Comput. networks, vol. 54, no. 15, pp. 2787–2805, 2010. [2] D. Henning, “Tackling ISO 27001: A Project to Build an ISMS,” 2009. [3] B. Duncan, “FAST-CCS: Finding a Solution to Cloud Cyber Security,” in The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 2017, pp. 1–3. [4] A. Kantee, “The Rise and Fall of the Operating System,” Login:, pp. 6–9, 2015. [5] C. Lennox, P. Lisowsky, and J. Pittman, “Tax Aggressiveness and Accounting Fraud,” J. Account. Res., vol. 51, no. 0, pp. 739–778, 2013. [6] C. Chang and M. Ramachandran, “Towards Achieving Data Security with the Cloud Computing Adoption Framework,” IEEE Trans. Serv. Comput., vol. 9, no. 1, pp. 138– 151, 2016. [7] T. F. J. Pasquier, J. Singh, J. Bacon, and D. Eyers, “Information Flow Audit for PaaS Clouds,” 2013. [8] B. Duncan and M. Whittington, “Cyber Security for Cloud and the Internet of Things: How Can it be Achieved?,” Forthcom. IET, pp. 1–20, 2017. [9] L. Da Xu, S. Member, W. He, and S. Li, “Internet of Things in Industries : A Survey Internet of Things in Industries : A Survey,” IEEE Trans. Ind. Informatics, vol. 10, no. November, pp. 2233–2243, 2014. [10] V. Chang and M. Ramachandran, “Towards Achieving Data Security with the Cloud Computing Adoption Framework,” IEEE Trans. Serv. Comput., vol. 9, no. 1, pp. 138– 151, 2016. [11] F. Tao, L. Zhang, V. C. Venkatesh, Y. Luo, and Y. Cheng, “Cloud manufacturing: a computing and service-oriented manufacturing model,” Proc. Inst. Mech. Eng. Part B J. Eng. Manuf., vol. 225, no. 10, pp. 1969–1976, 2011. [12] M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker, DDoS defense by offense, vol. 28, no. 1. 2010. [13] T. Fresh, A. States, and G. C. Council, “Call for contributions,” 2016. [14] T. F. J. M. Pasquier, J. Singh, and J. Bacon, “Information Flow Control for Strong Protection with Flexible Sharing in PaaS,” Proc. - 2015 IEEE Int. Conf. Cloud Eng. IC2E 2015, pp. 279–282, 2015. [15] B. Duncan, A. Happe, and A. Bratterud, “Cloud Cyber Security: Finding an Effective Approach with Unikernels,” in Advances in Security in Computing and Communications, J. Sen, Ed. InTech, 2017, p. Chapter 2. [16] D. Larson and V. Chang, “A Review and Future Direction of Agile, Business Intelligence, Analytics and Data Science,” Int. J. Inf. Manage., pp. 1–25, 2016. [17] T. Lorünser, Andreas Happe, and D. Slamanig, “ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing,” IEEE 7th Int. Conf. Cloud Comput. Technol. Sci. CloudCom 2015, Vancouver, Novemb. 30 - December 3, pp. 371–378, 2015. [18] J. A. Chaula, “A Socio-Technical Analysis of Information Systems Security Assurance: A Case Study for Effective Assurance,” 2006. [19] V. Chang, R. Newman, R. J. Walters, and G. B. Wills, “Review of Economic Bubbles,” 2014. [20] J. Singh and J. M. Bacon, “On middleware for emerging health services,” J. Internet Serv. Appl., vol. 5, no. 1, p. 6, 2014. [21] D. C. Langevoort, “The SEC and the Madoff Scandal: Three Narratives in Search of a Story,” Financ. World, no. 1475433, 2009. [22] T. Pasquier, J. Singh, D. Eyers, and J. Bacon, “CamFlow: Managed Data-sharing for Cloud Services,” IEEE Trans. Cloud Comput., no. JUNE, pp. 1–1, 2015. [23] I. Bojanova, G. Hurlburt, and J. Voas, “Imagineering an internet of anything,” Computer (Long. Beach. Calif)., vol. 47, no. 6, pp. 72–77, 2014. [24] Verizon, “Verizon Security Breach Report 2017,” 2017. [25] J. Singh, T. F. J. M. Pasquier, and J. Bacon, “Securing tags to control information flows within the Internet of Things,” 2015 Int. Conf. Recent Adv. Internet Things, RIoT 2015, 2015. [26] K. Krukow, “Towards a theory of trust for the global ubiquitous computer,” Brics.Dk, 2006. [27] M. Creeger, “Distributed Computing CTO Roundtable: Cloud Computing,” Distrib. Comput., vol. 7, no. 5, pp. 1–18, 2009. [28] M. Coppock, “New ‘BrickerBot’ malware attack kills unsecured Internet