[1]
|
Xiao, Z. and Xiao, Y. (2013) Security and Privacy in Cloud Computing. IEEE Communications Surveys & Tutorials, 15, 843-859.
|
[2]
|
Cloud Security Alliance (2010) Top Threat to Cloud Computing.
https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
|
[3]
|
Amazon: Amazon Glacier. http://aws.amazon.com/glacier/
|
[4]
|
Quarks Lab (2013) iMessage Privacy. http://blog.quarkslab.com/imessage-privacy.html
|
[5]
|
Mutch, J. (2010) How to Steal Data from the Cloud.
http://www.cloudbook.net/resources/stories/how-to-steal-data-from-the-cloud
|
[6]
|
Yorozu, Y., Hirano, M., Oka, K. and Tagawa, Y. (1982) Electron Spectroscopy Studies on Magneto-Optical Media and Plastic Substrate Interface. IEEE Translation Journal on Magnetics in Japan, 2, 740-741.
|
[7]
|
Amazon: Service Level Agreement. http://aws.amazon.com/ec2-sla/
|
[8]
|
Kirchgaessner, S. (2013) Cloud Storage Carries Potent Security Risk.
http://www.ft.com/cms/s/0/4729ed7c-3722-11e3-9603-00144feab7de.html
|
[9]
|
Lemos, R. (2012) Insecure API Implementations Threaten Cloud.
http://www.darkreading.com/cloud/insecure-api-implementations-threaten-cl/232900809
|
[10]
|
Lemos, R. (2013) Vulnerable APIs Continue to Pose Threat to Cloud.
http://www.darkreading.com/services/vulnerable-apis-continue-to-pose-threat/240146453
|
[11]
|
Porticor Cloud Security (2013) Did Snowden Compromise the Future of Cloud Security? http://www.porticor.com/2013/07/cloud-security-snowden/
|
[12]
|
Amazon: Amazon Web Services. http://aws.amazon.com
|
[13]
|
SilverSky (2013) The Future of Cloud Computing and the Latest Security Threats.
https://www.silversky.com/blog/the-future-of-cloud-computing-and-the-latest-security-threats
|
[14]
|
Columbia University (2012) Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud.
http://www.cs.columbia.edu/~angelos/Papers/2012/Fog_Computing_Position_Paper_WRIT_2012.pdf
|
[15]
|
Amazon: Amazon Machine Image (AMI). http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/AMIs.html
|
[16]
|
Amazon: Amazon EBS. http://aws.amazon.com/ebs/
|
[17]
|
Amazon: Amazon EBS Product Details. http://aws.amazon.com/ebs/details/#snapshots
|
[18]
|
Amazon: Amazon EC2 Instance Store.
http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/InstanceStorage.html
|
[19]
|
MailChimp (2014) About API Keys. http://kb.mailchimp.com/accounts/management/about-api-keys
|
[20]
|
Janssen, C. Full-Disk Encryption (FDE). http://www.techopedia.com/definition/13623/full-disk-encryption-fde
|
[21]
|
Cover, R. (2010) Security Assertion Markup Language (SAML). http://xml.coverpages.org/saml.html
|
[22]
|
United Sates Department of Veterans Affairs (2014) Keyed-Hash Message Authentication Code (HMAC).
http://www.va.gov/trm/StandardPage.asp?tid=5296
|
[23]
|
Goodin, D. (2009) Zeus Bot Found Using Amazon’s EC2 as C&C Server.
http://www.theregister.co.uk/2009/12/09/amazon_ec2_bot_control_channel/
|
[24]
|
Nahorney, B. and Nicolas, F. (2010) Trojan.Zbot.
http://www.symantec.com/security_response/writeup.jsp?docid=2010-011016-3514-99
|
[25]
|
Acunetix: Cross Site Scripting Attack. https://www.acunetix.com/websitesecurity/cross-site-scripting/
|
[26]
|
Amazon: Multi-Factor Authentication. http://aws.amazon.com/iam/details/mfa/
|
[27]
|
The Guardian: The NSA Files. http://www.theguardian.com/world/the-nsa-files
|
[28]
|
SilverSky (2013) About Us. https://www.silversky.com/about-us
|