M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, On Technical Security Issues in Cloud Computing, 2009 IEEE International Conference on Cloud Computing, pp.109-116, 2009.
DOI : 10.1109/CLOUD.2009.60

I. Studnia, E. Alata, Y. Deswarte, M. Kaâniche, and V. Nicomette, Survey of security problems in cloud computing virtual machines, Proceedings of Computer and Electronics Security Applications Rendez-vous, pp.61-74, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00761206

S. Oktay, Attack types and intrusion detection systems in cloud computing, Proceedings of the 6th International Information Security & Cryptology Conference, pp.71-76, 2013.

G. G. Xie, J. Zhan, D. A. Maltz, H. Zhang, A. Greenberg et al., On static reachability analysis of IP networks, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.2170-2183, 2005.
DOI : 10.1109/INFCOM.2005.1498492

A. Khakpour and A. X. Liu, Quarnet: A tool for quantifying static network reachability, 2009.

R. Marmorstein and P. Kearns, A tool for automated iptables firewall analysis, ATEC '05: Proceedings of the annual conference on USENIX Annual Technical Conference, pp.44-44, 2005.

T. Nelson, C. Barratt, D. J. Dougherty, K. Fisler, and S. Krishnamurthi, The margrave tool for firewall analysis, USENIX Large Installation System Administration Conference, 2010.

S. Bleikertz, Automated security analysis of infrastructure clouds, 2010.

F. Doelitzscher, T. Ruebsamen, T. Karbe, M. Knahl, C. Reich et al., Sun behind clouds-on automatic cloud security audits and a cloud audit policy language, International Journal On Advances in Networks and Services, vol.6, issue.1 2, pp.1-16, 2013.

C. S. Alliance, Secaas implementation guidance: Security assessments, 2012.

S. Bleikertz, T. Groß, M. Schunter, and K. Eriksson, Automated Information Flow Analysis of Virtualized Infrastructures, Computer Security?ESORICS 2011, pp.392-415, 2011.
DOI : 10.1007/978-3-642-23822-2_22

T. Probst, E. Alata, M. Kaaniche, V. Nicomette, and Y. Deswarte, An approach for security evaluation and analysis in cloud computing, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00926367