun. ACM, vol. 51, no. 7, p. 9, Jul. 2008.
[352] D. J. Abadi, “Data management in the cloud: limitations and opportunities,”
IEEE Data Eng. Bull., vol. 32, no. 1, pp. 3–12, 2009.
[353] D. Comer, “A Future Internet Architecture That Supports Cloud Computing,” in
CFI ’11 June - Network, 2011, pp. 0–4.
[354] R. Lennon, L. A. Skår, M. Udnæs, A. J. Berre, A. Zeid, D. Roman, E. Landre,
and W.-J. van der Heuvel, “Best Practices in Cloud Computing: Designing for the
Cloud,” Computing, pp. 775–776, 2009.
[355] B. Duncan and M. Whittington, “Cyber Security for Cloud and the Internet of
Things: How Can it be Achieved?,” Forthcom. IET, pp. 1–20, 2017.
[356] A. T. Monfared and M. G. Jaatun, “Monitoring Intrusions and Security Breaches
in Highly Distributed Cloud Environments,” Proc. - 2011 3rd IEEE Int. Conf. Cloud
Comput. Technol. Sci. CloudCom 2011, no. Section 3, pp. 772–777, 2011.
[357] A. Hudic, T. Hecht, M. Tauber, A. Mauthe, and S. C. Elvira, “Towards
continuous cloud service assurance for critical infrastructure IT,” in Proceedings
- 2014 International Conference on Future Internet of Things and Cloud, FiCloud
2014, 2014, pp. 175–182.
[358] S. Zardari and R. Bahsoon, “Cloud Adoption: A Goal-Oriented Requirements
Engineering Approach,” Proc. {2Nd} Int. Work. Softw. Eng. Cloud Comput., p. 29,
2011.
[359] FTC, “ASUS Settles FTC Charges That Insecure Home Routers and ‘Cloud’
Services Put Consumers’ Privacy At Risk,” 2016. [Online]. Available:
https://www.ftc.gov/news-events/press-releases/2016/02/asus-settles-ftc-charges-
insecure-home-routers-cloud-services-put.
[360] Y. Y. Haimes, B. M. Horowitz, Z. Guo, E. Andrijcic, and J. Bogdanor,
“Assessing systemic risk to cloud-computing technology as complex interconnected
systems of systems,” Syst. Eng., vol. 18, no. 3, pp. 284–299, 2015.
[361] M. A. Babar and M. A. Chauhan, “A Tale of Migration to Cloud Computing for
Sharing Experiences and Observations,” Proceeding 2nd Int. Work. Softw. Eng. cloud
Comput. - SECLOUD ’11, p. 50, 2011.
[362] L. Wang, J. Zhan, W. Shi, Y. Liang, and L. Yuan, “In Cloud, Do MTC or HTC
Service Providers Benefit from the Economies of Scale?,” Proc. 2nd Work. Many-Task
Comput. Grids Supercomput. - MTAGS ’09, pp. 1–10, 2009.
[363] N. Beacham and B. Duncan, “Development of a Secure Cloud Based Learning
Environment for Inclusive Practice in Mainstream Education,” in Cloud Computing
2017: The Eighth International Conference on Cloud Computing, GRIDs, and
Virtualization, 2017, pp. 1–4.
[364] G. Grispos, W. B. Glisson, and T. Storer, “Using Smartphones as a Proxy for
Forensic Evidence contained in Cloud Storage Services,” Proc. Annu. Hawaii Int.
Conf. Syst. Sci., pp. 4910–4919, Jan. 2013.
[365] V. Chang and M. Ramachandran, “Towards Achieving Data Security with the Cloud
Computing Adoption Framework,” IEEE Trans. Serv. Comput., vol. 9, no. 1, pp. 138–
151, 2016.
[366] F. Tao, L. Zhang, V. C. Venkatesh, Y. Luo, and Y. Cheng, “Cloud
manufacturing: a computing and service-oriented manufacturing model,” Proc. Inst.
Mech. Eng. Part B J. Eng. Manuf., vol. 225, no. 10, pp. 1969–1976, 2011.
[367] G. A. Lewis, “The Role of Standards in Cloud- Computing Interoperability,” in
System Sciences (HICSS), 2013 46th Hawaii International Conference on, 2012, no.
October, pp. 1652–1661.
[368] G. Weir and A. Aßmuth, “Strategies for Intrusion Monitoring in Cloud
Services,” in Cloud Computing 2017: The Eighth International Conference on Cloud
Computing, GRIDs, and Virtualization, 2017, pp. 1–5.
[369] G. Aceto, A. Botta, W. De Donato, and A. Pescapè, “Cloud monitoring: A
survey,” Computer Networks, vol. 57, no. 9. 2013.
[370] S. Pearson and A. Charlesworth, “Accountability as a way forward for privacy
protection in the cloud,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes
Artif. Intell. Lect. Notes Bioinformatics), vol. 5931 LNCS, no. December, pp. 131–
144, 2009.
[371] J. Yang and Z. Chen, “Cloud Computing Research and Security Issues,”
Computing, pp. 10–12, 2010.
[372] S. S. Yau and H. G. An, “Protection of Users’ Data Confidentiality in Cloud
Computing,” Syst. Eng., pp. 1–6, 2010.
[373] L. M. Kaufman, “Data security in the world of cloud computing,” IEEE Secur.
