@inproceedings{RESIN,
 author = {Yip, Alexander and Wang, Xi and Zeldovich, Nickolai and Kaashoek, M. Frans},
 title = {Improving application security with data flow assertions},
 booktitle = {SOSP '09: Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles},
 year = {2009},
 isbn = {978-1-60558-752-3},
 pages = {291--304},
 location = {Big Sky, Montana, USA},
 doi = {http://doi.acm.org/10.1145/1629575.1629604},
 publisher = {ACM},
 address = {New York, NY, USA},
 }


@inproceedings{AutonomicManagement,
 author = {Aldinucci, Marco and Danelutto, Marco and Kilpatrick, Peter},
 title = {Autonomic management of non-functional concerns in distributed \& parallel application programming},
 booktitle = {IPDPS '09: Proceedings of the 2009 IEEE International Symposium on Parallel\&Distributed Processing},
 year = {2009},
 isbn = {978-1-4244-3751-1},
 pages = {1--12},
 doi = {http://dx.doi.org/10.1109/IPDPS.2009.5161034},
 publisher = {IEEE Computer Society},
 address = {Washington, DC, USA},
 }
@inproceedings{NotJustVirt,
 author = {Christodorescu, Mihai and Sailer, Reiner and Schales, Douglas Lee and Sgandurra, Daniele and Zamboni, Diego},
 title = {Cloud security is not (just) virtualization security: a short paper},
 booktitle = {CCSW '09: Proceedings of the 2009 ACM workshop on Cloud computing security},
 year = {2009},
 isbn = {978-1-60558-784-4},
 pages = {97--102},
 location = {Chicago, Illinois, USA},
 doi = {http://doi.acm.org/10.1145/1655008.1655022},
 publisher = {ACM},
 address = {New York, NY, USA},
 }

@inproceedings{CloudSpace,
author = {An Infrastructure for Teaching CS1 in the Cloud},
author = {Michael Woods and Godmar Back and Stephen Edwards}
}

@article{DataSecurity,
 author = {Kaufman, Lori M.},
 title = {Data Security in the World of Cloud Computing},
 journal = {IEEE Security and Privacy},
 volume = {7},
 number = {4},
 year = {2009},
 issn = {1540-7993},
 pages = {61--64},
 doi = {http://dx.doi.org/10.1109/MSP.2009.87},
 publisher = {IEEE Educational Activities Department},
 address = {Piscataway, NJ, USA},
 }

@inproceedings{TechnicalSecurity,
 author = {Jensen, Meiko and Schwenk, Jorg and Gruschka, Nils and Iacono, Luigi Lo},
 title = {On Technical Security Issues in Cloud Computing},
 booktitle = {CLOUD '09: Proceedings of the 2009 IEEE International Conference on Cloud Computing},
 year = {2009},
 isbn = {978-0-7695-3840-2},
 pages = {109--116},
 doi = {http://dx.doi.org/10.1109/CLOUD.2009.60},
 publisher = {IEEE Computer Society},
 address = {Washington, DC, USA},
 }

@book{CloudBook,
title = {Cloud computing principles, systems and applications},
author = {Nick Antonopoulos},
year = {2010}
}

@ARTICLE{ServiceOrientedComputing,
    author = {Michael P. Papazoglou and Paolo Traverso and Istituto Ricerca and Scientifica Tecnologica},
    title = {Service-Oriented Computing: State of the Art and Research Challenges},
    journal = {IEEE Computer},
    year = {2007},
    volume = {40},
    pages = {2007}
}

@inproceedings{TakingAccount,
 author = {Pearson, Siani},
 title = {Taking account of privacy when designing cloud computing services},
 booktitle = {CLOUD '09: Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing},
 year = {2009},
 isbn = {978-1-4244-3713-9},
 pages = {44--52},
 doi = {http://dx.doi.org/10.1109/CLOUD.2009.5071532},
 publisher = {IEEE Computer Society},
 address = {Washington, DC, USA},
 }

