Quellen
Autoren: Philipp Viertel, André Kaleja
- http://www.datacenterknowledge.com/archives/2015/02/23/openstack-vs-cloudstack-the-platforms-and-the-cloud-apis/ (Abgerufen am 30.06.2017).
- https://opennebula.org/eucalyptus-cloudstack-openstack-and-opennebula-a-tale-of-two-cloud-models/ (Abgerufen am 30.06.2017).
- https://docs.openstack.org/admin-guide/ (Abgerufen am 30.06.2017).
- https://docs.openstack.org/ocata/install-guide-ubuntu/InstallGuide.pdf (Abgerufen am 30.06.2017).
- https://docs.openstack.org/security-guide/ (Abgerufen am 30.06.2017).
- http://docs.cloudstack.apache.org/en/latest/ (Abgerufen am 30.06.2017).
- http://docs.opennebula.org/5.2/index.html (Abgerufen am 30.06.2017).
- http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf (Abgerufen am 02.07.2017)
- Handbook on Securing Cyber-Physical Critical Infrastructure, Foundations and Challenges Sajal Das, Krishna Kant, Nan Zhang ISBN: 978-0-12-415815-3
- Security, Privacy and Trust in Cloud Systems Surya Nepal, Mukaddim Pathan ISBN 978-3-642-38586-51010
- Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations Abould Ella Hassanien, Tai-Hoon Kim, Janusz Kacprzyk, Ali Ismail Awad ISBN 978-3-662-43616-5
- Zhou M, Zhang R, XieW, QianW, Zhou A (2010) Security and privacy in cloud computing: a survey. In: 6th international conference on semantics knowledge and grid (Ningbo, China,2010), pp 105–112
- ZissisD, LekkasD(2012) Addressing cloud computing security issues. FutureGener ComputSys 28(2012):583–592
- Xiao Z, XiaoY(2012) Security and privacy in cloud computing. IEEECommunSurvTutorials 2012:1–17
- Rong C, Nguyen ST, Jaatun MG (2012) A survey on security challenges in cloud computing Comput Elect Engi Beyond Lightning
- KhorshedMT,Ali ABMS,Wasimi SA(2012)Asurvey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gen Comput Sys 28(2012):833–851
- Gartner (2008) Assessing the security risks of cloud computing. http://cloud.ctrls.in/files/assessing-the-security-risks.pdf. White Paper
- ENISA (2009) Cloud computing: benefits, risks and recommendations for infomarion security. http://www.enisa.europa.eu/activities/risk-management/files/deliverables/cloud-computing-risk-assessment . White Paper
- CSA (2010) Top threats to cloud computing. https://cloudsecurityalliance.org/research/topthreats/ . White paper
- Subashini S, Kavitha V (2011) A survey on security issues in service deliverymodels of cloud computing. J Netw Comput Appl 34(2011):1–11