Priv., vol. 7, no. 4, pp. 61–64, Jul. 2009.
[374] A. F. Hart, C. E. Goodale, C. A. Mattmann, P. Zimdars, D. Crichton, P. Lean,
J. Kim, and D. Waliser, “A Cloud-Enabled Regional Climate Model Evaluation System
Categories and Subject Descriptors,” in Secloud ’11, 2011, pp. 43–49.
[375] J. Bacon, D. Eyers, T. F. J.-M. Pasquier, J. Singh, I. Papagiannis, and P.
Pietzuch, “Information Flow Control for Secure Cloud Computing,” IEEE Trans. Netw.
Serv. Manag., vol. 11, no. 1, pp. 76–89, 2014.
[376] J. Chen, C. Wang, B. B. Zhou, L. Sun, Y. C. Lee, and A. Y. Zomaya, “Tradeoffs
between Profit and Customer Satisfaction for Service Provisioning in the Cloud,”
Acm Hpdc’11, pp. 229–238, 2006.
[377] V. Chang, R. J. Walters, and G. B. Wills, “Organisational Sustainability
Modelling – an emerging service and analytics model for evaluating Cloud Computing
adoption with two case studies,” Int. J. Inf. Manage., vol. 36, no. 1, pp. 167–179,
2016.
[378] A. Baldwin, Y. Beres, L. Carrotte, T. Koulouris, B. Monahan, D. Pym, S. Shiu,
and C. Y. Yam, “Exploring Information Stewardship with the Cloud Ecosystem Model,”
in Intl. Conf. on Modeling, Simulation, and Visualization (MSV), 2012, pp. 1–7.
[379] D. J. Solove and W. Hartzog, “The FTC and Privacy and Security Duties for the
Cloud,” SSRN Pap. no 2424998, pp. 1–6, 2014.
[380] E. Deelman, G. Singh, M. Livny, B. Berriman, and J. Good, “The Cost of Doing
Science on the Cloud: The Montage Example,” IEEE Proc. Int.Conf. High Perform.
Comput. Networking, Storage Anal., pp. 1–12, Nov. 2008.
[381] V. Pappas, V. Kemerlis, A. Zavou, M. Polychronakis, and A. D. Keromytis,
“CloudFence: Enabling Users to Audit the Use of their Cloud-Resident Data,” 2012.
[382] B. Grobauer, T. Walloschek, and E. Stocker, “Understanding Cloud Computing
Vulnerabilities,” IEEE Secur. Priv., vol. 9, no. 2, pp. 50–57, 2011.
[383] European Network and Information Security Agency (ENISA), “Cloud Computing -
Benefits, Risks and Recommendations for Information Security,” Computing, 2012.
[Online]. Available: http://www.springerlink.com/index/R357K80TP72R7121.pdf.
[Accessed: 01-Jan-2016].
[384] M. Aranitasi and M. Neovius, “Anomaly Detection in Cloud Based Application
using System Calls,” in Cloud Computing 2017: The Eighth International Conference
on Cloud Computing, GRIDs, and Virtualization, 2017, pp. 1–5.
[385] M. Litoiu and M. Litoiu, “Optimizing Resources in Cloud , a SOA Governance
View,” in GTIP 2010 - Optimization, 2010, pp. 71–75.
[386] N. Papanikolaou, S. Pearson, M. C. Mont, and R. K. L. Ko, “Towards Greater
Accountability in Cloud Computing through Natural-Language Analysis and Automated
Policy Enforcement,” Engineering, pp. 1–4, 2011.
[387] Q. Zhang, L. Cheng, and R. Boutaba, “Cloud computing: State-of-the-art and
research challenges,” J. Internet Serv. Appl., vol. 1, no. 1, pp. 7–18, 2010.
[388] J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, “Twenty Security
Considerations for Cloud-Supported Internet of Things,” IEEE Internet Things J.,
vol. 3, no. 3, pp. 269–284, 2016.
[389] S. Pearson, “Taking account of privacy when designing cloud computing
services,” Proc. 2009 ICSE Work. Softw. Eng. Challenges Cloud Comput. CLOUD 2009,
pp. 44–52, 2009.
[390] V. Chang and G. Wills, “A model to compare cloud and non-cloud storage of Big
Data,” Futur. Gener. Comput. Syst., vol. 57, pp. 56–76, 2016.
[391] L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A Break in the
Clouds: Towards a Cloud Definition,” ACM SIGCOMM Comput. Commun. Rev., vol. 39, no.
1, p. 50, 2008.
[392] M. J. Kavis, “Architecting The Cloud,” Brussels, 2014.
[393] J. Singh, J. Powles, T. Pasquier, and J. Bacon, “Seeing through the clouds:
Management, control and compliance for cloud computing,” Cloud Comput., pp. 1–12,
2015.
[394] V. (J. R. . Winkler, “Chapter 4 - Securing the Cloud: Architecture,” in
Securing the Cloud, Syngress Publishing, 2011, pp. 89–123.
[395] G. Zhang, Y. Yang, and J. Chen, “A privacy-leakage-tolerance based noise
enhancing strategy for privacy protection in cloud computing,” Proc. - 12th IEEE
Int. Conf. Trust. Secur. Priv. Comput. Commun. Trust. 2013, vol. 78, no. 5, pp. 1–
8, Sep. 2013.
