1. Amazon: “Amazon Web services” (2017).
http://aws.amazon.com
2. Microsoft: “Microsoft Azure” (2017).
http://www.microsoft.com/azure
3. Google: “Google App Engine” (2017).
http://code.google.com/appengine
4. Zhang, Y., Katz, J., Papamanthou, C.: All your queries are belong to us: the power of file-injection attacks on searchable encryption. In: 25th USENIX Security Symposium (USENIX), pp. 707–720. USENIX Association (2016)
5. Curtmola, R., Garay, J., Kamara, S., et al.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), vol. 95, No. 5, pp. 79–88. ACM (2006)