J Li, X Chen, J Li, C Jia, J Ma, W Lou - Computer Security–ESORICS 2013 - Springer
As cloud computing becomes prevalent, more and more sensitive data is being centralized
into the cloud for sharing, which brings forth new challenges for outsourced data security …