[396] B. Wang, B. Li, and H. Li, “Knox: Privacy-Preserving Auditing for Shared Data
with Large Groups in the Cloud,” Lect. Notes Comput. Sci. (including Subser. Lect.
Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 7341 LNCS, pp. 507–525,
2012.
[397] S. Zawoad and R. Hasan, “Trustworthy Digital Forensics in the Cloud,”
Computer (Long. Beach. Calif)., vol. 49, no. 3, 2016.
[398] NIST, “NIST Cloud Computing Forensic Science Challenges,” p. 51, 2014.
[399] C. Low, Y. Chen, and M. Wu, “Understanding the determinants of cloud
computing adoption,” Ind. Manag. Data Syst., vol. 111, no. 7, pp. 1006–1023, 2011.
[400] B. Do Chung, H. Jeon, and K. K. Seo, “A Framework of Cloud service Quality
Evaluation System – Focusing on Security Quality Evaluation,” Int. J. Softw. Eng.
its Appl., vol. 8, no. 4, pp. 41–46, 2014.
[401] F. M. Aymerich, G. Fenu, and S. Surcis, “A Real Time Financial System Based
on Grid and Cloud Computing,” Proc. 2009 ACM Symp. Appl. Comput. - SAC ’09, pp.
1219–1220, 2009.
[402] P. Tobin, L. Tobin, M. McKeever, and J. Blackledge, “On the Development of a
One-Time Pad Generator for Personalising Cloud Security,” in Cloud Computing 2017:
The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization,
2017, pp. 1–6.
[403] GICTF, “Global Inter-Cloud Technology Forum,” GICTF, 2012. [Online].
Available: http://www.gictf.jp/index_e.html.
[404] J. Hoffert, D. C. Schmidt, and A. Gokhale, “Adapting Distributed Real-Time
and Embedded Pub/Sub Middleware for Cloud Computing Environments,” Ifip Int. Fed.
Inf. Process., vol. 6452 LNCS, pp. 21–41, 2010.
[405] P. Schwarz, “Information Privacy in the Cloud,” Tilburg, Vol. 2014-073, 2014.
[406] R. K. L. Ko, B. S. Lee, and S. Pearson, “Towards achieving accountability,
auditability and trust in cloud computing,” Commun. Comput. Inf. Sci., vol. 193
CCIS, no. PART 4, pp. 432–444, 2011.
[407] B. Duncan, A. Happe, and A. Bratterud, “Cloud Cyber Security: Finding an
Effective Approach with Unikernels,” in Advances in Security in Computing and
Communications, J. Sen, Ed. InTech, 2017, p. Chapter 2.
[408] N. Santos, K. P. Gummadi, and R. Rodrigues, “Towards Trusted Cloud
Computing,” Inf. Secur. Tech. Rep., vol. 10, no. 2, p. 5, 2005.
[409] W. Cellary and S. Strykowski, “E-Government Based on Cloud Computing and
Service-Oriented Architecture,” Proc. 3rd Int. Conf. Theory Pract. Electron. Gov. -
ICEGOV ’09, vol. 6, no. 3, p. 5, 2009.
[410] G. Weir and A. Aßmuth, “Strategies for Intrusion Monitoring in Cloud
Services,” in Cloud Computing 2017: The Eighth International Conference on Cloud
Computing, GRIDs, and Virtualization, 2017, pp. 1–5.
[411] S. Zawoad, a K. Dutta, and R. Hasan, “SecLaaS: Secure logging-as-a-service
for cloud forensics,” ASIA CCS 2013 - Proc. 8th ACM SIGSAC Symp. Information,
Comput. Commun. Secur., 2013.
[412] M. Quinn, E. Strauss, and G. Kristandl, “The effects of cloud technology on
management accounting and business decision-making,” 2014.
[413] V. Chang, “The Business Intelligence as a Service in the Cloud,” Futur.
Gener. Comput. Syst., vol. 37, pp. 512–534, 2014.
[414] Taneja, “Taneja Group Emerging Market Forecast (EMF) on Cloud Storage
Products,” 2011.
[415] B. Duncan, M. Whittington, M. G. Jaatun, A. Ramiro, and Z. Reyes, “Could the
Outsourcing of Incident Response Management Provide a Blueprint for Managing Other
Cloud Security Requirements?,” in Enterprise Security Springer Book 2016, V. Chang,
M. Ramachandran, R. Walters, and G. Wills, Eds. Springer, 2016, pp. 1–22.
[416] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for
Data Storage Security in Cloud Computing,” in IEEE INFOCOM 2010, 2010, vol. 62, no.
2, pp. 362–375.
[417] H. Motahari-Nezhad, B. Stephenson, and S. Singhal, “Outsourcing Business to
Cloud Computing Services: Opportunities and Challenges,” IEEE Internet Comput.
Spec. Issue Cloud Comput., vol. 10, pp. 1–18, 2009.
[418] T. Lorünser, Andreas Happe, and D. Slamanig, “ARCHISTAR: Towards Secure and
Robust Cloud Based Data Sharing,” IEEE 7th Int. Conf. Cloud Comput. Technol. Sci.
CloudCom 2015, Vancouver, Novemb. 30 - December 3, pp. 371–378, 2015.
