% bmc_article.bib
% 
%  An example of bibtex entries.
%  Entries taken from BMC instructions for authors page.





@misc{utility,
	author  = {John McCarthy}, 
	title   = {Speech given at MIT Centennial},
	year  = {1961},
	  note  = {If computers of the kind I have advocated become the computers of the future, then computing may someday be organized as a public utility just as the telephone system is a public utility... The computer utility could become the basis of a new and important industry. } 
}	

@article{blank,
	author  = {}, 
	title   = {},
	journal = {}, 
	year  = {},
	  month = {}, 
	  volume= {}, 
	  number= {}, 
	  pages = {},
	  note  = {} 
}	

% Article within a journal
@ARTICLE{koon,
	author  = {Koonin, E V and Altschul, S F and P Bork}, 
	title   = {BRCA1 protein products: functional motifs}, 
	journal = {Nat Genet}, 
	year    = {1996},
	volume  = {13}, 
	pages   = {266-267}
}	

% Article within a journal supplement
@ARTICLE{oreg,
	author  = {Orengo, C A and Bray, J E and Hubbard, 
		   T and LoConte, L and Sillitoe, I}, 
	title   = {Analysis and assessment of ab initio 
		   three-dimensional prediction, secondary 
		   structure, and contacts prediction},
	journal = {Proteins}, 
	year    = {1999},
	volume  = {Suppl 3}, 
	pages   = {149-170}
}	

% In press article
@inpress{khar,
	author  = {Kharitonov, S A and Barnes, P J}, 
	title   = {Clinical aspects of exhaled nitric oxide},
	journal = {Eur Respir J}, 
	note    = {in press} 
}	

%
% Published abstract
%
@ARTICLE{zvai,
	author  = {Zvaifler, N J and Burger, J A and Marinova-Mutafchieva, 
		   L and Taylor, P and Maini, R N},
	title   = {Mesenchymal cells, stromal derived factor-1 and 
		   rheumatoid arthritis [abstract]},
	journal = {Arthritis Rheum}, 
	year    = {1999},
	volume  = {42}, 
	pages   = {s250},
}	


%
% Article within conference proceedings
%
@Inproceedings{aryan-cloudcom,
	author    = {Aryan TaheriMonfared and Martin Gilje Jaatun}, 
	title     = {As Strong as the Weakest Link: Handling compromised compoenents in OpenStack},
	booktitle = {Proceedings of the third IEEE International Conference on Cloud Computing Technology and Science (CloudCom)},
	year      = {2011},
}	

%%%%%%%%
%  Book chapter, or article within a book
%
@incollection{schn,
	author    = {E Schnepf}, 
	title     = {From prey via endosymbiont to plastids: 
		     comparative studies in dinoflagellates},
	booktitle = {Origins of Plastids}, 
	editor    = {R A Lewin}, 
	publisher = {Chapman and Hall},
	pages     = {53-76}, 
	year      = {1993},
	  address = {New York}, 
	  volume  = {2}, 
	  edition = {2nd} 
}	

%%%%%%%%
% Whole issue of journal
%
@wholejournal{pond,
	editor  = {B Ponder and S Johnston and L Chodosh}, 
	title   = {Innovative oncology},
	journal = {Breast Cancer Res}, 
	year  = {1998},
	  volume= {10}, 
	  pages = {1-72}
}	


%%%%%%%%
% Whole conference proceedings
%
@proceedings{smith,
	editor  = {Y Smith}, 
	title   = {Proceedings of the First National Conference
		   on Porous Sieves: 27-30 June 1996; Baltimore},
	year = 1996,
	  address= {Stoneham}, 
	  publisher = {Butterworth-Heinemann},
}	


%%%%%%%%
% Complete book
%
@book{marg,
	author    = {L Margulis}, 
	title     = {Origin of Eukaryotic Cells},
	publisher = {Yale University Press}, 
	year      = {1970},
	address   = {New Haven} 
}



%%%%%%%%
% Monograph or book in series 
%
@incollection{hunn,
	author    = {G W Hunninghake and J E Gadek}, 
	title     = {The alveloar macrophage},
	booktitle = {Cultured Human Cells and Tissues},
	publisher = {Academic Press}, 
	year      = {1995},
  pages      = {54-56},
	  editor   = {T J R Harris}, 
	  address  = {New York}, 
	  note     = {Stoner G (Series Editor): Methods and Perspectives in Cell Biology, vol 1} 
}


%%%%%%%%
% Book with institutional author
@manual{advi,
	  title   = {Annual Report}, 
	    organization  = {Advisory Committee on Genetic Modification}, 
	    address = {London},
	    year    = {1999}
}
@misc{aryanthesis,
	author = {Aryan TaheriMonfared}, 
	title  = {Securing the IaaS Service Model of Cloud Computing Against Compromised Components},
	howpublished = {MSc thesis, Norwegian University of Science and Technology (NTNU)},
	year   = {2011}
}


%%%%%%%%
% PHD Thesis
%
@phdthesis{koha,
	author = {R Kohavi}, 
	title  = {Wrappers for performance enhancement and
		  obvious decision graphs},
	school = {Stanford University, Computer Science Department},
	year   = {1995}
}

