2ENISA. Benefits, Risks and Recommendations for Information Security [ EB/OL]. [2010-05-10]. http://www. enisa, europa, eu/act/rm/files/deliverables/cloud-computing-risk-assessment? scarchterm = cloud + computing.
3MATHER T, KUMARASWAMY S, LATIF S. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance[ M]. [ s. l. ] :O'Reilly Media, Inc., 2009.
4MELL P, GRANCE T. The NIST Definition of Cloud Computing [ EB/OL ]. [ 2010-05-10 ]. http ://csrc. nist. gov/groups/SNS/cloud-computing/.
5CSA. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 [ EB/OL]. [ 2010-05-10]. http: //www. cloudsecurityalliance, org/guidance/.
8GARTNER. Assessing the Security Risks of Cloud Computing[ EB/OL]. [ 2010-05-10 ]. http: //www. gartner. com/DisplayDocument? id = 685308.
9WEI Jin-peng, ZHANG Xiao-lan. Managing Security of Virtual Machine Images in a Cloud Environment [ C ] //Proceedings of the 2009 ACM workshop on Cloud computing security. Chicago : [ s. n. ] ,2009:91-96.
10KANDUKURI B R, PATURI V R, RAKSHIT A. Cloud Security Issues [ C ] //IEEE International Conference on Services Computing ( SCC '09 ), Bangalore : [ s. n. ], 2009 : 517-520.