@inproceedings{VirtualizedMobile,
 author = {Oberheide, Jon and Veeraraghavan, Kaushik and Cooke, Evan and Flinn, Jason and Jahanian, Farnam},
 title = {Virtualized in-cloud security services for mobile devices},
 booktitle = {MobiVirt '08: Proceedings of the First Workshop on Virtualization in Mobile Computing},
 year = {2008},
 isbn = {978-1-60558-328-0},
 pages = {31--35},
 location = {Breckenridge, Colorado},
 doi = {http://doi.acm.org/10.1145/1622103.1629656},
 publisher = {ACM},
 address = {New York, NY, USA},
 }

@inproceedings{PrivacyDSL,
 author = {Korba, L.},
 title = {Privacy in Distributed Electronic Commerce},
 booktitle = {HICSS '02: Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 9},
 year = {2002},
 isbn = {0-7695-1435-9},
 pages = {306},
 publisher = {IEEE Computer Society},
 address = {Washington, DC, USA},
 }

@inproceedings{Disambig,
 author = {Jones, Micah and Hamlen, Kevin W.},
 title = {Disambiguating aspect-oriented security policies},
 booktitle = {AOSD '10: Proceedings of the 9th International Conference on Aspect-Oriented Software Development},
 year = {2010},
 isbn = {978-1-60558-958-9},
 pages = {193--204},
 location = {Rennes and Saint-Malo, France},
 doi = {http://doi.acm.org/10.1145/1739230.1739253},
 publisher = {ACM},
 address = {New York, NY, USA},
 }

@inproceedings{EndToEnd,
 author = {Erlingsson, \'{U}lfar and Livshits, Benjamin and Xie, Yinglian},
 title = {End-to-end web application security},
 booktitle = {HOTOS'07: Proceedings of the 11th USENIX workshop on Hot topics in operating systems},
 year = {2007},
 pages = {1--6},
 location = {San Diego, CA},
 publisher = {USENIX Association},
 address = {Berkeley, CA, USA},
 }

@inproceedings{AspectJ,
 author = {AlHadidi, Dima and Belblidia, Nadia and Debbabi, Mourad},
 title = {Security crosscutting concerns and AspectJ},
 booktitle = {PST '06: Proceedings of the 2006 International Conference on Privacy, Security and Trust},
 year = {2006},
 isbn = {1-59593-604-1},
 pages = {1--1},
 location = {Markham, Ontario, Canada},
 doi = {http://doi.acm.org/10.1145/1501434.1501488},
 publisher = {ACM},
 address = {New York, NY, USA},
 }
 
