References

Armbrust, Michael, and Fox Armando, "Above the Clouds: A Berkley View of Cloud Computing," February 10, 2009.

Balding, Craig, "ITG2008 World Cloud Computing Summit," 2008, http://cloudsecurity.org.

BEinGRID Project, Gridipedia: GridDic — "The Grid Computing Glossary, 2009," www.gridipedia.eu/grid-computing-glossary.html.

Brodkin, Jon, "Seven Cloud-Computing Security Risks," 2008, www.networkworld.com/news/2008/070208-cloud.html.

Burton Group, "Attacking and Defending Virtual Environments," www.burtongroup.com/Guest/Srms/AttackingDefendingVirtual.aspx.

Cavoukian, Ann, "Privacy in the Clouds — A White Paper on Privacy and Digital Identity: Implications for the Internet" (Information and Privacy Commissioner of Ontario), www.ipc.on.ca/images/Resources/privacyintheclouds.pdf.

Center for Internet Security (CIS), Benchmark for Xen 3.2 Version 1.0 May, 2008.

Cavoukian, Ann. Virtual Machine Security Guidelines Version 1.0, September 2007.

Cavoukian, Ann. "CIS Level 1 Benchmark for Virtual Machines," www.cisecurity.org/bench_vm.htm.

P. M. Chen, and B. D. Noble, "When Virtual Is Better Than Real," In HOTOS'01:Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, pg. 133, Washington, DC: IEEE Computer Society, 2001.

Cloud Security Alliance, "Security Guidance for Critical Areas of Focus in Cloud Computing," April 2009, www.cloudsecurityalliance.org/guidance/csaguide.pdf.

Croll, Alistair, "Why Cloud Computing Needs Security," 2008, http://gigaom.com/2008/06/10/the-amazon-outage-fortresses-in-the-clouds/. ...

Get Cloud Security: A Comprehensive Guide to Secure Cloud Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.