. Cloud-security-alliance, Top Threats to Cloud Computing V1.0 " . https

J. Heiser and M. Nicolett, Assessing the Security Risks of Cloud Computing, p.157782, 2008.

S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol.34, issue.1, pp.1-11, 2010.
DOI : 10.1016/j.jnca.2010.07.006

. Cloud-security-alliance, Security Guidance for Critical Areas of Focus in Cloud Computing V3.0 " . https://cloudsecurityalliance.org/guidance/csaguide

C. Kalloniatis, E. Kavakli, and S. Gritzalis, PriS Methodology: Incorporating Privacy Requirements into the System Design Process, Proceedings of the SREIS 2005 13th IEEE International Requirements Engineering Conference ? Symposium on Requirements Engineering for Information Security, 2005.

C. Kalloniatis, E. Kavakli, and S. Gritzalis, Addressing privacy requirements in system design: the PriS method, Requirements Engineering, vol.2, issue.1, pp.241-255, 2008.
DOI : 10.1007/s00766-008-0067-3

C. Kalloniatis, E. Kavakli, and E. Kontellis, PRIS tool: A case tool for privacy-oriented Requirements Engineering, Journal of Information Systems Security, vol.6, issue.1, pp.3-19, 2010.

E. Kavakli, C. Kalloniatis, P. Loucopoulos, and S. Gritzalis, Incorporating privacy requirements into the system design process, Special issue on Privacy and Anonymity in the Digital Era: Theory, Technologies and Practice, pp.140-158, 2006.
DOI : 10.1108/10662240610656483

C. Kalloniats, E. Kavakli, and S. Gritzalis, Dealing with privacy issues during the system design process, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005., 2005.
DOI : 10.1109/ISSPIT.2005.1577156

H. Mouratidis, C. Kalloniatis, S. Islam, M. P. Huget, and S. Gritzalis, Aligning Security and Privacy to support the development of Secure Information Systems, 2012.

H. Mouratidis and P. Giorgini, SECURE TROPOS: A SECURITY-ORIENTED EXTENSION OF THE TROPOS METHODOLOGY, International Journal of Software Engineering and Knowledge Engineering, vol.17, issue.02, 2007.
DOI : 10.1142/S0218194007003240

P. Mouratidis and . Giorgini, Security Attack Testing (SAT)???testing the security of information systems at design time, Information Systems, vol.32, issue.8, pp.1166-1183, 2007.
DOI : 10.1016/j.is.2007.03.002

L. Wei, Managing security of virtual machine images in a cloud environment, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, 2009.
DOI : 10.1145/1655008.1655021