%%%%%%%%
% Webpage Link / URL
%
@webpage{mouse,
	title  = {The Mouse Tumor Biology Database},
	url = {http://tumor.informatics.jax.org/cancer_links.html}
}


%%%% TODO: Clear the text, remove extras
@Misc{openstack:cactus,
author = {{OpenStack Community}},
title = {{OpenStack Projects page}},
howpublished = {\url{http://openstack.org/projects/}},
month = {November},
year = {2011}
}

@Book{ttm4110,
author = {Peder J. Emstad, Poul E. Heegaard, Bjarne E. Helvik and Laurent Paquereau},
title = {Dependability and performance in information and communication systems - Fundamentals},
publisher = {Tapir akademisk forlag},
year = {2010}
}


@Misc{aws:grants,
author = {},
title = {AWS in Education},
howpublished = {\url{http://aws.amazon.com/education/}},
month = {June},
year = {2011}
}


@Misc{google:Exacycle,
author = {Dan Belov},
title = {1 billion core-hours of computational capacity for researchers},
howpublished = {\url{http://googleresearch.blogspot.com/2011/04/1-billion-core-hours-of-computational.html}},
month = {June},
year = {2011}
}


@Misc{opencirrus,
author = {},
title = {Open Cirrus},
howpublished = {\url{https://opencirrus.org/}},
month = {June},
year = {2011}
}


@Misc{welsh:cloud-research,
author = {Matt Welsh},
title = {How can academics do research on cloud computing?},
howpublished = {\url{http://matt-welsh.blogspot.com/2011/05/how-can-academics-do-research-on-cloud.html}},
month = {May},
year = {2011}
}


@incollection {springerlink:10.1007/978-3-642-10665-1_7,
   author = {Li, Wenjuan and Ping, Lingdi},
   affiliation = {Zhejiang University College of Computer Science and Technology Hangzhou Zhejiang 310058 China},
   title = {Trust Model to Enhance Security and Interoperability of Cloud Environment},
   booktitle = {Cloud Computing},
   series = {Lecture Notes in Computer Science},
   editor = {Jaatun, Martin and Zhao, Gansen and Rong, Chunming},
   publisher = {Springer Berlin / Heidelberg},
   isbn = {},
   pages = {69-79},
   volume = {5931},
   url = {http://dx.doi.org/10.1007/978-3-642-10665-1\_7},
   note = {10.1007/978-3-642-10665-1\_7},
   year = {2009}
}

@Misc{rabbitmq:ssl,
author = {},
title = {{RabbitMQ SSL}},
howpublished = {\url{http://www.rabbitmq.com/ssl.html}},
month = {May},
year = {2011}
}

@Misc{rabbitmq:auth,
author = {Simon MacMullen},
title = {{Who are you? Authentication and authorisation in RabbitMQ}},
howpublished = {\url{http://www.rabbitmq.com/blog/2011/02/07/who-are-you-authentication-and-authorisation-in-rabbitmq-231/}},
month = {May},
year = {2011}
}

@INPROCEEDINGS{4228359, 
author={Michael, M. and Moreira, J.E. and Shiloach, D. and Wisniewski, R.W.}, 
booktitle={Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International}, title={Scale-up x Scale-out: A Case Study using Nutch/Lucene}, 
year={2007}, 
month={march}, 
volume={}, 
number={}, 
pages={1 -8}, 
keywords={SMP;Web-centric application;commercial computing;parallel machine;scale-out strategy;scale-up machine;multiprocessing systems;parallel machines;}, 
doi={10.1109/IPDPS.2007.370631}, 
ISSN={}}

@Misc{puppet,
author = {},
title = {Puppet Labs},
howpublished = {\url{http://www.puppetlabs.com/}},
month = {May},
year = {2011}
}


@Misc{anderson:TC-FAQs,
author = {Ross Anderson},
title = {'Trusted Computing' Frequently Asked Questions},
howpublished = {\url{http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html}},
month = {August},
year = {2003}
}


@TechReport{TVDc,
author = {Stefan Berger and Ramón Cáceres and Dimitrios Pendarakis and Reiner Sailer and Enriquillo Valdez and Ronald Perez and Wayne Schildhauer and Deepa Srinivasan},
title = {TVDc: Managing Security in the Trusted Virtual Datacenter},
institution = {IBM Research Division},
year = {2007},
type = {Research Report},
number = {RC24441},
month = {November}
}


@INPROCEEDINGS{Santos09towardstrusted,
    author = {Nuno Santos and Krishna P. Gummadi and Rodrigo Rodrigues},
    title = {Towards Trusted Cloud Computing},
    booktitle = {HOTCLOUD},
    year = {2009},
    publisher = {USENIX}
}

@TechReport{vTPM,
author = {Stefan Berger and Ramón Cáceres and Kenneth A. Goldman and
Ronald Perez and Reiner Sailer and Leendert van Doorn},
title = {vTPM: Virtualizing the Trusted Platform Module},
institution = {IBM Research Division},
year = {2006},
type = {Research Report},
number = {RC23879},
month = {February}
}


