References
- North Bridge Venture Partners, "Future of Cloud Computing Survey", 2013.6
- CSA, Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, CSA Research, 2011
- NIST (2009). The NIST Cloud Definition Framework. Retrieved March 14, 2011 from http://csrc.nist.gov/groups/SNS/cloud-computing/cloud-computing-v26.ppt
- Cloud Security Top Threats, CSA, 2013
- "VM escape" http://www.zdnet.com/blog/security/us-cert-warns-of-guest-to-host-vm-escape-vulnerability/12471
- "Xen security advisory 19 (CVE-2012-4411). guest administrator can access QEMU monitor console." http://lists.xen.org/archives/html/xenannounce/2012-09/msg00008.html
- V. Varadarajan, et al., "Resource-freeing attacks: improve your cloud performance (at your neighbor's expense)," in Proc. 2012 ACM Comput. Commun. Security Conf.
- J. Somorovsky, et al., "All your clouds belong to us.security analysis of cloud management interfaces," in 2011 ACM Comput. Commun. Security Conf.
- Y. Zhang, et al., "Cross-VM side channels and their use to extract private keys," in 2012 ACM Comput. Commun. Security Conf.
- R. Beverly, R. Koga, and K. C Claffy, "Initial longitudinal analysis of IP source spoofing capability on the Internet," July 2013. http://www.internetsociety.org/doc/initial-longitudinalanalysis-ipsource-spoofing-capability-internet
- J. Idziorek, M. F. Tannian, and D. Jacobson, "The insecurity of cloud utility models," IEEE Cloud Comput., pp. 14.18, May.June 2013.
- Habiba, U., Masood, R., Shibli, M. A., & Niazi, M. A. (2014). Cloud identity management security issues & solutions: a taxonomy. Complex Adaptive Systems Modeling, 2(1), 1-37. https://doi.org/10.1186/2194-3206-2-1
- Y. Shin, M. Yoon, K. Son, "Design of a Versatile Hypervisor-based Platform for Virtual Network-Host Intrusion Prevention", Proceedings of International Conference on Information Processing and Management (ICIPM), 2013
- VMware, "vCloud Networking and Security," http://www.vmware.com/products/datacentervirtualization/vcloud-network-security/