A. Mohamed, A history of cloud computing, www.computerweekly.com, 2009.

B. Gourley, Cloud Computing and Cyber Defense. A White Paper provided to the National Security Council and Homeland Security Council as input to the White House Review of Communications and Information Infrastructure, Crucial Point LLC, 2009.

B. Reingold and R. Mrazik, Cloud computing: the intersection of massive scalability, data security and privacy (Part I) Cyberspace Lawyer, 2009.

P. Bruening and B. Treacy, The Bureau of National Affairs, Inc. Cloud Computing: Privacy, Security Challenges , Privacy&Security Law, 2009.

K. Flinders, Microsoft slashes cost of cloud computing, 2009.

D. Binning, Top five cloud computing security issues, 2009.

R. Gellman, Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, World Privacy Forum, 2009.

E. Bertino, F. Paci, R. Ferrini, and N. Shang, Privacy-preserving Digital Identity Management for Cloud Computing

B. Reingold and R. Mrazik, Cloud computing: Industry and government development (Part II)

P. Zimski, Cloud computing faces security storm www, computerweekly.com, 2009.

C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-Preserving Public Auditing for Data Storage: Security in Cloud Computing, Illinois Institute of Technology The Health Insurance Portability and Accountability Act (HIPAA) of, 104th Congress, pp.104-191, 1996.

A. Yee, Cloud Computing Security Risks -Are they real?, www, ebizq.net, 2009.

T. Andrei, Cloud Computing Challenges and Related Security Issues, p.5, 2009.

C. Almond, A Practical Guide to Cloud Computing Security: What you need to know now about your business and cloud security, Avande, 2009.

J. Brodkin, Gartner: Seven cloud-computing security risks, Network World, 2009.

V. Tchifilionova and S. Davies, International politics Neofit Rilski " Press, Blagoevgrad, www.computerweekly.com (2009) 24 Unprincipled privacy: why the foundations of data protection are failing us, ) 25. 107th Congress, pp.7-23, 2001.

G. Trapani, The Hidden Risks of Cloud Computing, Lifehacker (2009) 27. 95/46/EC Directive of the European Parliament and the Coun- cil, pp.95-141, 1995.

D. Hurley, A whole world in a glance: privacy as a key enabler of individual participation in democratic governance, 2001.

V. Vijayan, Google privacy convictions in Italy spark outrage, 2010.

A. Cavoukian, Privacy in the clouds, Identity in the Information Society, vol.1, issue.1, 2009.
DOI : 10.1007/s12394-008-0005-z

L. Bergkamp, EU Data Protection Policy, Computer Law & Security Review, vol.18, issue.1, p.2002, 2002.
DOI : 10.1016/S0267-3649(02)00106-1

R. Litan, Balancing Costs and Benefits of New Privacy Mandates AEI- Brookings Joint Canter for Regulatory Studies, working paper 99-3) 34. The Information Commissioner's Office, PIA's Book, 1999.

S. Pearson, Taking account of privacy when designing cloud computing services, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing, pp.2009-54, 2009.
DOI : 10.1109/CLOUD.2009.5071532