1. Huang, C.-T., Huan, L., Qin, Z., Yuan, H., Zhou, L., Varadharajan, V., and Jay Kuo, C.-C., Survey on securing data storage in the cloud, APSIPA Trans. on Signal Inf. Process., 2014, vol. 3, article e7.
2. X.800: Security architecture for Open Systems Interconnection for CCITT applications. URL: https://www.itu.int/rec/T-REC-X.800-199103-I/en. Cited December, 25, 2020.
3. Egorov, M. and Wilkison, M., ZeroDB white paper. arXiv:1602.07168, 2016.
4. Popa, A., Redfield, C., Zeldovich, N., and Balakrishnan, H., CryptDB: Protecting confidentiality with encrypted query processing, Proc. of the Twenty-Third ACM Symposium on Operating Systems Principles, 2011, pp. 85–100.
5. Felipe, M.R., Mi Aung, K.M., Ye, X., and Yonggang, W., StealthyCRM: A secure cloud CRM system application that supports fully homomorphic database encryption, Int. Conference on Cloud Computing Research and Innovation (ICCCRI), 2015, pp. 97–105.