82
BIBLIOGRAPHY
Behl, A., Behl, K., 2012. An analysis of cloud computing security issues, in: 2012 World Congress on
Information and Communication Technologies (WICT). Presented at the 2012 World Congress
on Information and Communication Technologies (WICT), pp. 109 –114.
Buyya, R., Ranjan, R., Calheiros, R.N., 2009. Modeling and simulation of scalable Cloud computing
environments and the CloudSim toolkit: Challenges and opportunities, in: International
Conference on High Performance Computing Simulation, 2009. HPCS ’09. Presented at the
International Conference on High Performance Computing Simulation, 2009. HPCS ’09, pp. 1 –
11.
Fusenig, V., Sharma, A., 2012. Security architecture for cloud networking, in: 2012 International
Conference on Computing, Networking and Communications (ICNC). Presented at the 2012
International Conference on Computing, Networking and Communications (ICNC), pp. 45–49.
Grobauer, B., Walloschek, T., Stocker, E., 2011. Understanding Cloud Computing Vulnerabilities. IEEE
Security Privacy 9, 50 –57.
Hanna, E.M., Mohamed, N., Al-Jaroodi, J., 2012. The Cloud: Requirements for a Better Service, in: 2012
12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid).
Presented at the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid
Computing (CCGrid), pp. 787–792.
Jain, P., Rane, D., Patidar, S., 2011. A survey and analysis of cloud model-based security for computing
secure cloud bursting and aggregation in renal environment, in: 2011 World Congress on
Information and Communication Technologies (WICT). Presented at the 2011 World Congress
on Information and Communication Technologies (WICT), pp. 456 –461.
Kandukuri, B.R., Paturi, V.R., Rakshit, A., 2009. Cloud Security Issues, in: IEEE International
Conference on Services Computing, 2009. SCC ’09. Presented at the IEEE International
Conference on Services Computing, 2009. SCC ’09, pp. 517 –520.
Kaufman, L.M., 2009. Data Security in the World of Cloud Computing. IEEE Security Privacy 7, 61 –64.
Khorshed, M.T., Ali, A.B.M.S., Wasimi, S.A., 2011. Trust Issues that Create Threats for Cyber Attacks in