of Things devices,” Web page, 2017. [Online]. Available: http://www.digitaltrends.com/computing/brickerbot-malware-targets-iot-with-pdos- attacks/. [Accessed: 14-Apr-2017]. [29] G. Sachs, “The Internet of Things: Making sense of the next mega-trend,” 2014. [30] BIIntelligence, “Here’s how the Internet of Things will explode by 2020,” 2016. [Online]. Available: http://www.businessinsider.com/iot-ecosystem-internet- of-things-forecasts-and-business-opportunities-2016-2?IR=T. [Accessed: 01-Jan- 2016]. [31] EMC, “Discover the Digital Universe of Opportunities: Rich Data and the Increasing Value of the Internet of Things,” 2014. [Online]. Available: http://www.emc.com/leadership/digital-universe/index.htm?pid=landing- digitaluniverse-131212. [Accessed: 01-Jan-2016]. [32] J. Research, “‘Internet of Things’ Connected Devices to Almost Triple to over 38 Billion Units by 2020,” 2016. [Online]. Available: http://www.juniperresearch.com/press/press-releases/iot-connected-devices-to- triple-to-38-bn-by-2020. [Accessed: 01-Jan-2016]. [33] J. Gubbi, R. Buyya, and S. Marusic, “1207.0203,” Futur. Gener. Comput. Syst., vol. 29, no. 1, pp. 1–19, 2013. [34] S. Sharma, V. Chang, U. S. Tim, J. Wong, and S. Gadia, “Cloud-based emerging services systems,” Int. J. Inf. Manage., pp. 1–19, 2016. [35] J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, “Twenty Security Considerations for Cloud-Supported Internet of Things,” IEEE Internet Things J., vol. 3, no. 3, pp. 269–284, 2016. [36] A. Zanella, S. Member, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internet of Things for Smart Cities,” IEEE Internet things, vol. 1, no. 1, 2014. [37] D. Evans, “The Internet of Things - How the Next Evolution of the Internet is Changing Everything,” CISCO white Pap., no. April, pp. 1–11, 2011. [38] T. F. J. Pasquier, J. Singh, J. Bacon, and O. Hermant, “Managing Big Data with Information Flow Control,” in Cloud Computing Technology and Science (CloudCom), 2015 IEEE 7th International Conference, 2015, vol. 2, pp. 1–8. [39] J. Singh, “The role of reconfigurable , policy-based middleware in supporting the Internet of Things,” vol. 3, no. 1, p. 2015, 2015. [40] S. Kumbhar, “Critical role for the Internet of Things in wastewater,” iot- now.com, 2016. [Online]. Available: https://www.iot-now.com/2016/08/22/51418- critical-role-for-the-internet-of-things-in-wastewater/#more-51418. [Accessed: 12- Apr-2017]. [41] R. Pavlicek, “Unikernel-based microservices will transform the cloud for the IoT age,” 2016. [Online]. Available: http://techbeacon.com/unikernel-based- microservices-will-transform-cloud-iot-age. [42] W. Hurst, N. Shone, A. El Rhalibi, A. Happe, B. Kotze, and B. Duncan, “Advancing the Micro-CI Testbed for IoT Cyber-Security Research and Education,” in Cloud Computing 2017: The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 2017, pp. 1–6. [43] OWASP, “OWASP Top 10 IoT Vulnerabilities (2014),” 2014. [Online]. Available: https://www.owasp.org/index.php/Top_10_IoT_Vulnerabilities_(2014). [Accessed: 07- Jul-2016]. [44] K. L. Lueth, “Current state of the 360+ IoT Platforms,” 2016. [Online]. Available: https://iot-analytics.com/current-state-of-iot-platforms-2016/. [Accessed: 07-Jul-2016]. [45] B. Duncan, A. Happe, and A. Bratterud, “Enterprise IoT Security and Scalability: How Unikernels can Improve the Status Quo,” in 9th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2016), 2016, pp. 1–6. [46] OWASP, “OWASP IoT Security Guidance,” 2016. [Online]. Available: https://www.owasp.org/index.php/IoT_Security_Guidance. [Accessed: 07-Jul-2016]. [47] CBR, “IoT security breach forces kitchen devices to reject junk food,” CBROnline, 2015. [Online]. Available: http://www.cbronline.com/news/internet-of- things/consumer/iot-security-breach-forces-kitchen-devices-to-reject-junk-food- 4544884. [Accessed: 01-Jan-2016].