Anderson, J. (1972). Computer security technology plan-
ning study. volume 2. Technical report, DTIC Docu-
ment.
Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R.,
Konwinski, A., Lee, G., Patterson, D., Rabkin, A.,
Stoica, I., et al. (2009). Above the clouds: A berkeley
view of cloud computing. EECS Department, Univer-
sity of California, Berkeley, Tech. Rep. UCB/EECS-
2009-28.
Bessani, A., Correia, M., Quaresma, B., Andr´e, F., and
Sousa, P. (2011). Depsky: Dependable and secure
storage in a cloud-of-clouds. In Proceedings of the
sixth conference on Computer systems, pages 31–46.
ACM.
Bethencourt, J., Sahai, A., and Waters, B. (2007).
Ciphertext-policy attribute-based encryption. In Secu-
rity and Privacy, 2007. SP’07. IEEE Symposium on,
pages 321–334. IEEE.
Bowers, K., Juels, A., and Oprea, A. (2009). HAIL: A
high-availability and integrity layer for cloud storage.
In Proceedings of the 16th ACM conference on Com-
puter and communications security, pages 187–198.
ACM.
Diffie, W. and Hellman, M. (1976). New directions in cryp-
tography. Information Theory, IEEE Transactions on,
22(6):644–654.
Fabre, J., Deswarte, Y., and Randell, B. (1994). Designing
secure and reliable applications using fragmentation-
redundancy-scattering: an object-oriented approach.
Dependable Computing—EDCC-1, pages 21–38.
Gantz, J. and Reinsel, D. (2011). Extracting value
from chaos. IDC research report IDC research re-
port, Framingham, MA, June. Retrieved September,
19:2011.
Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., and Jonker,
W. (2009). Mediated Ciphertext-Policy Attribute-
Based Encryption and Its Application. Information
Security Applications, pages 309–323.
Kamara, S. and Lauter, K. (2010). Cryptographic cloud
storage. Financial Cryptography and Data Security,
pages 136–149.
Kamara, S., Papamanthou, C., and Roeder, T. (2011).
Cs2: A semantic cryptographic cloud storage sys-
tem. Technical report, Technical Report MSR-TR-
2011-58, Microsoft Research, 2011. http://research.
microsoft. com/apps/pubs.
Katt, B., Breu, R., Hafner, M., Schabetsberger, T., Mair,
R., and Wozak, F. (2009). Privacy and access control
for ihe-based systems. Electronic Healthcare, pages
145–153.
Kohl, J. and Neuman, C. (1993). The kerberos network
authentication service (v5).
Krawczyk, H., Bellare, M., and Canetti, R. (1997). HMAC:
Keyed-Hashing for Message Authentication. RFC
2104 (Informational). Updated by RFC 6151.
Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S.,
Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weath-
erspoon, H., Wells, C., et al. (2000). Oceanstore: An
architecture for global-scale persistent storage. ACM
SIGARCH Computer Architecture News, 28(5):190–
201.
Laprie, J. (1985). Dependable computing and fault-
tolerance. Digest of Papers FTCS-15, pages 2–11.
McLean, J., Schell, R., and Brinkley, D. (1994). Security
models. Encyclopedia of Software Engineering.
Neuhaus, C., Wierschke, R., von L¨owis, M., and Polze, A.
(2011). Secure cloud-based medical data exchange.
Lecture Notes in Informatics (LNI) - Proceedings, P-
192.
Rabin, M. (1989). Efficient dispersal of information for se-
curity, load balancing, and fault tolerance. Journal of
the ACM (JACM), 36(2):335–348.
Rivest, R., Shamir, A., and Adleman, L. (1978). A method
for obtaining digital signatures and public-key cryp-
tosystems. Communications of the ACM, 21(2):120–
126.
Sahai, A. and Waters, B. (2005). Fuzzy identity-based
encryption. Advances in Cryptology–EUROCRYPT
2005, pages 457–473.
Schnjakin, M., Alnemr, R., and Meinel, C. (2011). A se-
curity and high-availability layer for cloud storage.
In Web Information Systems Engineering–WISE 2010
Workshops, pages 449–462. Springer.
Shamir, A. (1979). How to share a secret. Communications
of the ACM, 22(11):612–613.
Tang, Y., Lee, P., Lui, J., and Perlman, R. (2010). Fade:
Secure overlay cloud storage with file assured dele-
tion. Security and Privacy in Communication Net-
works, pages 380–397.
Zych, A., Petkovic, M., and Jonker, W. (2006). Key man-
agement method for cryptographically enforced ac-
cess control. In Proc. of the 1st Benelux Workshop
on Information and System Security, Antwerpen, Bel-
gium.
ADEPENDABLEANDSECUREAUTHORISATIONSERVICEINTHECLOUD
573