@INPROCEEDINGS{garfinkel:vmi,
    author = "Tal Garfinkel and Mendel Rosenblum",
    title = "A Virtual Machine Introspection Based Architecture for
    Intrusion Detection",
    booktitle = "Proc. Network and Distributed Systems Security Symposium",
    month = "February",
    year = "2003"
}

@Patent{Miguel:BFT,
 author = {Miguel Castro, Barbara Liskov},
 title = {Byzantine fault tolerance},
 year = {2003},
 month = {12},
 day = {30},
 number = {US 6671821},
 type = {Patent},
 version = {},
 location = {US},
 url = {http://www.google.no/patents/about?id=6EYPAAAAEBAJ},
 yearfiled = {2000},
 monthfiled = {11},
 dayfiled = {21},
 pat_refs = {US 6671821 B1},
 IPC_class = {H02H 3/05},
 US_class = {714/4}
}

@inproceedings{Jokela:2009:LLS:1592568.1592592,
 author = {Jokela, Petri and Zahemszky, Andr\'{a}s and Esteve Rothenberg, Christian and Arianfar, Somaya and Nikander, Pekka},
 title = {LIPSIN: line speed publish/subscribe inter-networking},
 booktitle = {Proceedings of the ACM SIGCOMM 2009 conference on Data communication},
 series = {SIGCOMM '09},
 year = {2009},
 isbn = {978-1-60558-594-9},
 location = {Barcelona, Spain},
 pages = {195--206},
 numpages = {12},
 url = {http://doi.acm.org/10.1145/1592568.1592592},
 doi = {http://doi.acm.org/10.1145/1592568.1592592},
 acmid = {1592592},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {bloom filters, forwarding, multicast, publish/subscribe},
} 


@TechReport{amqp0-9,
author = {Sanjay Aiyagari and Shahrokh Sadjadi and Matthew Arrot and Rafael Schloming  and Mark Atwell and Steven Shaw and Jason Brome and Gordon Sim and Alan Conway and Martin Sustrik and Robert Greig and Carl Trieloff and Pieter Hintjens and Kim van der Riet and John O'Hara and Steve Vinoski and 
Martin Ritchie},
title = {Advanced Message Queuing Protocol Protocol Specification},
institution = {AMQP.org},
year = {2006},
type = {amq-spec},
month = {December},
note = {Version 0.9}
}


@TechReport{amqp0-8,
author = {Carl Trieloff and Ciaran McHale and Gordon Sim and Harold Piskiel and John O'Hara and Jason Brome and Kim van der Riet and Mark Atwell and Martin Lucina and Pieter Hintjens and Robert Greig and Sam Joyce and Sanjay Shrivastava },
title = {Advanced Message Queuing Protocol Protocol Specification},
institution = {AMQP.org},
year = {2006},
type = {amq-spec},
month = {July},
note = {Version 0.8}
}


@Misc{rabbitmq:admin-guide,
author = {},
title = {RabbitMQ Core API Guide},
howpublished = {\url{http://www.rabbitmq.com/api-guide.html}},
month = {May},
year = {2011}
}

@Misc{rabbitmq:introduction,
author = {Dmitriy Samovskiy},
title = {{Introduction to AMQP Messaging with RabbitMQ}},
month = {July},
year = {2008}
}


@inproceedings{Murray:2008:IXS:1346256.1346278,
 author = {Murray, Derek Gordon and Milos, Grzegorz and Hand, Steven},
 title = {Improving Xen security through disaggregation},
 booktitle = {Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments},
 series = {VEE '08},
 year = {2008},
 isbn = {978-1-59593-796-4},
 location = {Seattle, WA, USA},
 pages = {151--160},
 numpages = {10},
 url = {http://doi.acm.org/10.1145/1346256.1346278},
 doi = {http://doi.acm.org/10.1145/1346256.1346278},
 acmid = {1346278},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {disaggregation, trusted computing base, virtual machines},
} 

@TechReport{SP800-125,
author = {Karen Scarfone, Murugiah Souppaya, Paul Hoffman},
title = {{Guide to Security for Full Virtualization Technologies}},
institution = {NIST},
year = {2011},
type = {Special Publications},
number = {SP 800-125},
month = {January},
note = {\url{http://csrc.nist.gov/publications/nistpubs/800-125/SP800-125-final.pdf}}
}

@Misc{fortify:defcon2010,
author = {{Fortify Software}},
title = {{DEFCON survey reveals vast scale of cloud hacking - and the need to bolster security to counter the problem}},
howpublished = {\url{https://www.fortify.com/news-and-events/press-releases/2010/2010-08-24.html}},
month = {August},
year = {2010}
}


@Misc{nist:cloud_computing_paradigm,
author = {Peter Mell, Tim Grance},
title = {Effectively and Securely Using the Cloud Computing Paradigm},
month = {July},
year = {2009}
}


@Misc{nist:reference_model_slides,
author = {Fang Liu Tong and Jian Mao and Robert Bohn and John Messina and Dawn Leaf},
title = {NIST Cloud Computing Reference Architecture},
howpublished = {\url{http://collaborate.nist.gov/twiki-cloud-computing/pub/CloudComputing/ReferenceArchitectureTaxonomy/NIST\_CC\_Reference\_Architecture\_v1\_March\_30\_2011.pdf}},
month = {March},
year = {2011},
note = {Version 1}
}


