1. Bouchaala M, Ghazel C, Azouz Saidane L. End to end cloud computing architecture based on A novel classification of security issues. In: International conference on computer systems and applications, AICCSA IEEE on. 2018.
2. Matthew G, Susan H, Brent W. Outsourcing the decryption of ABE ciphertexts. In: Proceeding SEC 11 proceedings of the 20th USENIX conference on security. 2011. p. 34.
3. John B, Amit S, Brent W. Ciphertext-policy attribute-based encryption. In: Symposium on security and privacy, SP ’07 Proceedings of the 2007 IEEE on. 2007. p. 321–34.
4. Attribute-based encryption without key cloning;Hinek;Int J Appl Cryptogr,2012
5. A2BE: Accountable attribute-based encryption for abuse free access control;Li;IACR Cryptol ePrint Arch,2009