% books

@BOOK{mkl-cloudsecprivacy-09,
title = {Cloud Security and Privacy --- An Enterprise Perspective on Risks and Compliance},
author = {Tim Mather and Subra Kumaraswamy and Shahed Latif},
publisher = {O'Reilly}, 
year = {2009}}

@BOOK{winkler-seccloud-11,
title = {Securing the Cloud --- Cloud Computer Security Techniques and Tactics},
author = {Vic Winkler},
publisher = {Syngress}, 
year = {2011}}

@BOOK{rr-cloudcomp-10,
title = {Cloud Computing --- Implementation, Management and Security},
author = {John W. Rittinghouse and James F. Ransome},
publisher = {CRC Press}, 
year = {2010}}

@BOOK{vve-cloudcomppacapp-10,
title = {Cloud Computing --- A Practical Approach},
author = {Anthony T. Velte and Toby J. Velte and Robert Elsenpeter},
publisher = {CRC Press}, 
year = {2010}}

% whitepaper

@misc{m2s2-herrschercloud-10,
title = {Herrscher über die Wolke: Anforderungen an Cloud--Computing},
author = {Lori MacVittie and Alan Murphy and Peter Silva and Ken Salchow},
year = {2010},
type = {Whitepaper},
url = {http://www.f5networks.de/de/de/pdf/white-papers/controlling-the-cloud-de-wp.pdf},
}

@misc{asssecrisk-gartner-08,
title = {Assessing the Security Risks of Cloud Computing},
organization  = {Gartner Inc.},
year = {2008},
type = {Whitepaper},
url = {http://www.f5networks.de/de/de/pdf/white-papers/controlling-the-cloud-de-wp.pdf},
}

@misc{sdar-TATA-07,
title = {Securing data-at-rest},
organization  = {TATA Consultancy Services},
year = {2007},
howpublished = {Präsentation}, 
url = {http://www.tcs.com/SiteCollectionDocuments/White%20Papers/Security_Data_at_rest.pdf}}

@techreport{ts2-vergleichsicherheit-10,
title = {Vergleich der Sicherheit traditioneller IT--Systeme und Public Cloud Computing Systeme},
author = {Iryna Tsvihun and Philipp Stephanow and Dr. Werner Streitberger},
institution = {Fraunhofer SIT},
month = {Juli},
year = {2010}
}



