How can security requirements of critical Infrastructure IT shape Cloud Computing research?