M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz et al., Above the clouds: A berkeley view of cloud computing, 2009.

P. Mell and T. Grance, The NIST definition of cloud computing. Working Paper of the National Institute of Standards and Technology, 2009.

L. M. Vaquero, L. Rodero-merino, J. Caceres, and M. Lindner, A break in the clouds, ACM SIGCOMM Computer Communication Review, vol.39, issue.1, pp.50-55, 2008.
DOI : 10.1145/1496091.1496100

R. Buyya, R. Ranjan, and R. N. Calheiros, Modeling and simulation of scalable Cloud computing environments and the CloudSim toolkit: Challenges and opportunities, 2009 International Conference on High Performance Computing & Simulation, 2009.
DOI : 10.1109/HPCSIM.2009.5192685

K. Beckers, J. Kuester, S. Faßbender, and H. Schmidt, Pattern-Based Support for Context Establishment and Asset Identification of the ISO 27000 in the Field of Cloud Computing, 2011 Sixth International Conference on Availability, Reliability and Security, 2011.
DOI : 10.1109/ARES.2011.55

M. Jackson, Problem Frames. Analyzing and structuring software development problems, 2001.

M. Fowler, ANALYSIS PATTERNS, 1996.
DOI : 10.1017/CBO9780511550881.013

E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design Patterns: Elements of Reusable Object-Oriented Software, 1994.

H. Government, It infrastructure library (itil), 2012.

A. Calder, Implementing Information Security based on ISO 27001/ISO 27002: A Management Guide, 2009.

S. Klipper, Information Security Risk Management mit ISO, IEC, vol.27005, 2010.

D. Cheremushkin and A. Lyubimov, An application of integral engineering technique to information security standards analysis and refinement, Proceedings of the 3rd international conference on Security of information and networks, SIN '10, p.10, 2010.
DOI : 10.1145/1854099.1854106

A. Lyubimov, D. Cheremushkin, N. Andreeva, and S. Shustikov, Information Security Integral Engineering Technique and its Application in ISMS Design, 2011 Sixth International Conference on Availability, Reliability and Security, 2011.
DOI : 10.1109/ARES.2011.121

R. Montesino and S. Fenz, Information Security Automation: How Far Can We Go?, 2011 Sixth International Conference on Availability, Reliability and Security, 2011.
DOI : 10.1109/ARES.2011.48

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.473.8464

S. Fenz, G. Goluch, A. Ekelhart, B. Riedl, and E. Weippl, nformation security fortification by ontological mapping of the iso/iec 27001 standard, Proceedings of the International Symposium on Dependable Computing, 2007.