1. Understanding cloud computing vulnerabilities;Grobauer;IEEE Secur. Priv.,2011
2. Analysis of integrity vulnerabilities and a non-repudiation protocol for cloud data storage platforms;Feng,2010
3. Remote integrity checking - how to trust files stored on untrusted servers;Deswarte,2003
4. Bootstrapping pay-as-you-go data integration systems;Sarma,2008
5. Proofs of storage from homomorphic identification protocols;Ateniese,2009