Applying a Threat Model to Cloud Computing | IEEE Conference Publication | IEEE Xplore