6Popa R A, Redfield C, Zeldovich N, et al. Cryptdb: Protecting confidentiality with encrypted query processing [C]// Proceedings of the 23rd ACM Symposium on Operating Systems Principles. New York, NY: ACM Press, 2011:85 - 100.
7Puttaswamy K P N, Kruegel C, Zhao B Y. Silverline: Toward data confidentiality in storage-intensive cloud applications [C]// Proceedings of the 2nd ACM Symposium on Cloud Computing. New York, NY: ACM Press, 2011 : 10.
8Parno B, McCune J M, Wendlandt D, et al. CLAMP: Practical prevention of large-scale data leaks [C]// Security and Privacy, 2009 30th IEEE Symposium on. Piscataway, NJ: IEEE Press, 2009:154 - 169.
9Felt A P, Finifter M, Weinberger J, et al. Diesel: Applying privilege separation to database access [C]// Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. New York: ACM Press, 2011: 416 - 422.
10Lampson B, Abadi M, Burrows M, et al. Authentication in distributed systems: Theory and practice [J]. ACM Transactions on Computer Systems (TOCS), 1992, 10(4) : 265 -310.