@Misc{snmpd,
author = {{}},
title = {{SNMPD}},
howpublished = {\url{http://www.net-snmp.org/docs/man/snmpd.html}},
month = {June},
year = {2005}
}

@Misc{sflow,
author = {{}},
title = {{sFlow}},
howpublished = {\url{http://www.sflow.org/}},
month = {April},
year = {2011}
}

@Misc{xenaccess,
author = {{}},
title = {{XenAccess}},
howpublished = {\url{http://www.xenaccess.org/}},
month = {January},
year = {2009}
}


@Misc{sflow:scalability,
author = {{}},
title = {{Cloud-scale Performance Monitoring}},
howpublished = {\url{http://blog.sflow.com/2010/09/cloud-scale-performance-monitoring.html}},
month = {September},
year = {2010}
}


@Misc{cee,
author = {{The MITRE Corporation}},
title = {{Common Event Expression}},
howpublished = {\url{http://cee.mitre.org/}},
month = {April},
year = {2011}
}

@misc{draft-cloud-log-01,
  author="G. Golovinsky and S. Johnston and D. Birk",
  title="{Syslog Extension for Cloud Using Syslog Structured Data}",
  series="Tools",
  number="01",
  howpublished="Internet-Draft",
  publisher="IETF",
  organization="Internet Engineering Task Force",
  year="2011",
  month="March",
    url="http://tools.ietf.org/html/draft-cloud-log-01",
}


@Misc{rrdtool,
author = {Tobias Oetiker},
title = {{Round-Robin Database Tool}},
howpublished = {\url{http://www.mrtg.org/rrdtool}},
month = {April},
year = {2011}
}


@Misc{cacti,
author = {},
title = {{Cacti, the Complete RRDTool-based graphing solution}},
howpublished = {\url{http://www.cacti.net/}},
month = {April},
year = {2011}
}


@Misc{openvswitch,
author = {},
title = {{Open vSwitch, An Open Virtual Switch}},
howpublished = {\url{http://openvswitch.org/}},
month = {March},
year = {2011}
}


@Misc{libvirt,
author = {},
title = {{libvirt Wiki}},
howpublished = {\url{http://wiki.libvirt.org/page/Main\_Page\#libvirt\_Wiki}},
month = {March},
year = {2011}
}


@Misc{apparmor,
author = {Jamie Strandboge},
title = {{AppArmor}},
howpublished = {\url{https://wiki.ubuntu.com/AppArmor}},
month = {March},
year = {2011}
}


@inproceedings{Ando:2010:LAE:1939751.1939797,
 author = {Ando, Ruo and Byung, Kang and Kadobayashi, Youki},
 title = {Log analysis of exploitation in cloud computing environment using automated reasoning},
 booktitle = {Proceedings of the 17th international conference on Neural information processing: models and applications - Volume Part II},
 series = {ICONIP'10},
 year = {2010},
 isbn = {3-642-17533-3, 978-3-642-17533-6},
 location = {Sydney, Australia},
 pages = {337--343},
 numpages = {7},
 url = {http://portal.acm.org/citation.cfm?id=1939751.1939797},
 acmid = {1939797},
 publisher = {Springer-Verlag},
 address = {Berlin, Heidelberg},
 keywords = {IaaS, automated reasoning, cloud computing, internet explorer, log analysis},
} 


@Misc{amazon:vulnerability-reporting,
author = {{AWS Security Team}},
title = {{Vulnerability Reporting}},
howpublished = {\url{http://aws.amazon.com/security/vulnerability-reporting/}},
month = {March},
year = {2011}
}



@TechReport{SP800-61Rev.1,
author = {Karen Scarfone and Tim Grance and Kelly Masone},
title = {{Computer Security Incident Handling Guide}},
institution = {NIST},
year = {2008},
type = {Special Publications},
number = {SP 800-61 Rev. 1},
month = {March},
note = {\url{http://csrc.nist.gov/publications/nistpubs/800-61-rev1/SP800-61rev1.pdf}}
}


@TechReport{sans:following_incidents,
author = {Jeff Reed},
title = {{Following Incidents into the Cloud}},
institution = {SANS Institute},
year = {2011},
type = {Security Reading Room},
note = {http://www.sans.org/reading\_room/whitepapers/incident/incidents-cloud\_33619}
}


@MISC{Batsell_distributedintrusion,
    author = {Stephen G. Batsell and Nageswara S. Rao and Mallikarjun Shankar},
    title = {{Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security}},
    year = {},
    howpublished = {\url{http://www.ioc.ornl.gov/projects/documents/containment.pdf}},
    institution = {Cyberspace Sciences \& Information Intelligence Research Group, U.S. Department of Energy}
}


@Misc{mysql:hearbeat,
author = {},
title = {Using Heartbeat with MySQL and DRBD},
howpublished = {\url{http://dev.mysql.com/doc/refman/5.0/en/ha-heartbeat-drbd.html}},
month = {March},
year = {2011}
}


