1. Anitha, R. and Mukherjee, S., Metadata driven efficient CRE based cipher key generation and distribution in cloud security, Int. J. Secur. Appl., 2014, vol. 8, no. 3, pp. 377–392. http://www.sersc.org/journals/IJSIA/vol8_no3_2014/37.pdf.
2. Heurix, J., Karlinger, M., and Neubauer T., Perimeter, Pseudonymization and personal metadata encryption for privacy-preserving searchable documents, Proc. Int. Conf. Health Syst., 2012, vol. 1, no. 1, pp. 46–57.
3. Ruj, S., Nayak, A., and Stojmenovic, I., DACC: Distributed Access Control in Clouds, Proc. of IEEE 10th International Conference “Trust, Security and Privacy in Computing and Communications (TrustCom),” 2011, pp. 91–98.
4. Zukarnain, Z.A. and Khalid, R., Quantum key distribution approach for cloud authentication: Enhance tight finite key, International Conference on Computer Science and Information Systems (ICSIS’2014), Dubai, 2014, pp. 28–33.
5. Belim, S.V. and Bogachenko, N.F., Construction of role-based security policies on an arbitrary directed graph, Probl. Inf. Bezop., Komp’yut. Sist., 2009, no. 3, pp. 7–17.