1. Policy-based secure deletion
2. Combining fragmentation and encryption to protect privacy in data storage;Ciriani;ACM Transactions on Information and System Security (TISSEC),2010
3. Cloud Security Alliance 2011 Security Guidance for Critical Areas of Focus in Cloud Computing V3.0 http://www.cloudsecurityalliance.org/guidance/
4. Cloud Security Alliance 2013 The Notorious Nine - Cloud Computing Top Threats in 2013 http://www.cloudsecurityalliance.org/topthreats
5. Encryption policies for regulating access to outsourced data;De Capitani di Vimercati;ACM Transactions on Database Systems (TODS),2010