@Misc{cloudfit,
author = {},
title = {CloudFIT Project Summary},
howpublished = {\url{http://cloudfit.di.fc.ul.pt/index.php?title=Public:About}},
month = {March},
year = {2011}
}


@Misc{openstack:bexar,
author = {OpenStack Community},
title = {{Bexar, Release Notes}},
howpublished = {\url{http://wiki.openstack.org/ReleaseNotes/Bexar}},
month = {March},
year = {2011}
}


@TechReport{ca:cloud_security_survey,
author = {Larry Ponemon},
title = {{Security of Cloud Computing Users: A Study of U.S. and Europe IT Practitioners}},
institution = {CA Technologies},
year = {2010},
type = {Industry Research},
month = {May},
note = {\url{http://www.ca.com/us/collateral/industry-research/na/security-of-cloud-computing-users-a-study-of-us-and-europe-it-practitioners.aspx}}
}

@article {springerlink:10.1007/s00607-010-0140-x,
   author = {Vaquero, Luis and Rodero-Merino, Luis and Morán, Daniel},
   affiliation = {Hewlett-Packard Labs, Bristol, UK},
   title = {{Locking the sky: a survey on IaaS cloud security}},
   journal = {Computing},
   publisher = {Springer Wien},
   issn = {0010-485X},
   keyword = {Computer Science},
   pages = {93-118},
   volume = {91},
   issue = {1},
   url = {http://dx.doi.org/10.1007/s00607-010-0140-x},
   note = {10.1007/s00607-010-0140-x},
   year = {2011}
}


@article{10.1109/AINA.2010.187,
author = {Tharam Dillon and Chen Wu and Elizabeth Chang},
title = {{Cloud Computing: Issues and Challenges}},
journal ={Advanced Information Networking and Applications, International Conference on},
volume = {0},
issn = {1550-445X},
year = {2010},
pages = {27-33},
doi = {http://doi.ieeecomputersociety.org/10.1109/AINA.2010.187},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}

@article {springerlink:10.1007/s11227-010-0460-9,
   author = {Zhao, Gansen and Rong, Chunming and Jaatun, Martin and Sandnes, Frode},
   affiliation = {South China Normal University School of Computer Science Guangzhou China},
   title = {{Reference deployment models for eliminating user concerns on cloud security}},
   journal = {The Journal of Supercomputing},
   publisher = {Springer Netherlands},
   issn = {0920-8542},
   keyword = {Computer Science},
   pages = {1-16},
   url = {http://dx.doi.org/10.1007/s11227-010-0460-9},
   note = {10.1007/s11227-010-0460-9},
   year = {2010}
}


@inproceedings{Grobauer:2010:TIH:1866835.1866850,
 author = {Grobauer, Bernd and Schreck, Thomas},
 title = {{Towards incident handling in the cloud: challenges and approaches}},
 booktitle = {Proceedings of the 2010 ACM workshop on Cloud computing security workshop},
 series = {CCSW '10},
 year = {2010},
 isbn = {978-1-4503-0089-6},
 location = {Chicago, Illinois, USA},
 pages = {77--86},
 numpages = {10},
 url = {http://doi.acm.org/10.1145/1866835.1866850},
 doi = {http://doi.acm.org/10.1145/1866835.1866850},
 acmid = {1866850},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {cert, cloud computing, csirt, incident handling},
} 

@TechReport{Jeff:CloudIncident,
author = {Jeff Reed, Adam Kliarsky},
title = {{Following Incidents into the Cloud}},
institution = {The SANS Institute},
year = {2010},
type = {Reading Room},
month = {September}
}


@Misc{usa_patriot_act,
key = {usa_patriot_act},
author = {FinCEN},
title = {{USA PATRIOT Act}},
howpublished = {\url{http://www.fincen.gov/statutes\_regs/patriot/index.html}}
}

@Misc{pipeda,
key = {PIPEDA},
author = {},
title = {{Personal Information Protection and Electronic Documents Act}},
howpublished = {\url{http://laws.justice.gc.ca/en/P-8.6/}}
}

@Misc{dppd,
key = {DPPD},
author = {},
title = {{Data Privacy Protection Directive}},
howpublished = {\url{http://ec.europa.eu/justice/policies/privacy/index\_en.htm}}
}

@inproceedings{TaheriMonfared:monitoring,
author = {Aryan TaheriMonfared and Martin Gilje Jaatun},
title = {{Monitoring Intrusions and Security Breaches in Highly Distributed Cloud Environments}},
 booktitle = {Proceedings of CloudCom 2011},
month = {November},
year = {2011}
}


@inproceedings{Ristenpart:2009:HYG:1653662.1653687,
 author = {Ristenpart, Thomas and Tromer, Eran and Shacham, Hovav and Savage, Stefan},
 title = {Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds},
 booktitle = {Proceedings of the 16th ACM conference on Computer and communications security},
 series = {CCS '09},
 year = {2009},
 isbn = {978-1-60558-894-0},
 location = {Chicago, Illinois, USA},
 pages = {199--212},
 numpages = {14},
 url = {http://doi.acm.org/10.1145/1653662.1653687},
 doi = {http://doi.acm.org/10.1145/1653662.1653687},
 acmid = {1653687},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {cloud computing, side channels, virtual machine security},
} 


