1. SeDaSC: Secure Data Sharing in Clouds
2. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
3. Ben-Yehuda, M., Day, M. D., Dubitzky, Z., & Factor, M., Har'El, N., Gordon, A., ... Yassour B.A. (2010). The turtle’s project: design and implementation of nested virtualization. Proceedings of USENIX Conference on Operating Systems Design and Implementation (pp. 423-436). Vancouver, BC, Canada:USENIX Association.
4. Vtpm: Virtualizing the trusted platform module.;S.Berger;USENIX Security,2006
5. Cloud Security Alliance. (2010). Top threats to cloud computing. Retrieved from https://cloudsecurityalliance.org/document/top-threats-to-cloud-computing-2016/