[419] R. Grossman, M. R. Berthold, E. Marcadé, R. Pechter, M. Hoskins, W. Thompson,
and R. Holada, “Open Standards and Cloud Computing KDD-2009 Panel Report,” Exch.
Organ. Behav. Teach. J., pp. 11–18, 2009.
[420] R. R. Bhandari and N. Mishra, “Encrypted IT Auditing and Log Management on
Cloud Computing,” J. Comput. Sci., vol. 8, no. 5, pp. 302–305, 2011.
[421] N. Kilari and R. Sridaran, “A Survey on Security Threats for Cloud
Computing,” Int. J. Eng. Res. Technol., vol. 1, no. 7, pp. 1–10, 2012.
[422] Computing, “Note to CIOs: Get Your Head in the Cloud,” Cloud Computing, pp.
1–4, 2011.
[423] K. Yang and X. Jia, “An Efficient and Secure Dynamic Auditing Protocol for
Data Storage in Cloud Computing,” IEEE Trans. Parallel Distrib. Syst., vol. I, no.
9, pp. 2–5, 2014.
[424] P. Murray, “Enterprise Grade Cloud Computing,” in Proceedings of the Third
Workshop on Dependable Distributed Data Management - WDDM ’09, 2009, vol. 37, no.
11, pp. 1–1.
[425] I. Foster, Y. Zhao, I. Raicu, and S. Lu, “Cloud Computing and Grid Computing
360-Degree Compared,” in Grid Computing Environments Workshop 2008 (GCE ’08), 2008,
pp. 1–10.
[426] E. Brynjolfsson, P. Hofmann, and J. Jordan, “Cloud Computing and Electricity:
Beyond the Utility Model,” Commun. ACM, vol. 53, no. 5, p. 32, May 2010.
[427] N. R. Herbst, S. Kounev, and R. Reussner, “Elasticity in Cloud Computing:
What It Is, and What It Is Not,” Present. as part 10th Int. Conf. Auton. Comput.,
pp. 23–27, 2013.
[428] V. Chang, Y. H. Kuo, and M. Ramachandran, “Cloud computing adoption
framework: A security framework for business clouds,” Futur. Gener. Comput. Syst.,
vol. 57, pp. 24–41, 2016.
[429] B. Loganayagi and S. Sujatha, “Enhancing Cloud Security through Policy
Monitoring Techniques,” Procedia Eng., vol. 30, no. 2011, pp. 654–661, Jan. 2012.
[430] J. Bayuk, “Cloud Security Metrics,” in 2011 6th International Conference on
System of Systems Engineering, 2011, pp. 341–345.
[431] S. C. Wang, K. Q. Yan, S. S. Wang, and C. P. Huang, “Achieving High Efficient
Agreement with Malicious Faulty Nodes on a Cloud Computing Environment,” Proc. 2nd
Int. Conf. Interact. Sci. Inf. Technol. Cult. Hum. - ICIS ’09, pp. 468–473, 2009.
[432] K. Ruan, J. Carthy, T. Kechadi, and I. Baggili, “Cloud forensics definitions
and critical criteria for cloud forensic capability: An overview of survey
results,” Digit. Investig., vol. 10, no. 1, pp. 34–43, 2013.
[433] B. Duncan and M. Whittington, “Enhancing Cloud Security and Privacy:
Broadening the Service Level Agreement,” in The 14th IEEE International Conference
on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15),
2015, pp. 1088–1093.
[434] M. Christodorescu, R. Sailer, D. L. Schales, D. Sgandurra, and D. Zamboni,
“Cloud Security Is Not (Just) Virtualization Security,” Proc. 2009 ACM Work. Cloud
Comput. Secur. - CCSW ’09, p. 97, 2009.
[435] D. Pym and M. Sadler, “Information Stewardship in Cloud Computing,” Int. J.
Serv. Sci. Manag. Eng. Technol., vol. 1, no. 1, pp. 50–67, 2010.
[436] C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving
Public Auditing for Secure Cloud Storage,” IEEE Trans. Comput., vol. 62, no. 2, pp.
362–375, 2013.
[437] T. Pasquier, J. Singh, D. Eyers, and J. Bacon, “CamFlow: Managed Data-sharing
for Cloud Services,” IEEE Trans. Cloud Comput., no. JUNE, pp. 1–1, 2015.
[438] H. A. Bheda and C. S. Thaker, “Virtualization Driven Mashup Container in
Cloud Computing PaaS Model,” in Proceedings of the International Conference on
Computer Communication and Networks CSI- COMNET-2011, 2011, pp. 9–14.
[439] H. A. Lagar-Cavilla, J. A. Whitney, A. Scannell, P. Patchin, S. M. Rumble, E.
de Lara, M. Brudno, and M. Satyanarayanan, “SnowFlock: Rapid Virtual Machine
Cloning for Cloud Computing,” in Proceedings of the 4th …, 2009, pp. 1–12.
[440] A. Baumann, M. Peinado, and G. Hunt, “Shielding applications from an
untrusted cloud with haven,” ACM Trans. Comput. Syst., vol. 33, no. 3, p. 8, 2015.
[441] A. N. Toosi, R. N. Calheiros, and R. Buyya, “Interconnected Cloud Computing
Environments: Challenges, Taxonomy and Survey,” ACM Comput. Surv., vol. 47, no.