@Misc{fortify_software,
author = {},
title = {{Fortify Software, An HP Company}},
howpublished = {\url{https://www.fortify.com/}},
month = {March},
year = {2011}
}


@Misc{gartner:2010_virtualization,
author = {Christy Pettey, Ben Tudor},
title = {{Gartner Says 60 Percent of Virtualized Servers Will Be Less Secure Than the Physical Servers They Replace Through 2012}},
howpublished = {\url{http://www.gartner.com/it/page.jsp?id=1322414}},
month = {March},
year = {2010}
}


@Misc{gartner:2010_predictions,
author = {Christy Pettey, Holly Stevens},
title = {Gartner Highlights Key Predictions for IT Organizations and Users in 2010 and Beyond},
howpublished = {\url{http://www.gartner.com/it/page.jsp?id=1278413}},
month = {January},
year = {2010}
}


@INPROCEEDINGS{5678134, 
author={Yuesheng Tan and Dengliang Luo and Jingyu Wang}, 
booktitle={Information Engineering and Computer Science (ICIECS), 2010 2nd International Conference on},
 title={{CC-VIT: Virtualization Intrusion Tolerance Based on Cloud Computing}}, 
year={2010}, 
month={December}, 
volume={}, 
number={}, 
pages={1 -6}, 
keywords={CC-VIT;cloud computing;hybrid fault model;service integration;supply on-demand;virtualization intrusion tolerance system;virtualization technology;cloud computing;fault diagnosis;security of data;virtualisation;}, 
doi={10.1109/ICIECS.2010.5678134}, 
ISSN={2156-7379},}


@InProceedings{conf/cloudcom/UemuraDK09,
  title =	"Availability Analysis of a Scalable Intrusion Tolerant
		 Architecture with Two Detection Modes",
  author =	"Toshikazu Uemura and Tadashi Dohi and Naoto Kaio",
  bibdate =	"2009-11-24",
  bibsource =	"DBLP,
		 http://dblp.uni-trier.de/db/conf/cloudcom/cloudcom2009.html#UemuraDK09",
  booktitle =	"Cloud Computing, First International Conference,
		 CloudCom 2009, Beijing, China, December 1-4, 2009.
		 Proceedings",
  publisher =	"Springer",
  year = 	"2009",
  volume =	"5931",
  editor =	"Martin Gilje Jaatun and Gansen Zhao and Chunming
		 Rong",
  ISBN = 	"978-3-642-10664-4",
  pages =	"178--189",
  series =	"Lecture Notes in Computer Science",
  URL =  	"http://dx.doi.org/10.1007/978-3-642-10665-1",
}

@Misc{openstack:community,
author = {},
title = {OpenStack Community},
howpublished = {\url{http://www.openstack.org/community/}},
month = {May},
year = {2011}
}

@Misc{openstack-wiki:DistributedScheduler,
author = {Eric Day, Paul Voccio, Vish Ishaya},
title = {Distributed Scheduler},
howpublished = {\url{http://wiki.openstack.org/DistributedScheduler}},
month = {February},
year = {2011}
}


@Misc{openstack-wiki:MultiClusterZones,
author = {Sandy Walsh},
title = {Multiple Cluster Zones},
howpublished = {\url{http://wiki.openstack.org/MultiClusterZones}},
month = {February},
year = {2011}
}

@Misc{openstack-wiki:overview,
author = {Anne Gentle},
title = {Clustering, Globalization, and Scale-out Architecture Overview},
howpublished = {\url{http://wiki.openstack.org/Overview}},
month = {May},
year = {2011}
}


@TechReport{cnss:glossary,
author = {},
title = {National Information Assurance (IA) Glossary},
institution = {Committee on National Security Systems},
year = {2010},
type = {CNSS Instruction},
number = {4009},
month = {April}
}


@Misc{cnss,
author = {},
title = {{The Committee on National Security Systems}},
howpublished = {\url{http://www.cnss.gov/}},
month = {March},
year = {2011}
}


@TechReport{nist:glossary,
author = {Richard Kissel},
title = {Glossary of Key Information Security Terms},
institution = {National Institute of Standards and Technology},
year = {2011},
type = {NIST Interagency Reports},
number = {NIST IR 7298 Revision 1},
month = {February}
}


@Misc{carrot,
author = {Ask Solem Hoel},
title = {{Carrot - AMQP Messaging Framework for Python}},
howpublished = {\url{https://github.com/ask/carrot/}},
month = {February},
year = {2011}
}


@Misc{openstack-wiki:Rabbit,
author = {},
title = {{RabbitMQ and Nova}},
howpublished = {\url{http://nova.openstack.org/devref/rabbit.html}},
month = {February},
year = {2011}
}


@Misc{openstack-wiki:RabbitmqHA,
author = {Armando Migliaccio},
title = {{RabbitMQ High Availability}},
howpublished = {\url{http://wiki.openstack.org/RabbitmqHA}},
month = {February},
year = {2011}
}


@Misc{blog:laurentluce.com,
author = {Laurent Luce},
title = {{OpenStack Nova internals of instance launching}},
howpublished = {\url{http://www.laurentluce.com/?p=227}},
month = {January},
year = {2011}
}


