D. Aranha, J. López, and D. Hankerson, High-Speed Parallel Software Implementation of the ? T Pairing, Topics in Cryptology -CT-RSA 2010, pp.89-105, 2010.
DOI : 10.1007/978-3-642-11925-5_7

A. Armando, R. Carbone, L. Compagna, J. Cuellar, and L. Tobarra, Formal analysis of SAML 2.0 web browser single sign-on, Proceedings of the 6th ACM workshop on Formal methods in security engineering, FMSE '08, pp.1-10, 2008.
DOI : 10.1145/1456396.1456397

A. Sobhi-atteih, S. A. Algahtani, and A. Nazmy, Emergency management information system: Case study, GM, Unicom for Communication Technologies

R. B. Dilmaghani and R. R. Rao, A systematic approach to improve communication for emergency response, Proceedings of the 42nd Hawaii International Conference on System Sciences, IEEE HICSS '09, pp.1-8, 2009.

B. Bamba, L. Liu, P. Pesti, and T. Wang, Supporting anonymous location queries in mobile environments with privacygrid, Proceeding of the 17th international conference on World Wide Web , WWW '08, pp.237-246, 2008.
DOI : 10.1145/1367497.1367531

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.4944

J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption . Security and Privacy, IEEE Symposium on, vol.0, pp.321-334, 2007.
DOI : 10.1109/sp.2007.11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744

B. Bhaduri, E. A. Bright, and V. Vijayraj, Towards a geospatial knowledge discovery framework for disaster management, Proc. of ESA-EUSC 2008, 2008.

S. Bugiel, S. Nurnberger, A. Sadeghi, and T. Schneider, Twin clouds: An architecture for secure cloud computing, Proc. of Workshop on Cryptography and Security in Clouds, ECRYPT-II, 20011.
DOI : 10.1007/978-3-642-24712-5_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.671.7146

R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon et al., Controlling data in the cloud, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, pp.85-90, 2009.
DOI : 10.1145/1655008.1655020

T. Cucinotta, G. Cecchetti, and G. Ferraro, Adopting redundancy techniques for multicast stream authentication, The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems, 2003. FTDCS 2003. Proceedings., p.3, 2003.
DOI : 10.1109/FTDCS.2003.1204331

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.8214

T. R. De-lanerolle, W. Anderson, S. Defabbia-kane, E. Fox-epstein, D. Gochev et al., Development of a virtual dashboard for event coordination between multipul groups, Proc. of 7th International Conference on Information Systems for Crisis Response and Management, 2010.

C. Decapua and B. Bhaduri, Applications of geospatial technology in international disasters and during hurricane katrina. In available at the Project Site of " Capturing Hurricane Katrina Data For Analysis and Lessons-Learned Research, 2007.

H. Eltaief and H. Youssef, Efficient sender authentication and signing of multicast streams over lossy channels, ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2010, pp.1-7, 2010.
DOI : 10.1109/AICCSA.2010.5586962

J. Therese, B. Fajardo, and C. M. Oppus, A mobile disaster management system using the android technology, In INternational Journal of Communications, vol.3, pp.77-86, 2009.

K. Fukushima, S. Kiyomoto, and Y. Miyake, Towards secure cloud computing architecture -a solution based on software protection mechanism, Journal of Internet Services and Information Security (JISIS), vol.1, issue.5, pp.4-17

M. Gedik and L. Liu, A customizable k-anonymity model for protecting location privacy, Proc. of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), pp.620-629, 2005.

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009.
DOI : 10.1145/1536414.1536440

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7592

G. Ghinita, P. Kalnis, and S. Skiadopoulos, PRIVÉPRIV´PRIVÉ: Anonymous location-based queries in distributed mobile systems, Proc. of 16th International World Wide Web Conference, pp.371-380, 2007.

P. Golle and N. Modadugu, Authenticating streamed data in the presence of random packet loss (extended abstract), ISOC Network and Distributed System Security Symposium, pp.13-22, 2001.

H. Gomi, M. Hatakeyama, S. Hosono, and S. Fujita, A delegation framework for federated identity management, Proceedings of the 2005 workshop on Digital identity management , DIM '05, pp.94-103, 2005.
DOI : 10.1145/1102486.1102502

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006.
DOI : 10.1145/1180405.1180418

M. Gruteser and D. Grunwald, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pp.163-168, 2003.
DOI : 10.1145/1066116.1189037

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.1445

J. I. Hong and J. A. Landay, An architecture for privacy-sensitive ubiquitous computing, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, pp.177-189, 2004.
DOI : 10.1145/990064.990087

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.135.3857

W. A. Jansen, Cloud Hooks: Security and Privacy Issues in Cloud Computing, 2011 44th Hawaii International Conference on System Sciences, pp.1-10, 2011.
DOI : 10.1109/HICSS.2011.103

K. Hamlen, M. Kantarcioglu, L. Khan, and B. Thuraisingham, Security issues for cloud computing, International Journal of Information Security and Privacy, vol.4, issue.2, pp.39-51, 2010.

M. T. Khorshed, A. S. Ali, and S. A. Wasimi, Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp.757-764, 2011.
DOI : 10.1109/TrustCom.2011.99

H. Kido, Y. Yanagisawa, and T. Satoh, An anonymous communication technique using dummies for location-based services, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005., pp.88-97, 2005.
DOI : 10.1109/PERSER.2005.1506394

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.2045

S. Kiyomoto, Y. Miyake, and T. Tanaka, On designing privacyaware data upload mechanism -towards information-gathering system for disasters, Proc. of The 11th IEEE International Conference on Ubiquitous Computing and Communications, 2012.
DOI : 10.1109/trustcom.2012.214

H. Yao-nan-lien, T. Jang, and . Tsai, A manet based emergency communication and information system for catastrophic natural disasters, Distributed Computing Systems Workshops, 2009. ICDCS Workshops '09. 29th IEEE International Conference on, pp.412-417, 2009.