212, pp. 1–47, 2014.
[442] S. Intelligence, “23 Best Practices for Cloud Security,” 2014.
[443] M. Pokharel and J. S. Park, “Cloud Computing: Future solution for e-
Governance,” 3rd Int. Conf., p. 409, 2009.
[444] V. Chang, M. Ramachandran, Y. Yao, Y. H. Kuo, and C. S. Li, “A resiliency
framework for an enterprise cloud,” Int. J. Inf. Manage., vol. 36, no. 1, pp. 155–
166, 2016.
[445] S. Bradshaw, C. Millard, and I. Walden, “Contracts for Clouds: Comparison and
Analysis of the Terms and Conditions of Cloud Computing Services,” Int. J. Law Inf.
Technol., vol. 19, no. 3, pp. 187–223, 2011.
[446] A. Khajeh-Hosseini, I. Sommerville, and I. Sriram, “Research Challenges for
Enterprise Cloud Computing,” Inf. Secur., vol. http, no. 1960, 2010.
[447] P. Schoo, V. Fusenig, V. Souza, M. Melo, P. Murray, H. Debar, H. Medhioub,
and D. Zeghlache, “Challenges for Cloud Networking Security,” Lect. Notes Inst.
Comput. Sci. Soc. Telecommun. Eng., vol. 68 LNICST, pp. 298–313, 2011.
[448] T. F. J. M. Pasquier and J. E. Powles, “Expressing and Enforcing Location
Requirements in the Cloud using Information Flow Control,” Proc. - 2015 IEEE Int.
Conf. Cloud Eng. IC2E 2015, pp. 410–415, 2015.
[449] B. Duncan and M. Whittington, “Reflecting on whether checklists can tick the
box for cloud security,” in Proceedings of the International Conference on Cloud
Computing Technology and Science, CloudCom, 2015, vol. 2015–Febru, no. February,
pp. 805–810.
[450] S. Almulla, Y. Iraqi, and A. Jones, “Cloud forensics: A research
perspective,” in 2013 9th International Conference on Innovations in Information
Technology, IIT 2013, 2013, pp. 66–71.
[451] G. Suciu, A. Vulpe, S. Halunga, O. Fratu, G. Todoran, and V. Suciu, “Smart
cities built on resilient cloud computing and secure internet of things,” in
Control Systems and Computer Science (CSCS), 2013 19th International Conference on,
2013, pp. 513–518.
[452] M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “On Technical Security
Issues in Cloud Computing,” in 2009 IEEE International Conference on Cloud
Computing, 2009, pp. 109–116.
[453] K. Ramachandran, T. Margoni, and M. Perry, “Clarifying Privacy in the
Clouds,” Computing, no. c, pp. 12–17, 2011.
[454] E. K. Iyer, V. Tilak, V. Narayanaswamy, and T. Panda, “Cloud Computing and
Modelling of Cash Flows for Full vs. Fractional Adoption of Cloud,” in Proceedings
of the International Conference on Business Management and Information Systems
(ICBMIS), 2012, pp. 112–117.
[455] D. Agrawal, S. Das, and A. El Abbadi, “Big Data and Cloud Computing: New Wine
or just New Bottles?,” Proc. VLDB Endow., vol. 3, no. 1–2, pp. 1647–1648, 2010.
[456] A. Haeberlen, “A Case for the Accountable Cloud,” ACM SIGOPS Oper. Syst.
Rev., vol. 44, no. 2, p. 52, 2010.
[457] Y. Ren, Y. Chen, J. Yang, and B. Xie, “Privacy-preserving Ranked Multi-
Keyword Search Leveraging Polynomial Function in Cloud Computing,” 2014.
[458] F. Doelitzscher, C. Reich, M. Knahl, and N. Clarke, “An Autonomous Agent
Based Incident Detection System for Cloud Environments,” in Cloud Computing
Technology and Science (CloudCom), 2011 IEEE Third International Conference on,
2011, pp. 197–204.
[459] P. Banerjee, C. Bash, R. Friedrich, P. Goldsack, B. a Huberman, L. Morell, C.
Patel, P. Ranganathan, M. Trucco, and A. Veitch, “The future of cloud computing: an
HP Labs perspective,” IEEE Comput., pp. 1–12, 2010.
[460] P. Mvelase, N. Dlodlo, Q. Williams, and M. Adigun, “Virtual Enterprise Model
for Enabling Cloud Computing for SMMEs,” ISWSA ’11 Proc. 2011 Int. Conf. Intell.
Semant. Web-Services Appl., pp. 1–6, 2011.
[461] M. Aranitasi and M. Neovius, “Anomaly Detection in Cloud Based Application
using System Calls,” in Cloud Computing 2017: The Eighth International Conference
on Cloud Computing, GRIDs, and Virtualization, 2017, pp. 1–5.
[462] H. Ma, G. Shen, M. Chen, and J. Zhang, “Technologies based on Cloud Computing
Technology,” Adv. Sci. Technol. Lett., vol. 82, no. SoftTech, pp. 1–5, 2015.
[463] J. Zhou, S. Zheng, D. Jing, and H. Yang, “An Approach of Creative Application
Evolution on Cloud Computing Platform,” Technology, pp. 54–58, 2011.