@Misc{rabbitmq,
author = {},
title = {{About RabbitMQ}},
howpublished = {\url{http://www.rabbitmq.com/about.html}},
month = {February},
year = {2011}
}

@misc{rfc4423,
  author="R. Moskowitz and P. Nikander",
  title="{Host Identity Protocol (HIP) Architecture}",
  series="Request for Comments",
  number="4423",
  howpublished="RFC 4423 (Informational)",
  publisher="IETF",
  organization="Internet Engineering Task Force",
  year=2006,
  month=may,
    url="http://www.ietf.org/rfc/rfc4423.txt",
}


@Misc{linux:BRIDGE-STP-HOWTO,
author = {Uwe Böhme, Lennert Buytenhenk},
title = {{Linux BRIDGE-STP-HOWTO}},
howpublished = {\url{http://www.faqs.org/docs/Linux-HOWTO/BRIDGE-STP-HOWTO.html}},
month = {January},
year = {2001}
}


@Misc{csa,
author = {},
title = {{Cloud Security Alliance}},
howpublished = {\url{http://www.cloudsecurityalliance.org/}},
month = {February},
year = {2011}
}


@TechReport{csa:top_threats,
author = {{Cloud Security Alliance}},
title = {{Top Threats to Cloud Computing V1.0}},
year = {2010},
month = {March},
note = {\url{http://www.cloudsecurityalliance.org/topthreats/}}
}


@techreport{Armbrust:EECS-2009-28,
    author = {Armbrust, Michael and Fox, Armando and Griffith, Rean and Joseph, Anthony D. and Katz, Randy H. and Konwinski, Andrew and Lee, Gunho and Patterson, David A. and Rabkin, Ariel and Stoica, Ion and Zaharia, Matei},
    Title = {{Above the Clouds: A Berkeley View of Cloud Computing}},
    Institution = {EECS Department, University of California, Berkeley},
    Year = {2009},
    Month = {Feb},
    URL = {http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-28.html},
    Number = {UCB/EECS-2009-28}
}

@TechReport{nist:cloud_definition,
  author =	 {Peter Mell and Timothy Grance},
  Title =	 {{The NIST Definition of Cloud Computing}},
  institution =	 {National Institute of Standards and Technology, Information Technology Laboratory},
  year =	 {2011},
  key =		 {nist_definition},
  month =	 {September},
  number =	 {SP 800-145}
}

@techreport{Chen:EECS-2010-5,
    Author = {Chen, Yanpei and Paxson, Vern and Katz, Randy H.},
    Title = {{What's New About Cloud Computing Security?}},
    Institution = {EECS Department, University of California, Berkeley},
    Year = {2010},
    Month = {Jan},
    URL = {http://www.eecs.berkeley.edu/Pubs/TechRpts/2010/EECS-2010-5.html},
    Number = {UCB/EECS-2010-5}
}

@TechReport{enisa:cloud_risk_security,
author = {Paolo Balboni and Kieran McCorry and W. David Snead},
Title = {{Cloud Computing -- Benefits, risks and recommendations for information security}},
institution = {European Network and Information Security Agency},
year = {2009},
key = {enisa_cloud_risk_security},
month = {November},
note = {\url{http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/}}
}


@Misc{enisa,
Title = {{European Network and Information Security Agency}},
note = {\url{www.enisa.europa.eu/about-enisa}, Visited: 15 Feb 2011}
}


@TechReport{sp800-30,
  author =	 {Gary Stoneburner and Alice Goguen and Alexis Feringa},
  Title =	 {{Risk Management Guide for Information Technology Systems}},
  institution =	 {National Institute of Standards and Technology},
  year =	 {2002},
  key =		 {sp800-30},
  type =	 {Special Publications},
  month =	 {July}
}


@Misc{IDC:virtualization,
author = {IDC Press},
Title = {{Virtualization Market Accelerates Out of the Recession as Users Adopt "Virtualize First" Mentality}},
howpublished = {\url{http://www.idc.com/getdoc.jsp?containerId=prUS22316610}},
month = {Apr},
year = {2010}
}


@TechReport{IBM:x-force2010,
author = {IBM X-Force® research and development teams},
Title = {{IBM X-Force® 2010 Mid-Year Trend and Risk Report}},
institution = {IBM},
year = {2010},
month = {August}
}

@Manual{openstack:objStoreAdminManual,
Title = {{OpenStack Object Storage Administration Manual}},
author = {},
organization = {OpenStack},
edition = {Bexar release},
month = {Feb},
year = {2011},
note = {\url{docs.openstack.org}}
}

@Manual{openstack:computeAdminManual,
Title = {{OpenStack Compute Administration Manual}},
author = {},
organization = {OpenStack},
edition = {Bexar release},
month = {Feb},
year = {2011},
note = {\url{docs.openstack.org}}
}


@misc{ openstack-wiki:NovaSystemArchitecture,
	author = "OpenStack Wiki",
	Title = {{"Nova System Architecture"}},
	year = "2010",
	url = "http://nova.openstack.org/architecture.html",
	note = "[Online; accessed 08-Feb-2010]"
}


