I. Anati, S. Gueron, S. Johnson, and V. Scarlata, Innovative Technology for CPU Based Attestation and Sealing, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 2013.

S. Arnautov, B. Trach, F. Gregor, and T. Knauth, SCONE: Secure linux containers with Intel SGX, 12th USENIX Symposium on Operating Systems Design and Implementation, 2016.

A. Baumann, M. Peinado, and G. Hunt, Shielding Applications from an Untrusted Cloud with Haven, Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, 2014.
DOI : 10.1145/1519065.1519076

S. Brenner, C. Wulf, and R. Kapitza, Running ZooKeeper Coordination Services in Untrusted Clouds, 10th Workshop on Hot Topics in System Dependability, 2014.

S. Brenner, C. Wulf, M. Lorenz, N. Weichbrodt, D. Goltzsche et al., SecureKeeper, Proceedings of the 17th International Middleware Conference on, Middleware '16, 2016.
DOI : 10.1145/2541940.2541949

G. Cerullo, G. Mazzeo, G. Papale, L. Sgaglione, and R. Cristaldi, A secure cloudbased SCADA application: The use case of a water supply network, New Trends in Software Methodologies, Tools and Techniques -Proceedings of the Fifteenth SoMeT, pp.12-14, 2016.

P. Hunt, M. Konar, F. Junqueira, and B. Reed, ZooKeeper: Wait-Free Coordination for Internet-Scale Systems, Proceedings of the 2010 USENIX conference on USENIX annual technical conference, 2010.

K. R. Jayaram, D. Safford, U. Sharma, V. Naik, D. Pendarakis et al., Trustworthy geographically fenced hybrid clouds, Proceedings of the 15th International Middleware Conference on, Middleware '14, 2014.
DOI : 10.1007/978-1-4302-6146-9

F. Mckeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi et al., Innovative instructions and software model for isolated execution, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP '13, 2013.
DOI : 10.1145/2487726.2488368

S. Pearson and A. Benameur, Privacy, Security and Trust Issues Arising from Cloud Computing, 2010 IEEE Second International Conference on Cloud Computing Technology and Science, 2010.
DOI : 10.1109/CloudCom.2010.66

R. Pires, M. Pasin, P. Felber, and C. Fetzer, Secure Content-Based Routing Using Intel Software Guard Extensions, Proceedings of the 17th International Middleware Conference on, Middleware '16, 2016.
DOI : 10.1109/SFCS.1986.25

URL : http://arxiv.org/pdf/1701.04612

I. Synopsys, Open Source Report, 2014.