1. Cloud Security Alliance. Security guidance for critical areas of focus in cloud computing. 2009. http://www.cloudsecurityalliance.org
2. Wang C, Ren K, Wang J. Secure optimization computation outsourcing in cloud computing: a case study of linear programming. IEEE Comput Soc, 2016, 65: 216–229
3. Loftus J, Smart N P. Secure outsourced computation. In: Proceedings of International Conference on Cryptology in Africa, Dakar, 2011. 1–20
4. Zhou J, Cao Z F, Dong X L, et al. EVOC: more efficient verifiable outsourced computation from any one-way trapdoor function. In: Proceedings of IEEE International Conference on Communications, London, 2015. 7444–7449
5. Pearson S, Benameur A. Privacy, security and trust issues arising from cloud computing. In: Proceeding of IEEE Second International Conference on Cloud Computing Technology and Science, Indianapolis, 2010. 693–702