S. Kmara, K. Lauter, and C. Storage?, Proceedings of Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization, pp.111-116, 2010.

D. Challener and K. Yoder, A Practical Guide To Trusted Computing, pp.17-18, 2009.

B. Balacheff and L. Chen, Trusted Computing Platforms, pp.166-167, 2009.

C. Wang, Q. Wang, K. Ren, and W. Lou, Ensuring data storage security in Cloud Computing, 2009 17th International Workshop on Quality of Service, 2009.
DOI : 10.1109/IWQoS.2009.5201385

G. Ateniese, D. Pietro, R. Mancini, L. V. Tsudik, and G. , Scalable and efficient provable data possession, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, 2008.
DOI : 10.1145/1460877.1460889

W. Stallings, Cyptography and Network Security Principles and Practices, Fourth Edition, pp.59-60, 2006.

M. Christodorescu, R. Sailer, D. L. Schales, D. Sgandurra, and D. Zamboni, Cloud security is not (just) virtualization security, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, 2009.
DOI : 10.1145/1655008.1655022

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.625.8837

J. Dean and S. Ghemawat, Mapreduce: Simplied data processing on large clusters, Proc. OSDI, 2004.

A. Haeberlen, P. Kuznetsov, and P. Druschel, PeerReview:Practical Accountability for Distributed Systems, Proc. SOSP, 2007.

M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, On Technical Security Issues in Cloud Computing, 2009 IEEE International Conference on Cloud Computing, 2009.
DOI : 10.1109/CLOUD.2009.60