J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007.
DOI : 10.1109/SP.2007.11

D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, Advances in Cryptology CRYPTO 2001, pp.213-229, 2001.
DOI : 10.1007/3-540-44647-8_13

M. Carroll, A. Van-der-merwe, and P. Kotze, Secure cloud computing: Benefits, risks and controls, 2011 Information Security for South Africa, pp.1-9, 2011.
DOI : 10.1109/ISSA.2011.6027519

M. Chase and S. S. Chow, Improving privacy and security in multi-authority attribute-based encryption, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.121-130, 2009.
DOI : 10.1145/1653662.1653678

R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon et al., Controlling data in the cloud, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.85-90, 2009.
DOI : 10.1145/1655008.1655020

D. Deshmukh, A. Pasha, and D. Qureshi, Transparent data encryption?solution for security of database contents, 2013.

S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, Over-encryption: Management of access control evolution on outsourced data, Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB '07, pp.123-134, 2007.

R. A. Elmasri and S. B. Navathe, Fundamentals of Database Systems [With Access Code, 2011.

M. R. Farcasescu, Trust Model Engines in Cloud Computing, 2012 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, pp.465-470, 2012.
DOI : 10.1109/SYNASC.2012.57

L. Ferretti, M. Colajanni, M. Marchetti, and A. E. Scaruffi, Transparent access on encrypted data distributed over multiple cloud infrastructures, CLOUD COMPUTING 2013 The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization, pp.201-207, 2013.

A. Fiat and M. Naor, Broadcast Encryption, Lecture Notes in Computer Science, vol.773, pp.480-491, 1994.
DOI : 10.1007/3-540-48329-2_40

B. Gowrigolla, S. Sivaji, and M. R. Masillamani, Design and auditing of Cloud computing security, 2010 Fifth International Conference on Information and Automation for Sustainability, pp.292-297, 2010.
DOI : 10.1109/ICIAFS.2010.5715676

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006.
DOI : 10.1145/1180405.1180418

L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes, 2009.

W. Jansen and T. Grance, Guidelines on security and privacy in public cloud computing, NIST special publication, vol.800, p.144, 2011.
DOI : 10.6028/NIST.SP.800-144

K. M. Khan and Q. Malluhi, Establishing Trust in Cloud Computing, IT Professional, vol.12, issue.5, pp.20-27, 2010.
DOI : 10.1109/MITP.2010.128

J. Kim, W. Susilo, M. Au, and J. Seberry, Efficient Semi-static Secure Broadcast Encryption Scheme, Pairing-Based Cryptography Pairing 2013, pp.62-76, 2014.
DOI : 10.1007/978-3-319-04873-4_4

G. Kulkarni, N. Chavan, R. Chandorkar, R. Waghmare, and R. Palwe, Cloud security challenges, 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), pp.88-91, 2012.
DOI : 10.1109/TSSA.2012.6366028

W. Lee and C. Lee, A cryptographic key management solution for hipaa privacy/security regulations, Information Technology in Biomedicine IEEE Transactions on, vol.12, issue.1, pp.34-41, 2008.

M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, Analysis of antennas and scatterers with nonlinear loads, IEEE Transactions on Antennas and Propagation, vol.24, issue.2, pp.131-143, 2013.
DOI : 10.1109/TAP.1976.1141328

T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. Theory in practice, 2009.

D. Duong-hieu-phan, . Pointcheval, . Siamakf, M. Shahandashti, and . Strefler, Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts, International Journal of Information Security, vol.33, issue.5, pp.251-265, 2013.
DOI : 10.1007/s10207-013-0190-0

R. Popa, C. M. Redfield, N. Zeldovich, and H. Balakrishnan, CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.85-100, 2011.
DOI : 10.1145/2043556.2043566

Z. Shen and Q. Tong, The security of cloud computing system enabled by trusted computing technology, 2010 2nd International Conference on Signal Processing Systems, pp.2-11, 2010.
DOI : 10.1109/ICSPS.2010.5555234

S. Tu, M. F. Kaashoek, S. Madden, and N. Zeldovich, Processing analytical queries over encrypted data, Proceedings of the VLDB Endowment, vol.6, issue.5, pp.289-300, 2013.
DOI : 10.14778/2535573.2488336

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Yu, C. Wang, K. Ren, and W. Lou, Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, 2010 Proceedings IEEE INFOCOM, pp.1-9, 2010.
DOI : 10.1109/INFCOM.2010.5462174

S. Yu, C. Wang, K. Ren, and W. Lou, Attribute based data sharing with attribute revocation, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.261-270, 2010.
DOI : 10.1145/1755688.1755720

Q. Zheng, S. Xu, and G. Ateniese, VABKS: Verifiable attribute-based keyword search over outsourced encrypted data, IEEE INFOCOM 2014, IEEE Conference on Computer Communications, 2013.
DOI : 10.1109/INFOCOM.2014.6847976

L. Zhou, V. Varadharajan, and M. Hitchens, Enforcing Role-Based Access Control for Secure Data Storage in the Cloud, The Computer Journal, vol.54, issue.10, pp.1675-1687, 2011.
DOI : 10.1093/comjnl/bxr080

Z. Zhou and D. Huang, On efficient ciphertext-policy attribute based encryption and broadcast encryption, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.753-755, 2010.
DOI : 10.1145/1866307.1866420

X. Zou, Y. Dai, and E. Bertino, A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, pp.538-546, 2008.
DOI : 10.1109/INFOCOM.2008.102