[1] S. Roschke, et aI., "Intrusion Detection in the
Cloud," presented at the Eighth IEEE International
Conference on Dependable, AutonomIc and Secure
Computing, Chengdu, China, 2009.
[2] C. Almond, "A Practical Guide to Cloud Computing
Security," 27 August 2009
[3] http://cloudsecurity.trendmicro.com/
[4] T. Mather. (2011). Data Leakage Prevention and
Cloud Computing.Available:
http://www.kpmg.com/Globa1/Pages/default.aspx
[5] N. Mead, et ai, "Security quality requirements
engineering(SQUARE) methodolgy," Carnegie
Mellon Software Engineering
Institute.
[6] Security Management in the Cloud.
Availablehttp://mscerts.net/programming/Security%
20Management%20in%20the%20Cloud.aspx
[7] z. Zorz, "Top 7 threats to cloud computing," 2010.
[8] G. Ateniese, et al., "Provable data possession at
untrusted stores," presented at the Proceedings of the
14th ACM conference on Computer and
communications security, Alexandria, Virginia,
USA, 2007.
[9] D. Boneh, et al., "Aggregate and
VerifiablyEncrypted Signatures from Bilinear
MapsAdvances in Cryptology — EUROCRYPT
2003." vol.2656, E. Biham, Ed., ed: Springer Berlin
/Heidelberg, 2003, pp. 641-641.
[10] E. Mykletun, et al., "Authentication and integrity in
outsourced databases," Trans. Storage, vol. 2, pp.
107-138, 2006.
[11] Juels and J. Burton S. Kaliski, "Pors: proofs of
retrievability for large files," presented at the
Proceedings of the 14th ACM conference on
Computer and communications security, Alexandria,
Virginia, USA, 2007.
[12] G. Ateniese, et al., "Scalable and efficient provable
data possession," presented at the Proceedings of the
4th international conference on Security and privacy
in communication netowrks, Istanbul,
Turkey, 2008.
[13] Erway, et al., "Dynamic provable data possession,"
presented at the Proceedings of the 16th ACM
conference on Computer and communications
security, Chicago, Illinois, USA,
2009.
[14] K. D. Bowers, et al., "HAIL: a high-availability and
integrity layer for cloud storage," presented at the
Proceedings of the 16th ACM conference on
Computer and communications security, Chicago,
Illinois, USA, 2009
[15] K. D. Bowers, et al., "Proofs of retrievability: theory
and implementation," presented at the Proceedings of
the 2009 ACM workshop on Cloud computing
security, Chicago, Illinois, USA, 2009.
[16] Y. Dodis, et al., "Proofs of Retrievability via
Hardness Amplification, Theory of Cryptography, ."
vol. 5444, O. Reingold, Ed., ed: Springer Berlin /
Heidelberg, 2009, pp. 109-127.
[17] Q. Zheng and S. Xu, "Fair and dynamic proofs of
retrievability," presented at the Proceedings of the
first ACM conference on Data and application
security and privacy, San Antonio, TX, USA, 2011.
[18] E. Stefanov, et al., "Iris: A Scalable Cloud File
System with Efficient Integrity Checks."
[19] Q. Wang, et al., "Enabling Public Verifiability and
Data Dynamics for Storage Security in Cloud
Computing; Computer Security – ESORICS 2009."
vol. 5789, M. Backes and P. Ning, Eds., ed: Springer
Berlin / Heidelberg, 2009, pp. 355-370.