P. Alexander, L. Pike, P. Loscocco, and G. Coker, Model Checking Distributed Mandatory Access Control Policies, ACM Transactions on Information and System Security, vol.18, issue.2, pp.1-625, 2015.
DOI : 10.1007/11556992_32

I. Anati, S. Gueron, S. Johnson, and V. Scarlata, Innovative technology for cpu based attestation and sealing, 2nd Workshop on Hardware and Architectural Support for Security and Privacy, 2013.

S. Bleikertz and T. Mastelic, Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers, 2013 IEEE International Conference on Cloud Engineering (IC2E), pp.78-87, 2013.
DOI : 10.1109/IC2E.2013.31

G. Braendeland, H. E. Dahl, I. Engan, and K. Stølen, Using Dependent CORAS Diagrams to Analyse Mutual Dependency, Critical Information Infrastructures Security, pp.135-148, 2008.
DOI : 10.1007/978-3-540-89173-4_12

S. Butt and H. A. Lagar-cavilla, Self-service cloud computing, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.253-264, 2012.
DOI : 10.1145/2382196.2382226

P. Kamongi, M. Gomathisankaran, and K. Kavi, Nemesis: Automated architecture for threat modeling and risk assessment for cloud computing, In: Academy of Science and Engineering, 2015.

M. Li, W. Zang, K. Bai, M. Yu, and P. Liu, MyCloud, Proceedings of the 29th Annual Computer Security Applications Conference on, ACSAC '13, pp.59-68, 2013.
DOI : 10.1145/2523649.2523680

X. Ou, S. Govindavajhala, and A. W. Appel, MulVAL: A logic-based network security analyzer, 14th USENIX Security Symposium. SSYM'05, pp.8-8, 2005.

N. Santos, R. Rodrigues, K. P. Gummadi, and S. Saroiu, Policy-sealed data: A new abstraction for building trusted cloud services, 21st USENIX Conference on Security Symposium, pp.10-1012, 2012.

D. Sgandurra and E. Lupu, Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems, ACM Computing Surveys, vol.48, issue.3, pp.1-4638, 2016.
DOI : 10.1145/2660267.2660356

A. Shostack, Threat modeling: Designing for security, 2014.

T. Sommestad, M. Ekstedt, and H. Holm, The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures, IEEE Systems Journal, vol.7, issue.3, pp.363-373, 2013.
DOI : 10.1109/JSYST.2012.2221853

A. Srivastava, H. Raj, J. Giffin, and P. England, Trusted VM Snapshots in Untrusted Cloud Infrastructures, 15th International Conference on Research in Attacks, Intrusions, and Defenses, pp.1-21, 2012.
DOI : 10.1007/978-3-642-33338-5_1

J. Szefer, E. Keller, R. B. Lee, and J. Rexford, Eliminating the hypervisor attack surface for a more secure cloud, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.401-412, 2011.
DOI : 10.1145/2046707.2046754

X. Xiong, D. Tian, and P. Liu, Practical protection of kernel integrity for commodity os from untrusted extensions, p.NDSS, 2011.