1. Cloud Security Alliance, Cloud usage: risks and opportunities report, in, September 2014.
2. European Network and Information Security Agency, Cloud computing. Benefits, risks and recommendations for information security. Revision B, in: L. Dupré, T. Haeberlen (Eds.), December 2012.
3. E. Ramirez, J. Brill, M.K. Ohlhausen, J.D. Wright, T. McSweeny, Data Brokers: A call for transparency and accountability, in, federal trade commission, May 2014.
4. CURE—Towards enforcing a reliable timeline for cloud forensics: model, architecture, and experiments;Battistoni;Comput. Commun.,2016
5. Fully homomorphic encryption with polylog overhead;Gentry,2012