• Ahamed Ali S, Ramakrishnan M and Duraipandian N. (2019). A Comprehensive Analysis of Key Management Models in the Cloud: Design, Challenges, and Future Directions. International Conference on Intelligent Computing and Applications. 10.1007/978-981-13-2182-5_5. (53-61).

    http://link.springer.com/10.1007/978-981-13-2182-5_5

  • Zeidler C and Asghar M. (2017). Towards a Framework for Privacy-Preserving Data Sharing in Portable Clouds. Cloud Computing and Services Science. 10.1007/978-3-319-62594-2_14. (273-293).

    http://link.springer.com/10.1007/978-3-319-62594-2_14

  • Zeidler C and Asghar M. (2016). CloudEFS: Efficient and secure file system for cloud storage 2016 14th Annual Conference on Privacy, Security and Trust (PST). 10.1109/PST.2016.7906969. 978-1-5090-4379-8. (239-246).

    http://ieeexplore.ieee.org/document/7906969/

  • Hadavi M, Jalili R and Karimi L. (2016). Access control aware data retrieval for secret sharing based database outsourcing. Distributed and Parallel Databases. 34:4. (505-534). Online publication date: 1-Dec-2016.

    https://doi.org/10.1007/s10619-015-7186-x

  • Vimercati S, Foresti S, Paraboschi S, Pelosi G and Samarati P. (2015). Shuffle Index. ACM Transactions on Storage. 11:4. (1-55). Online publication date: 21-Nov-2015.

    https://doi.org/10.1145/2747878

  • Capitani Di Vimercati S, Foresti S, Livraga G and Samarati P. Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud. LNCS Essays on The New Codebreakers - Volume 9100. (205-239).

    https://doi.org/10.1007/978-3-662-49301-4_15

  • Tian X, Huang L, Wang Y, Sha C and Wang X. (2015). DualAcE. Security and Communication Networks. 8:8. (1494-1508). Online publication date: 25-May-2015.

    https://doi.org/10.1002/sec.1098

  • Guo X, Sun S and Vogel D. (2014). A Dataflow Perspective for Business Process Integration. ACM Transactions on Management Information Systems. 5:4. (1-33). Online publication date: 21-Mar-2015.

    https://doi.org/10.1145/2629450

  • Li T, Hu L, Li Y, Chu J, Li H and Han H. (2015). The Research and Prospect of Secure Data Access Control in Cloud Storage Environment. Journal of Communications. 10.12720/jcm.10.10.753-759.

    http://www.jocm.us/index.php?m=content&c=index&a=show&catid=152&id=869

  • De Capitani S, Foresti S, Jajodia S and Samarati P. (2014). Database Security and Privacy. Computing Handbook, Third Edition. 10.1201/b16768-61. (53-1-53-21). Online publication date: 13-May-2014.

    http://www.crcnetbase.com/doi/abs/10.1201/b16768-61

  • Kumar K, Liu J, Lu Y and Bhargava B. (2013). A Survey of Computation Offloading for Mobile Systems. Mobile Networks and Applications. 18:1. (129-140). Online publication date: 1-Feb-2013.

    https://doi.org/10.1007/s11036-012-0368-0

  • Shiraz M, Gani A, Khokhar R and Buyya R. A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing. IEEE Communications Surveys & Tutorials. 10.1109/SURV.2012.111412.00045. 15:3. (1294-1313).

    http://ieeexplore.ieee.org/document/6365155/

  • Zhang Y and Chen J. (2013). Homomorphic-Encryption-Based Separation Approach for Outsourced Data Management. Service-Oriented Computing. 10.1007/978-3-642-37804-1_4. (24-34).

    http://link.springer.com/10.1007/978-3-642-37804-1_4

  • Decat M, Lagaisse B and Joosen W. Toward efficient and confidentiality-aware federation of access control policies. Proceedings of the 7th Workshop on Middleware for Next Generation Internet Computing. (1-6).

    https://doi.org/10.1145/2405178.2405182

  • Jia Z, Pang L, Luo S, Zhang J and Xin Y. A Privacy-Preserving Access Control Protocol for Database as a Service. Proceedings of the 2012 International Conference on Computer Science and Service System. (849-854).

    https://doi.org/10.1109/CSSS.2012.217

  • Zhang Y and Chen J. Access Control as a Service for Public Cloud Storage. Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops. (526-536).

    https://doi.org/10.1109/ICDCSW.2012.65

  • Decroix K, Milutinovic M, De Decker B and Naessens V. A generic architecture for integrating health monitoring and advanced care provisioning. Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security. (163-170).

    /doi/10.5555/2046108.2046131

  • Tian X, Wang X and Zhou A. A Privacy Preserving Selective Authorization Enforcement Approach in Daas. Proceedings of the 2011 IEEE World Congress on Services. (363-370).

    https://doi.org/10.1109/SERVICES.2011.59

  • Zhang Y and Chen J. Flexible Authorization by Generating Public Re-decryption Trapdoor in Outsourced Scenarios. Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing. (760-761).

    https://doi.org/10.1109/CLOUD.2011.87

  • Tourani P, Hadavi M and Jalili R. (2011). Access control enforcement on outsourced data ensuring privacy of access control policies Simulation (HPCS). 10.1109/HPCSim.2011.5999865. 978-1-61284-380-3. (491-497).

    http://ieeexplore.ieee.org/document/5999865/

  • De Capitani di Vimercati S, Foresti S and Samarati P. (2011). Protecting Information Privacy in the Electronic Society. e-Business and Telecommunications. 10.1007/978-3-642-20077-9_2. (20-36).

    http://link.springer.com/10.1007/978-3-642-20077-9_2

  • Liu J and Lu Y. Energy savings in privacy-preserving computation offloading with protection by homomorphic encryption. Proceedings of the 2010 international conference on Power aware computing and systems. (1-7).

    /doi/10.5555/1924920.1924925

  • Sánchez L, Santos-Olmo A, Fernández-Medina E and Piattini M. Building ISMS through the reuse of knowledge. Proceedings of the 7th international conference on Trust, privacy and security in digital business. (190-201).

    /doi/10.5555/1894888.1894911

  • Liu J, Kumar K and Lu Y. Tradeoff between energy savings and privacy protection in computation offloading. Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design. (213-218).

    https://doi.org/10.1145/1840845.1840887

  • Vimercati S, Foresti S, Jajodia S, Paraboschi S and Samarati P. (2010). Encryption policies for regulating access to outsourced data. ACM Transactions on Database Systems. 35:2. (1-46). Online publication date: 1-Apr-2010.

    https://doi.org/10.1145/1735886.1735891

  • Frikken K and Srinivas P. Key allocation schemes for private social networks. Proceedings of the 8th ACM workshop on Privacy in the electronic society. (11-20).

    https://doi.org/10.1145/1655188.1655191

  • Tian X, Wang X and Zhou A. DSP RE-Encryption. Proceedings of the 2009 IEEE International Conference on Cloud Computing. (25-32).

    https://doi.org/10.1109/CLOUD.2009.65