http://dx.doi.org.proxy1.ncu.edu/10.1145/2767181 Ardagna, C. A., Asal, R., Damia

http://dx.doi.org.proxy1.ncu.edu/10.1145/2767181
Ardagna, C. A., Asal, R., Damiani, E., & Vu, Q. H. (2015). From Security to Assurance in the Cloud: A Survey. ACM Computing Surveys (CSUR), 48(1), Article 2, 2-50.
http://proxy1.ncu.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=108810871&site=eds-live
Chhabra, S., & Dixit, V. S. (2015, March). Cloud computing: State of the art and security issues. ACM SIGSOFT Software Engineering Notes, 40(2), 1-11.
http://dx.doi.org.proxy1.ncu.edu/10.1145/2735399.2735405
Dahbur, K., Mohammad, B., & Tarakji, A. B. (2011). A Survey of Risks, Threats and Vulnerabilities in Cloud Computing. Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications (p. Article 12, pp. 1-6). New York, NY: ACM.
http://dx.doi.org.proxy1.ncu.edu/10.1145/1980822.1980834
How to Write an Annotated Bibliography-APA Style. (2015). University of Maryland, University College.http://www.umuc.edu/library/libhow/bibliography_apa.cfm
Purdue OWL: Annotated Bibliographies. (2015). Purdue Online Writing Lab. https://owl.english.purdue.edu/owl/resource/614/03/
Instructions
Read the assigned resources pertaining to this week’s topics. Conduct a comprehensive literature search and review four additional peer-reviewed scholarly articles that provide sufficient background on the topics within the cloud computing security area. Write a thematically sorted, critical annotated bibliography of all articles in which you address the items below (for each work).
The work’s purpose
A concise summary of its contents
Its relevance to the topic
An analysis of the contribution’s unique characteristics
Your critical analysis of the study’s strengths and weaknesses
Each annotation should consist of at least 250 words, must be formatted properly, and must have a logical flow and transition between them. The final submission must contain a title page, table of contents, and reference list. Ensure an intuitive correlation and reference to any works other than those directly annotated that provide additional breadth and depth to the subject matter. Also, note that the analysis of the works should not focus on any challenges faced with the technologies’ implementation, development, or application as a technological analysis will be conducted in the following week. This annotated bibliography should provide sufficient background on the topic to provide a foundation for additional scholarly work.
Length: 8 annotations of approximately 250 words each
Your paper should demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic. 

"Get 15% discount on your first 3 orders with us"
Use the following coupon
"FIRST15"

Order Now