@article{TurnDownTheLAMP,
  title={{Turning Down the LAMP: Software Specialisation for the Cloud}},
  author={Madhavapeddy, A. and Mortier, R. and Sohan, R. and Gazagnaire, T. and Hand, S. and Deegan, T. and McAuley, D. and Crowcroft, J.}
}
@conference{AProSec,
  title={{AProSec: An aspect for programming secure web applications}},
  author={Hermosillo, G. and Gomez, R. and Seinturier, L. and Duchien, L.},
  booktitle={Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on},
  pages={1026--1033},
  year={2007},
  organization={IEEE}
}
@conference{SecuritySoC,
  title={{On the importance of the separation-of-concerns principle in secure software engineering}},
  author={De Win, B. and Piessens, F. and Joosen, W. and Verhanneman, T.},
  booktitle={Workshop on the Application of Engineering Principles to System Security Design, WAEPSSD, Boston, MA, USA},
  year={2002},
  organization={Citeseer}
}
@article{ApplyingAOPToSecurity,
  title={{Applying aspect-oriented programming to security}},
  author={Viega, J. and Bloch, JT and Chandra, P.},
  journal={Cutter IT Journal},
  volume={14},
  number={2},
  pages={31--39},
  year={2001},
  publisher={Citeseer}
}
@conference{EnterpriseSecurityAspects,
  title={{Enterprise security aspects}},
  author={Bodkin, R.},
  booktitle={Proceedings of the AOSD Technology for Application-level Security Workshop},
  volume={9},
  year={2004},
  organization={Citeseer}
}
@conference{AOSDSecurity,
  title={{AOSD \& Security: a practical assessment}},
  author={De Win, B. and Joosen, W. and Piessens, F.},
  booktitle={Workshop on Software engineering Properties of Languages for Aspect Technologies (SPLAT03)},
  pages={1--6},
  year={2003},
  organization={Citeseer}
}
@article{GenericSecurityAspectLibrary,
  title={{Toward a reusable and generic security aspect library}},
  author={Huang, M. and Wang, C. and Zhang, L.},
  journal={AOSD: AOSDSEC},
  volume={4},
  year={2004},
  publisher={Citeseer}
}
@conference{AspectSecurityFramework,
  title={{An aspect-oriented security framework}},
  author={Shah, V. and Hill, F.},
  booktitle={DARPA Information Survivability Conference and Exposition, 2003. Proceedings},
  volume={2},
  pages={143--145},
  year={2003},
  organization={IEEE}
}
@article{EncryptionAOP,
  title={{A case study on estimating the software engineering properties of implementing database encryption as an aspect}},
  author={Bostr{\\"o}m, G.},
  journal={Bergmans et al.[130]}
}
@article{QML,
  title={{Quality-of-service specification in distributed object systems}},
  author={Fr{\o}lund, S. and Koistinen, J.},
  journal={Distributed Systems Engineering},
  volume={5},
  pages={179},
  year={1998},
  publisher={IOP Publishing}
}
@article{WhatsNew,
  title={{What's New About Cloud Computing Security}},
  author={Chen, Y. and Paxson, V. and Katz, R.},
  journal={University of California, Berkeley Report No. UCB/EECS-2010-5 January},
  volume={20},
  number={2010},
  pages={2010--5},
  year={2010}
}
@conference{WebDSLSoC,
  title={{Declarative access control for WebDSL: Combining language integration and separation of concerns}},
  author={Groenewegen, D. and Visser, E.},
  booktitle={Web Engineering, 2008. ICWE'08. Eighth International Conference on},
  pages={175--188},
  year={2008},
  organization={IEEE}
}

@conference{CloudAV,
  title={{Cloudav: N-version antivirus in the network cloud}},
  author={Oberheide, J. and Cooke, E. and Jahanian, F.},
  booktitle={Proceedings of the 17th conference on Security symposium},
  pages={91--106},
  year={2008},
  organization={USENIX Association}
}
@article{AuthenticationInTheClouds,
  title={{Authentication in the Clouds: A Framework and its Application to Mobile Users}},
  author={Chow, R. and Jakobsson, M. and Masuoka, R. and Molina, J. and Niu, Y. and Shi, E. and Song, Z.},
  year={2010}
}
@conference{Ripley,
  title={{Ripley: automatically securing web 2.0 applications through replicated execution}},
  author={Vikram, K. and Prateek, A. and Livshits, B.},
  booktitle={Proceedings of the 16th ACM conference on Computer and communications security},
  pages={173--186},
  year={2009},
  organization={ACM}
}
@article{OpenSourceVerification,
  title={{Open Source Verification under a Cloud}},
  author={Breuer, P.T. and Pickin, S.}
}

@article{Chong:2007,
 author = {Chong, Stephen and Liu, Jed and Myers, Andrew C. and Qi, Xin and Vikram, K. and Zheng, Lantian and Zheng, Xin},
 title = {Secure web applications via automatic partitioning},
 journal = {SIGOPS Oper. Syst. Rev.},
 volume = {41},
 issue = {6},
 month = {October},
 year = {2007},
 issn = {0163-5980},
 pages = {31--44},
 numpages = {14},
 url = {http://doi.acm.org/10.1145/1323293.1294265},
 doi = {http://doi.acm.org/10.1145/1323293.1294265},
 acmid = {1294265},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {compilers, information flow, security policies},
} 