[464] C. Millard, I. Walden, and W. K. Hon, “Who is Responsible for ‘Personal Data’
in Cloud Computing? The Cloud of Unknowing, Part 2,” Leg. Stud., vol. 27, no. 77,
pp. 1–31, 2012.
[465] S. A. Almulla, Y. Iraqi, and A. Jones, “A State-of-the-Art Review of Cloud
Forensics,” J. Digit. Forensics, Secur. Law, vol. 9, no. 4, pp. 7–28, 2014.
[466] M. Cusumano, “Cloud computing and SaaS as new computing platforms,” Commun.
ACM, vol. 53, no. 4, p. 27, Apr. 2010.
[467] H. Ma, K.-D. Schewe, and H. Xie, “Using XML for Cloud Specification and
XQuery for Service Discovery,” Proc. 12th Int. Conf. Inf. Integr. Web-based Appl.
Serv. - iiWAS ’10, p. 126, 2010.
[468] Å. Edlund and M. Koopmans, “Practical Cloud Evaluation from a Nordic eScience
User Perspective,” Analysis, pp. 29–37, 2011.
[469] D. Kossmann, T. Kraska, and S. Loesing, “An evaluation of alternative
architectures for transaction processing in the cloud,” in Proceedings of the 2010
International Conference on Management of Data, 2010, pp. 579–590.
[470] J. Wang, Y. Zhao, S. Jiang, and J. Le, “Providing Privacy Preserving in Cloud
Computing,” in 3rd International Conference on Human System Interaction, HSI’2010 -
Conference Proceedings, 2010, pp. 472–475.
[471] S. Graupner, S. Basu, and S. Singhal, “Business Operating Environment for
Service Clouds,” in Business, 2011, pp. 1–11.
[472] HP, “Five Myths of Cloud Computing,” Nov. 2011.
[473] W. Zhou, M. Sherr, W. R. Marczak, Z. Zhang, T. Tao, B. T. Loo, and I. Lee,
“Towards a Data-centric View of Cloud Security,” Challenges, pp. 25–32, 2010.
[474] K. Irion, “Government Cloud Computing and the Policies of Data Sovereignty,”
Budapest, Hungary, 2011.
[475] M. Sookhak, A. Gani, H. Talebian, A. Akhunzada, S. U. Khan, R. Buyya, and A.
Y. Zomaya, “Remote Data Auditing in Cloud Computing Environments: A Survey,
Taxonomy, and Open Issues,” ACM Comput. Surv., vol. 47, no. 4, 2015.
[476] J. Ryan, “The Uncertain Future: Privacy and Security in Cloud Computing,”
Santa Clara Law Rev., vol. 54, no. 2, pp. 497–525, 2014.
[477] T.-S. Chou, “Security Threats on Cloud Computing Vulnerabilities,” Int. J.
Comput. Sci. Inf. Technol., vol. 5, no. 3, pp. 79–88, 2013.
[478] A. Happe, B. Duncan, and Alfred Sewitsky Bratterud, “Unikernels for Cloud
Architectures: How Single Responsibility can Reduce Complexity, Thus Improving
Enterprise Cloud Security,” in The 2nd International Conference on Complexity,
Future Information Systems and Risk, 2017, pp. 1–12.
[479] W. K. Hon, J. Hörnle, and C. Millard, “Data Protection Jurisdiction and Cloud
Computing – When are Cloud Users and Providers Subject to EU Data Protection Law?,”
Int. Rev. Law, Comput. Technol., vol. 26, no. 2–3, pp. 129–164, 2012.
[480] D. Catteddu, M. Felici, G. Hogben, A. Holcroft, E. Kosta, R. Leened, C.
Millard, M. Niezen, D. Nunez, N. Papanikolaou, S. Pearson, D. Pradelles, C. Reed,
C. Rong, J.-C. Royer, D. Stefanatou, and T. W. Wlodarczyk, “Towards a Model of
Accountability for Cloud Computing Services,” in International Workshop on
Trustworthiness, Accountability and Forensics in the Cloud (TAFC), 2013, pp. 21–30.
[481] S. Pearson, M. C. Mont, and G. Kounga, “Enhancing accountability in the cloud
via sticky policies,” in Communications in Computer and Information Science, 2011,
vol. 187 CCIS, pp. 146–155.
[482] CSO, “Cloud Standards,” CSO, 2013. [Online]. Available: http://cloud-
standards.org/.
[483] B. Duncan and M. Whittington, “Enhancing Cloud Security and Privacy: The
Cloud Audit Problem,” in Cloud Computing 2016: The Seventh International Conference
on Cloud Computing, GRIDs, and Virtualization, 2016, pp. 119–124.
[484] T. August, M. F. Niculescu, and H. Shin, “Cloud Computing: Implications on
Software Network Structure and Security Risks,” Inf. Syst. Res., vol. 25, no. 3, p.
489, 2014.
[485] A. Behl and K. Behl, “An Analysis of Cloud Computing Security Issues,” in
Proceedings of the 2012 World Congress on Information and Communication
Technologies, WICT 2012, 2012, pp. 109–114.
[486] Z. Shen, L. Li, F. Yan, and X. Wu, “Cloud Computing System Based on Trusted
Computing Platform,” 2010 Int. Conf. Intell. Comput. Technol. Autom., pp. 942–945,
2010.
