1. Lecture Notes in Computer Science;M. Abdalla,2005
2. Bardin, J., Callas, J., Chaput, S., Fusco, P., Gilbert, F., Hoff, C., Hurst, D., Kumaraswamy, S., Lynch, L., Matsumoto, S., O’Higgins, B., Pawluk, J., Reese, G., Reich, J., Ritter, J., Spivey, J., Viega, J.: Security guidance for critical areas of focus in cloud computing. Technical report, Cloud Security Alliance (April 2009)
3. Lecture Notes in Computer Science;M. Bellare,2007
4. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symp. on Security and Privacy 2007, pp. 321–334 (2007)
5. Lecture Notes in Computer Science;D. Boneh,2004