Y. Lu and G. Tsudik, Privacy-preserving cloud database querying, Journal of Internet Services and Information Security (JISIS), vol.1, issue.11, pp.5-25

S. Mascetti and C. Bettini, A Comparison of Spatial Generalization Algorithms for LBS Privacy Preservation, 2007 International Conference on Mobile Data Management, pp.258-262, 2007.
DOI : 10.1109/MDM.2007.54

A. Meissner, T. Luckenbach, T. Risse, T. Kirste, and H. Kirchner, Design challenges for an integrated disaster management communication and information system, Proc. of DIREN 2002, 2002.

S. Miner and J. Staddon, Graph-based authentication of digital streams, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.232-246, 2001.
DOI : 10.1109/SECPRI.2001.924301

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.28.7672

M. F. Mokbel, Towards Privacy-Aware Location-Based Database Servers, 22nd International Conference on Data Engineering Workshops (ICDEW'06), pp.93-102, 2006.
DOI : 10.1109/ICDEW.2006.152

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.99.1400

M. F. Mokbel, C. Y. Chow, and W. G. Aref, The new casper: Query processing for location services without compromising privacy, Proc. of the 32nd International Conference on Very Large Data Bases, pp.763-774, 2006.

M. Ohya, J. Asada, N. Harada, R. Matsubayashi, M. Hara et al., Disaster information-gathering system using cellular phone with a global positioning system, Proc. of The International Symposium on Management System for Disaster Prevention, 2006.

J. Park, E. K. Chong, and H. J. Siegel, Efficient multicast stream authentication using erasure codes, ACM Transactions on Information and System Security, vol.6, issue.2, pp.258-285, 2003.
DOI : 10.1145/762476.762480

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.604.6014

E. K. Jung-min-park, H. J. Chong, and . Siegel, Efficient multicast packet authentication using signature amortization, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.227-240, 2002.
DOI : 10.1109/SECPRI.2002.1004374

A. Perrig, R. Canetti, J. D. Tygar, and D. Song, Efficient authentication and signing of multicast streams over lossy channels, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp.56-73, 2000.
DOI : 10.1109/SECPRI.2000.848446

URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.66.4077&rep=rep1&type=pdf

R. W. Perry, Incident management systems in disaster management, Journal of Disaster Prevention and Management, pp.405-412, 2003.
DOI : 10.1111/j.1467-6486.1988.tb00043.x

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.551.1115

K. Popovic and Z. Hocenski, Cloud computing security issues and challenges, MIPRO, 2010 Proceedings of the 33rd International Convention, pp.344-349, 2010.

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, Proc. of EURO- CRYPT 2005, pp.457-473, 2005.
DOI : 10.1007/11426639_27

N. Santos and S. W. Smith, Limited delegation for client-side ssl, Proc. of the 6th Annual PKI R & D Workshop, pp.76-90, 2007.

M. P. Scipioni and M. Langheinrich, Towards a new privacy-aware location sharing platform, Journal of Internet Services and Information Security (JISIS), vol.1, issue.11, pp.47-59

M. Scott, On the Efficient Implementation of Pairing-Based Protocols, Cryptology ePrint Archive Report, vol.56, issue.1, 2011.
DOI : 10.1007/978-3-642-19379-8_4

S. Sengupta, V. Kaulgud, and V. S. Sharma, Cloud Computing Security--Trends and Research Directions, 2011 IEEE World Congress on Services, pp.524-531, 2011.
DOI : 10.1109/SERVICES.2011.20

I. Shklovski, L. Palen, and J. Sutton, Finding community through information and communication technology in disaster response, Proceedings of the ACM 2008 conference on Computer supported cooperative work, CSCW '08, pp.127-136, 2008.
DOI : 10.1145/1460563.1460584

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.580.3780

R. Wang, S. Chen, and X. Wang, Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services, 2012 IEEE Symposium on Security and Privacy, 2012.
DOI : 10.1109/SP.2012.30

B. Waters, Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, Public Key Cryptography -PKC 2011, pp.53-70, 2011.
DOI : 10.1007/978-3-642-19379-8_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.1719

G. Wickler, S. Potter, A. Tate, and J. Hansberger, The virtual collaboration environment: New media for crisis response, Proc. of 8th International Conference on Information Systems for Crisis Response and Management, 2011.

C. Kei, W. , and S. S. Lam, Digital signatures for flows and multicasts, IEEE/ACM Transactions on Networking, vol.7, issue.4, pp.502-513, 1999.

T. Wood, E. Cecchet, K. K. Ramakrishnan, and P. Shenoy, Jacobus van der Merwe, and Arun Venkataramani. Disaster recovery as a cloud service: economic benefits & deployment challenges, Proceedings of the 2nd USENIX conference on Hot topics in cloud computing, 2010.

C. Andrew and . Yao, Protocols for secure computations, 23rd Annual Symposium on Foundations of Computer Science, pp.160-164, 1982.

A. Yao, How to generate and exchange secrets, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), pp.162-167, 1986.
DOI : 10.1109/SFCS.1986.25

X. Yao, M. Turoff, and R. Hiltz, A field trial of a collaborative online scenario creation system for emergency management, Proc. of 7th International Conference on Information Systems for Crisis Response and Management, 2010.

. Qing-an, H. Zeng, V. Wei, and . Joshi, An efficient communication system for disaster detection and coordinated emergency evacuation, 2008 Wireless Telecomunications Symposium, pp.329-333, 2008.
DOI : 10.1109/WTS.2008.4547584