[487] A. Ruiz-Alvarez and M. Humphrey, “An Automated Approach to Cloud Storage
Service Selection,” Proc. 2nd Int. Work. Sci. cloud Comput., vol. 3, no. 4, pp. 39–
48, 2011.
[488] F. Marturana, S. Tacconi, and G. Me, “A case study on digital forensics in
the cloud,” in Cyber-Enabled Distributed Computing and Knowledge Discovery
(CyberC), 2012 International Conference on. IEEE, 2012., 2012, pp. 111–116.
[489] W. Benghabrit, H. Grall, J.-C. Royer, M. Sellami, M. Azraoui, K. Elkhiyaoui,
M. Onen, A. S. De Olivera, and K. Bernsmed, “A Cloud Accountability Policy
Representation Framework,” in CLOSER-4th International Conference on Cloud
Computing and Services Science, 2014, pp. 489–498.
[490] E. N. and I. S. Agency, “Cloud Computing: Benefits, Risks and Recommendations
for Information Security - Google Search,” Computing, vol. 72, no. 1, pp. 2009–
2013, 2009.
[491] G. Xu, W. Yu, Z. Chen, H. Zhang, P. Moulema, X. Fu, and C. Lu, “A cloud
computing based system for cyber security management,” Int. J. Parallel, Emergent
Distrib. Syst., vol. 30, no. 1, pp. 29–45, 2015.
[492] HP, “Finding the Right Cloud Solutions for your Organization,” 2011.
[493] R. K. L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang,
and B. S. Lee, “TrustCloud: A framework for accountability and trust in cloud
computing,” Proc. - 2011 IEEE World Congr. Serv. Serv. 2011, pp. 584–588, 2011.
[494] Cisco, “Cisco Cloud Enablement Services,” 2011.
[495] B. Duncan, A. Bratterud, and A. Happe, “Enhancing Cloud Security and Privacy:
Time for a New Approach?,” in Intech 2016, 2016, pp. 1–6.
[496] A. Bratterud, A.-A. Walla, H. Haugerud, P. E. Engelstad, and K. Begnum,
“IncludeOS: A Minimal, Resource Efficient Unikernel for Cloud Services,” 2015 IEEE
7th Int. Conf. Cloud Comput. Technol. Sci., pp. 250–257, 2015.
[497] HMG, “Implementing the Cloud Security Principles,” 2016. [Online]. Available:
https://www.gov.uk/government/publications/implementing-the-cloud-security-
principles/implementing-the-cloud-security-principles%0A. [Accessed: 01-Jan-2016].
[498] W. Kim, S. D. Kim, E. Lee, and S. Lee, “Adoption Issues for Cloud Computing,”
Proc. 7th Int. Conf. Adv. Mob. Comput. Multimed. - MoMM ’09, pp. 3–6, 2009.
[499] M. Alhamad, T. Dillon, C. Wu, and E. Chang, “Response Time for Cloud
Computing Providers,” Response, pp. 8–10, 2010.
[500] L. J. Sotto, B. C. Treacy, and M. L. Mclellan, “Privacy and Data Security
Risks in Cloud Computing,” World Commun. Regul. Rep., vol. 5, no. 2, p. 38, 2010.
[501] N. Sclater, “eLearning in the Cloud,” Int. J. Virtual Pers. Learn. Environ.,
vol. 1, no. 1, pp. 10–19, 2012.
[502] R. Marty, “Cloud Application Logging for Forensics,” Proc. 2011 ACM Symp.
Appl. Comput. - SAC ’11, p. 7, 2011.
[503] C. Reed, “Information ‘Ownership’ in the Cloud,” London, Legal Studies
Research Paper No. 45/2010, 2010.
[504] Frederick R. Carlson, “A Security Analysis of Cloud Computing,” Ieee, pp. 1–
2, 2011.
[505] CSA, “Security Guidance for Critical Areas of Focus in Cloud Computing v3.0,”
2011.
[506] CSCC, “Cloud Standards Customer Council,” Cloud Standards Customer Council,
2015. .
[507] A. Bratterud, A.-A. Walla, P. E. Engelstad, K. Begnum, and others,
“IncludeOS: A minimal, resource efficient unikernel for cloud services,” in 2015
IEEE 7th International Conference on Cloud Computing Technology and Science
(CloudCom), 2015, pp. 250–257.
[508] B. Duncan and M. Whittington, “Information Security in the Cloud: Should We
be Using a Different Approach?,” in 2015 IEEE 7th International Conference on Cloud
Computing Technology and Science (CloudCom), 2015, pp. 523–528.
[509] OCC, “OCC - Open Cloud Consortium,” 2011. [Online]. Available:
http://opencloudconsortium.org.
[510] M. Iansiti and G. L. Richards, “Economic Impact of Cloud Computing,” Econ.
Innov. New Technol., vol. 7, no. 2000, pp. 1–42, 2010.
[511] S. Pearson and A. Benameur, “Privacy, Security and Trust Issues Arising from
Cloud Computing,” in 2010 IEEE Second International Conference on Cloud Computing
Technology and Science, 2010, no. December, pp. 693–702.
[512] N. Papanikolaou, S. Pearson, and M. C. Mont, “Towards Natural-Language
Understanding and Automated Enforcement of Privacy Rules and Regulations in the
Cloud: Survey and Bibliography,” Analysis, pp. 1–9, 2011.
