Ahamed Ali S, Ramakrishnan M and Duraipandian N.
(2019). A Comprehensive Analysis of Key Management Models in the Cloud: Design, Challenges, and Future Directions. International Conference on Intelligent Computing and Applications. 10.1007/978-981-13-2182-5_5. (53-61).
Zeidler C and Asghar M.
(2017). Towards a Framework for Privacy-Preserving Data Sharing in Portable Clouds. Cloud Computing and Services Science. 10.1007/978-3-319-62594-2_14. (273-293).
Zeidler C and Asghar M.
(2016). CloudEFS: Efficient and secure file system for cloud storage 2016 14th Annual Conference on Privacy, Security and Trust (PST). 10.1109/PST.2016.7906969. 978-1-5090-4379-8. (239-246).
Hadavi M, Jalili R and Karimi L.
(2016). Access control aware data retrieval for secret sharing based database outsourcing. Distributed and Parallel Databases. 34:4. (505-534). Online publication date: 1-Dec-2016.
Capitani Di Vimercati S, Foresti S, Livraga G and Samarati P. Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud. LNCS Essays on The New Codebreakers - Volume 9100. (205-239).
Tian X, Huang L, Wang Y, Sha C and Wang X.
(2015). DualAcE. Security and Communication Networks. 8:8. (1494-1508). Online publication date: 25-May-2015.
Guo X, Sun S and Vogel D.
(2014). A Dataflow Perspective for Business Process Integration. ACM Transactions on Management Information Systems. 5:4. (1-33). Online publication date: 21-Mar-2015.
Li T, Hu L, Li Y, Chu J, Li H and Han H.
(2015). The Research and Prospect of Secure Data Access Control in Cloud Storage Environment. Journal of Communications. 10.12720/jcm.10.10.753-759.
De Capitani S, Foresti S, Jajodia S and Samarati P.
(2014). Database Security and Privacy. Computing Handbook, Third Edition. 10.1201/b16768-61. (53-1-53-21). Online publication date: 13-May-2014.
Kumar K, Liu J, Lu Y and Bhargava B.
(2013). A Survey of Computation Offloading for Mobile Systems. Mobile Networks and Applications. 18:1. (129-140). Online publication date: 1-Feb-2013.
Shiraz M, Gani A, Khokhar R and Buyya R. A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing. IEEE Communications Surveys & Tutorials. 10.1109/SURV.2012.111412.00045. 15:3. (1294-1313).
Zhang Y and Chen J.
(2013). Homomorphic-Encryption-Based Separation Approach for Outsourced Data Management. Service-Oriented Computing. 10.1007/978-3-642-37804-1_4. (24-34).
Decat M, Lagaisse B and Joosen W. Toward efficient and confidentiality-aware federation of access control policies. Proceedings of the 7th Workshop on Middleware for Next Generation Internet Computing. (1-6).
Jia Z, Pang L, Luo S, Zhang J and Xin Y. A Privacy-Preserving Access Control Protocol for Database as a Service. Proceedings of the 2012 International Conference on Computer Science and Service System. (849-854).
Zhang Y and Chen J. Access Control as a Service for Public Cloud Storage. Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops. (526-536).
Decroix K, Milutinovic M, De Decker B and Naessens V. A generic architecture for integrating health monitoring and advanced care provisioning. Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security. (163-170).
Tian X, Wang X and Zhou A. A Privacy Preserving Selective Authorization Enforcement Approach in Daas. Proceedings of the 2011 IEEE World Congress on Services. (363-370).
Zhang Y and Chen J. Flexible Authorization by Generating Public Re-decryption Trapdoor in Outsourced Scenarios. Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing. (760-761).
Tourani P, Hadavi M and Jalili R.
(2011). Access control enforcement on outsourced data ensuring privacy of access control policies Simulation (HPCS). 10.1109/HPCSim.2011.5999865. 978-1-61284-380-3. (491-497).
De Capitani di Vimercati S, Foresti S and Samarati P.
(2011). Protecting Information Privacy in the Electronic Society. e-Business and Telecommunications. 10.1007/978-3-642-20077-9_2. (20-36).
Liu J and Lu Y. Energy savings in privacy-preserving computation offloading with protection by homomorphic encryption. Proceedings of the 2010 international conference on Power aware computing and systems. (1-7).
Sánchez L, Santos-Olmo A, Fernández-Medina E and Piattini M. Building ISMS through the reuse of knowledge. Proceedings of the 7th international conference on Trust, privacy and security in digital business. (190-201).
Liu J, Kumar K and Lu Y. Tradeoff between energy savings and privacy protection in computation offloading. Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design. (213-218).
Vimercati S, Foresti S, Jajodia S, Paraboschi S and Samarati P.
(2010). Encryption policies for regulating access to outsourced data. ACM Transactions on Database Systems. 35:2. (1-46). Online publication date: 1-Apr-2010.
Frikken K and Srinivas P. Key allocation schemes for private social networks. Proceedings of the 8th ACM workshop on Privacy in the electronic society. (11-20).