Identifying the Threats in Cloud Computing
Download paper