[513] Rationalsurvivability.com, “A Cloud Reference Model,” 2009. [Online].
Available: http://www.rationalsurvivability.com/blog/?s=taxonomy. [Accessed: 01-
Apr-2012].
[514] V. Roussev, L. Wang, G. Richard, and L. Marziale, “A cloud computing platform
for large-scale forensic computing,” Adv. Digit. Forensics V, pp. 201–214, 2009.
[515] M. Macías and J. Guitart, “A Genetic Model for Pricing in Cloud Computing
Markets,” Proc. 2011 ACM Symp. Appl. Comput., no. July, p. 113, 2011.
[516] R. Buyya, C. S. Yeo, and S. Venugopal, “Market-Oriented Cloud Computing:
Vision, Hype, and Reality for Delivering IT Services as Computing Utilities,” in
High Performance Computing and Communications, 2008. HPCC’08. 10th IEEE
International Conference on, 2008, pp. 5–13.
[517] M. Raho, A. Spyridakis, M. Paolino, and D. Raho, “KVM, Xen and Docker: A
performance analysis for ARM based NFV and cloud computing,” in Advances in
Information, Electronic and Electrical Engineering, AIEEE 2015 - Proceedings of the
2015 IEEE 3rd Workshop, 2015.
[518] M. Creeger, “Distributed Computing CTO Roundtable: Cloud Computing,” Distrib.
Comput., vol. 7, no. 5, pp. 1–18, 2009.
[519] A. Rosenthal, P. Mork, M. H. Li, J. Stanford, D. Koester, and P. Reynolds,
“Cloud computing: A new business paradigm for biomedical information sharing,” J.
Biomed. Inform., vol. 43, no. 2, pp. 342–353, Apr. 2010.
[520] S. Tai, J. Nimis, A. Lenk, and M. Klems, “Cloud Service Engineering,”
Networks, pp. 475–476, 2010.
[521] A. Baldwin, D. Pym, and S. Shiu, “Enterprise Information Risk Management:
Dealing with Cloud Computing,” Abdn.Ac.Uk, pp. 257–291, 2013.
[522] J. Wang and M. N. Huhns, “Using Simulations to Assess the Stability and
Capacity of Cloud Computing Systems,” Computing, pp. 1–6, 2010.
[523] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Verifiability
and Data Dynamics for Storage Security in Cloud Computing,” in IEEE Transactions on
Parallel and Distributed Systems, 2011, vol. 22, no. 5, pp. 847–859.
[524] L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. V. Vasilakos,
“Security and privacy for storage and computation in cloud computing,” Inf. Sci.
(Ny)., vol. 258, pp. 371–386, 2014.
[525] K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie, “Cloud forensics,” in
Advances in Digital Forensics VII, IFIP Advances in Information and Communication
Technology, 2011, vol. 361, no. 2009, pp. 35–46.
[526] E. Keller, J. Szefer, J. Rexford, and R. B. Lee, “NoHype: Virtualized Cloud
Infrastructure without the Virtualization,” in Proceedings of the 37th annual
international symposium on Computer architecture, 2010, p. 350.
[527] W. J. Robison, “Free at What Cost?: Cloud Computing Privacy Under the Stored
Communications Act,” Georgetown Law J., vol. 98, no. 4, pp. 1195–1239, 2010.
[528] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud
computing and emerging IT platforms: Vision, hype, and reality for delivering
computing as the 5th utility,” Futur. Gener. Comput. Syst., vol. 25, no. 6, p. 17,
2009.
[529] W. K. Hon, C. Millard, J. Singh, I. Walden, and J. Crowcroft, “Policy, legal
and regulatory implications of a Europe-only cloud,” Int. J. Law Inf. Technol.,
vol. 24, no. 3, pp. 251–278, 2016.
[530] B. Duncan, D. J. Pym, and M. Whittington, “Developing a Conceptual Framework
for Cloud Security Assurance,” in 2013 IEEE 5th International Conference on Cloud
Computing Technology and Science, 2013, pp. 120–125.
[531] M. Neovius and B. Duncan, “Anomaly Detection for Soft Security in Cloud based
Auditing of Accounting Systems,” in Closer 2017 - 7th International Conference on
Cloud Computing and Services Science, 2017, pp. 1–8.
[532] R. K. L. Ko, P. Jagadpramana, and B. S. Lee, “Flogger: A File-centric Logger
for Monitoring File Access and Transfers within Cloud Computing Environments,”
Proc. 10th IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. Trust. 2011, 8th
IEEE Int. Conf. Embed. Softw. Syst. ICESS 2011, 6th Int. Conf. FCST 2011, pp. 765–
771, 2011.
[533] T. Ruebsamen and C. Reich, “Supporting Cloud Accountability by Collecting
Evidence Using Audit Agents,” in Proceedings of the International Conference on
Cloud Computing Technology and Science, CloudCom, 2013, vol. 1, pp. 185–190.
[534] Z. Xiao and Y. Xiao, “Security and Privacy in Cloud Computing,” Commun. Surv.
Tutorials, IEEE, vol. 15, no. 2, pp. 843–859, 2013.
[535] M. Sookhak, A. Gani, M. K. Khan, and R. Buyya, “Dynamic remote data auditing
for securing big data storage in cloud computing,” Inf. Sci. (Ny)., vol. 380, 2017.