1. Wang, C., et al.: Secure and practical outsourcing of linear programming in cloud computing. In: IEEE INFOCOM (2011)
2. Cloud Security Alliance: Security guidance for critical areas of focus in cloud computing. (2009). http://www.cloudsecurityalliance.org
3. Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97–105 (2010)
4. Sun Microsystems, Inc.: Building customer trust in cloud computing with transparent security (2009). https://www.sun.com/offers/details/suntransparency.xml
5. Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.H.: Secure outsourcing of scientific computations. Adv. Comput. 54, 216–272 (2001)