1. Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic security for mobile code. In: Security and Privacy, pp. 2–11. IEEE, Los Alamitos (2001)
2. Amazon. Elastic Block Store, EBS (2011), http://aws.amazon.com/ebs
3. Amazon. Elastic Compute Cloud, EC2 (2011), http://aws.amazon.com/ec2
4. Atallah, M., Pantazopoulos, K., Rice, J., Spafford, E.: Secure outsourcing of scientific computations. Advances in Computers 54, 216–272 (2001)
5. Lecture Notes in Computer Science;M. Bellare,2004