@misc{ openstack-wiki:ArchitecturalOverview,
	author = {{OpenStack Wiki}},
	Title = {{"Architectural Overview"}},
	year = "2010",
	url = "http://wiki.openstack.org/ArchitecturalOverview",
	note = "[Online; accessed 08-Feb-2010]"
}

@inproceedings{openstack_sdforum,
    author  = "Andrew Clay Shafer",
    Title   = {{"OpenStack: Philosophy \& Implementation"}},
    publisher = "Presented as the Cloud Services SIG: An overview of OpenStack by Andrew Shafer of CloudScaling",
    year    = 2010
}

@techreport{catteddu2009cloud,
    author = {Catteddu, D. and Hogben, G.},
    citeulike-article-id = {7953098},
    institution = {Technical Report. European Network and Information Security Agency},
    posted-at = {2010-10-06 19:22:42},
    priority = {2},
    Title = {{Cloud Computing: benefits, risks and recommendations for information security}},
    year = {2009}
}


@InProceedings{,
author = {Mohamed Al Morsy, John Grundy and Ingo Müller},
Title = {{An Analysis of The Cloud Computing Security Problem}},
bookTitle = {Proceedings of APSEC 2010 Cloud Workshop},
OPTyear = {2010},
OPTaddress = {Sydney, Australia},
OPTmonth = {November},
OPTorganization = {APSEC}
}

@InProceedings{conf/IEEEscc/KandukuriVR09,
  Title =	{{"Cloud Security Issues"}},
  author =	"Balachandra Reddy Kandukuri and Ramakrishna Paturi V.
		 and Atanu Rakshit",
  publisher =	"IEEE Computer Society",
  year = 	"2009",
  bibdate =	"2009-11-12",
  bibsource =	"DBLP,
		 http://dblp.uni-trier.de/db/conf/IEEEscc/scc2009.html#KandukuriVR09",
  booktitle =	"IEEE SCC",
  crossref =	"conf/IEEEscc/2009",
  pages =	"517--520",
  URL =  	"http://dx.doi.org/10.1109/SCC.2009.84",
}

@INPROCEEDINGS{5461732, 
author={Dawoud, W. and Takouna, I. and Meinel, C.}, 
bookTitle={{Informatics and Systems (INFOS), 2010 The 7th International Conference on}}, 
Title={{Infrastructure as a service security: Challenges and solutions}}, 
year={2010}, 
month=march, 
volume={}, 
number={}, 
pages={1 -8}, 
keywords={IaaS layer;QoS requirements;cloud computing;cloud providers;delivery models;quality of service;security assessment;service security;Internet;quality of service;security of data;}, 
doi={}, 
ISSN={},}

@article{citeulike:8382322,
    author = {Vaquero, Luis and Rodero-Merino, Luis and Mor\'{a}n, Daniel},
    citeulike-article-id = {8382322},
    citeulike-linkout-0 = {http://dx.doi.org/10.1007/s00607-010-0140-x},
    citeulike-linkout-1 = {http://www.springerlink.com/content/0159w45v27661549},
    day = {24},
    doi = {10.1007/s00607-010-0140-x},
    issn = {0010-485X},
    journal = {Computing},
    month = {November},
    pages = {1--26},
    posted-at = {2010-12-08 08:11:20},
    publisher = {Springer Wien},
    Title = {{Locking the sky: a survey on IaaS cloud security}},
    url = {http://dx.doi.org/10.1007/s00607-010-0140-x},
    year = {2010}
}

@INPROCEEDINGS{5284165, 
author={Jensen, M. and Schwenk, J. and Gruschka, N. and Iacono, L.L.}, 
booktitle={{Cloud Computing, 2009. CLOUD '09. IEEE International Conference on}}, 
Title={{On Technical Security Issues in Cloud Computing}}, 
year={2009}, 
month=sept., 
volume={}, 
number={}, 
pages={109 -116}, 
keywords={Internet;capital expenditure reduction;cloud computing;operational expenditure reduction;technical security issue;Internet;security of data;}, 
doi={10.1109/CLOUD.2009.60}, 
ISSN={},}

@INPROCEEDINGS{5615236, 
author={{Takabi, H. and Joshi, J.B.D. and Gail-Joon Ahn}}, 
booktitle={{Computer Software and Applications Conference Workshops (COMPSACW), 2010 IEEE 34th Annual}}, 
Title={{SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments}}, 
year={2010}, 
month={July}, 
volume={}, 
number={}, 
pages={393 -398}, 
keywords={SecureCloud;cloud computing environments;comprehensive security framework;Internet;security of data;}, 
doi={10.1109/COMPSACW.2010.74}, 
ISSN={},}


@mthesis{aryan:mthesis,
	author = {Aryan TaheriMonfared}, 
	title  = {Securing the IaaS Service Model of Cloud Computing Against Compromised Components},
	school = {Norwegian University of Science and Technology},
	year   = {2011}
}

@INPROCEEDINGS{Broder02networkapplications,
    author = {Andrei Broder and Michael Mitzenmacher},
    title = {Network Applications of Bloom Filters: A Survey},
    booktitle = {Internet Mathematics},
    year = {2002},
    pages = {636--646}
}


