1. Alpar, G.: Attribute-based identity management. PhD thesis (2015)
2. Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for key management-part 1: general(Revision 4). NIST Spec. Publ. 800–57, 1–156 (2015)
3. Barreto, PSLM., Naehrig, M.: Pairing-friendly elliptic curves of prime order. In: 12th International Conference on Selected Areas in Cryptography, Springer-Verlag, SAC’05, pp. 319–331 (2006)
4. Bartoletti, D., Nelson, LE., Cser, A., Rymer, JR., Kindness, A., Martorelli, W.: Predictions 2016: The cloud accelerates. In: Forrester Research Technical Report, Forrester Inc, (2015) https://www.forrester.com/report/Predictions+2016+The+Cloud+Accelerates/-/E-RES125317
5. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, IEEE Computer Society, SP ’07, pp. 321–334 (2007)