1.A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification.
2.A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing.
3.A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing.
4.A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users.
5.A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage.
6.A robust reputation management mechanism in the federated cloud.
7.Achieving Efficient and Secure Data Acquisition for Cloud- supported Internet of Things in Smart Grid.
8.Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data.
9.Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems.
10.Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing.
11.Efficient and Expressive Keyword Search Over Encrypted Data in Cloud.
12.Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds.
13.Identity-Based Encryption with Cloud Revocation Authority and Its Applications.
14.Identity-Based Private Matching over Outsourced Encrypted Datasets.
15.Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage.
16.On the Security of Data Access Control for Multi-authority Cloud Storage Systems.
17.Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing.
18.Privacy Protection based Access Control Scheme in Cloud-based Services.
19.Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data.
20.Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud.
21.RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage.
22.Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption.
23.Securing Cloud Data under Key Exposure.
24.TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud.
25.TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud.
26.Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving.
27.An Iterative Classification Scheme for Sanitizing Large-Scale Datasets.
28.Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach.
29.Collaborative Filtering-Based Recommendation of Online Social Voting
30.Computing Semantic Similarity of Concepts in Knowledge Graphs.
31.Detecting Stress Based on Social Interactions in Social Networks.
32.Dynamic Facet Ordering for Faceted Product Search Engines.