B
¨
osch, C., Hartel, P., Jonker, W., and Peter, A. (2014).
A survey of provably secure searchable encryption.
ACM Comput. Surv., 47(2):18:1–18:51.
Cleeff, A. v., Pieters, W., and Wieringa, R. (2010). Benefits
of location-based access control: A literature study. In
Proceedings of the 2010 IEEE/ACM Int’L Conference
on Green Computing and Communications & Int’L
Conference on Cyber, Physical and Social Computing,
GREENCOM-CPSCOM ’10, pages 739–746, Wash-
ington, DC, USA. IEEE Computer Society.
Costabello, L., Villata, S., and Gandon, F. (2012). Context-
aware access control for rdf graph stores. In Raedt,
L. D., Bessire, C., Dubois, D., Doherty, P., Frasconi,
P., Heintz, F., and Lucas, P. J. F., editors, ECAI, vol-
ume 242 of Frontiers in Artificial Intelligence and Ap-
plications, pages 282–287. IOS Press.
Covington, M. J., Long, W., Srinivasan, S., Dev, A. K.,
Ahamad, M., and Abowd, G. D. (2001). Securing
context-aware applications using environment roles.
In Proceedings of the Sixth ACM Symposium on Ac-
cess Control Models and Technologies, SACMAT ’01,
pages 10–20, New York, NY, USA. ACM.
Decker, M. (2011). Modelling of location-aware access
control rules. In Handbook of Research on Mobility
and Computing: Evolving Technologies and Ubiqui-
tous Impacts, pages 912–929. IGI Global.
Dey, A. K. (2001). Understanding and using context. Per-
sonal Ubiquitous Comput., 5(1):4–7.
Dolev, D. and Yao, A. C. (1983). On the security of pub-
lic key protocols. Information Theory, IEEE Transac-
tions, 29(2):198–208.
Ferrari, E. (2010). Access Control in Data Management
Systems. Morgan and Claypool Publishers.
Gabel, M. and H
¨
ubsch, G. (2014). Secure database out-
sourcing to the cloud using the mimosecco middle-
ware. In Krcmar, H., Reussner, R., and Rumpe, B.,
editors, Trusted Cloud Computing, pages 187–202.
Springer International Publishing.
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., and
Boneh, D. (2003). Terra: A virtual machine-based
platform for trusted computing. In ACM SIGOPS Op-
erating Systems Review, volume 37, pages 193–206.
Gentry, C. (2009). A Fully Homomorphic Encryp-
tion Scheme. PhD thesis, Stanford, CA, USA.
AAI3382729.
Huber, M., Gabel, M., Schulze, M., and Bieber, A. (2013).
Cumulus4j: A provably secure database abstraction
layer. In Cuzzocrea, A., Kittl, C., Simos, D. E.,
Weippl, E., Xu, L., Cuzzocrea, A., Kittl, C., Simos,
D. E., Weippl, E., and Xu, L., editors, CD-ARES
Workshops, volume 8128 of Lecture Notes in Com-
puter Science, pages 180–193. Springer.
IBM (2011). Security and high availability in cloud comput-
ing environments. Technical report, IBM SmartCloud
Enterprise, East Lansing, Michigan.
Kamara, S. and Lauter, K. (2010). Cryptographic cloud
storage. In Sion, R., Curtmola, R., Dietrich, S., Ki-
ayias, A., Miret, J., Sako, K., and Seb, F., editors,
Financial Cryptography and Data Security, volume
6054 of Lecture Notes in Computer Science, pages
136–149. Springer Berlin Heidelberg.
Kayes, A. S. M., Han, J., and Colman, A. (2013).
An ontology-based approach to context-aware access
control for software services. In Lin, X., Manolopou-
los, Y., Srivastava, D., and Huang, G., editors, WISE
(1), volume 8180 of Lecture Notes in Computer Sci-
ence, pages 410–420. Springer.
Kourtesis, D. and Paraskakis, I. (2012). A registry and
repository system supporting cloud application plat-
form governance. In Proceedings of the 2011 In-
ternational Conference on Service-Oriented Comput-
ing, ICSOC’11, pages 255–256, Berlin, Heidelberg.
Springer-Verlag.
Krasner, G. E. and Pope, S. T. (1988). A cookbook for using
the model-view controller user interface paradigm in
smalltalk-80. J. Object Oriented Program., 1(3):26–
49.
Michalas, A. and Komninos, N. (2014). The lord of
the sense: A privacy preserving reputation system
for participatory sensing applications. In Computers
and Communication (ISCC), 2014 IEEE Symposium,
pages 1–6. IEEE.
Michalas, A., Komninos, N., Prasad, N. R., and Oleshchuk,
V. A. (2010). New client puzzle approach for dos re-
sistance in ad hoc networks. In Information Theory
and Information Security (ICITIS), 2010 IEEE Inter-
national Conference, pages 568–573. IEEE.
Michalas, A., Paladi, N., and Gehrmann, C. (2014). Secu-
rity aspects of e-health systems migration to the cloud.
In e-Health Networking, Applications and Services
(Healthcom), 2014 IEEE 16th International Confer-
ence on, pages 212–218. IEEE.
Micro, T. (2010). The need for cloud computing security.
In A Trend Micro White Paper.
Paladi, N. and Michalas, A. (2014). “One of our hosts in
another country”: Challenges of data geolocation in
cloud storage. In Wireless Communications, Vehicular
Technology, Information Theory and Aerospace Elec-
tronic Systems (VITAE), 2014 4th International Con-
ference on, pages 1–6.
Paladi, N., Michalas, A., and Gehrmann, C. (2014). Do-
main based storage protection with secure access con-
trol for the cloud. In Proceedings of the 2014 Inter-
national Workshop on Security in Cloud Computing,
ASIACCS ’14, New York, NY, USA. ACM.
Popa, R. A., Redfield, C. M. S., Zeldovich, N., and Balakr-
ishnan, H. (2011). Cryptdb: Protecting confidentiality
with encrypted query processing. In Proceedings of
the Twenty-Third ACM Symposium on Operating Sys-
tems Principles, SOSP ’11, pages 85–100, New York,
NY, USA. ACM.
Santos, N., Gummadi, K. P., and Rodrigues, R. (2009). To-
wards trusted cloud computing. In Proceedings of the
2009 Conference on Hot Topics in Cloud Computing,
HotCloud’09, Berkeley, CA, USA. USENIX.
Zhang, F., Chen, J., Chen, H., and Zang, B. (2011). Cloud-
visor: retrofitting protection of virtual machines in
multi-tenant cloud with nested virtualization. In Pro-
ceedings of the Twenty-Third ACM Symposium on Op-
erating Systems Principles, pages 203–216. ACM.
PaaSword:AHolisticDataPrivacyandSecuritybyDesignFrameworkforCloudServices
213