T. Hyla and J. Peja?, Certificate-Based Encryption Scheme with General Access Structure, CISIM 2012, pp.41-55, 2012.
DOI : 10.1007/978-3-642-33260-9_3

Y. Sang, J. Zeng, Z. Li, and L. You, A Secret Sharing Scheme with General Access Structures and its Applications, International Journal of Advancements in Computing Technology, vol.3, issue.4, pp.121-128, 2011.

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, CRYPTO, pp.47-53, 1984.
DOI : 10.1007/3-540-39568-7_5

D. Boneh, M. Franklin, and K. , Identity-Based Encryption from the Weil Pairing, Lecture Notes in Computer Science, vol.2139, pp.213-229, 2001.
DOI : 10.1007/3-540-44647-8_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.3708

S. Chatterjee and P. Sarkar, Identity-Based Encryption, 2011.
DOI : 10.1007/978-1-4419-9383-0

S. D. Galbraith, K. G. Paterson, and N. P. Smart, Pairings for cryptographers, Discrete Applied Mathematics, vol.156, issue.16, pp.3113-3121, 2008.
DOI : 10.1016/j.dam.2007.12.010

URL : http://doi.org/10.1016/j.dam.2007.12.010

S. Al-riyami and K. Paterson, Certificateless Public Key Cryptography, Advances in Cryptology -AsiaCrypt, pp.452-473, 2003.
DOI : 10.1007/978-3-540-40061-5_29

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.8328

K. Bentahar, P. Farshim, J. Malone-lee, and N. P. Smart, Generic Constructions of Identity-Based and Certificateless KEMs, Journal of Cryptology, vol.33, issue.2, pp.178-199, 2008.
DOI : 10.1007/s00145-007-9000-z

D. Burak and M. Chudzik, Parallelization of the Discrete Chaotic Block Encryption Algorithm, Proceedings of the 9th International Conference on Parallel Processing and Applied Mathematics, PPAM 2011, pp.323-332, 2012.
DOI : 10.1007/978-3-642-31500-8_33

R. Cramer, R. Shoup, and V. , Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack, SIAM Journal on Computing, vol.33, issue.1, pp.167-226, 2004.
DOI : 10.1137/S0097539702403773

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.9833

M. Bell, Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture, 2008.

B. Lynn, PBC Library Specification, 2013.

M. Souppaya, J. Wack, and . Kent, K: Security Configuration Checklist Program for IT Products -Guidance for Checklist Users and Developers, NIST Special Publication SP, pp.800-70, 2005.
DOI : 10.6028/NIST.SP.800-70

D. Boneh, B. Lynn, and H. Shacham, Short Signatures from the Weil Pairing, ASIACRYPT, pp.514-532, 2001.
DOI : 10.1007/3-540-45682-1_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.1494

G. Appenzeller, Identity-Based Encryption Architecture and Supporting Data Structures, 2009.
DOI : 10.17487/rfc5408

D. Boneh, C. Gentry, B. Lynn, and H. Shacham, Aggregate and verifiably encrypted signatures from bilinear maps, advances in cryptology ? Eurocrypt'03, Lecture Notes in Computer Science, vol.2656, pp.614-629, 2003.
DOI : 10.1007/3-540-39200-9_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.459

C. Gentry and A. Silverberg, Hierarchical ID-Based Cryptography, Advances in Cryptology ? ASIACRYPT 2002, pp.548-566, 2002.
DOI : 10.1007/3-540-36178-2_34

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.7270

E. Fray, I. Kurkowski, M. Peja?, J. Ma?ków, and W. , A New Mathematical Model for Analytical Risk Assessment and Prediction in IT Systems, Control and Cybernetics, vol.41, issue.1, pp.241-268, 2012.

E. Fray and I. , A Comparative Study of Risk Assessment Methods, MEHARI & CRAMM with a New Formal Model of Risk Assessment (FoMRA) in Information Systems, CISIM 2012, pp.428-442, 2012.

T. Hyla, I. Fray, J. Peja?, and W. Ma?ków, Long-term preservation of digital signatures for multiple groups of related documents, IET Information Security, vol.6, issue.3, pp.219-227, 2012.
DOI : 10.1049/iet-ifs.2011.0344