1. Mell P, Grance T. The NIST definition of cloud computing[J]. Communications of the ACM, 2009, 53(6): 50–50.
2. Atallah M J, Pantazopoulos K N, Rice J R, et al. Secure outsourcing of scientific computations[J]. Communications of the ACM, 2002, 54(01):215–272.
3. Buyya R, Yeo C S, Venugopal S, et al. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility[J]. Future Generation Computer Systems, 2009, 25(6):599–616.
4. Chen X, Li J, Ma J, et al. New algorithms for secure outsourcing of modular exponentiations[C] //Computer Security -ESORICS 2012. Berlin: Springer-Verlag, 2012: 2386–2396.
5. Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases[J]. ACM Transactions on Storage, 2004, 2(2): 107–138.