[1] Acar A.,Aksu H.,Uluagac A. S.,Conti M. .2018 .A Survey on Homomorphic Encryption Schemes: Theory and Implementation. , 51(4) : 1-35.
[2] Accenture. .2018 .Blockchain-based key management: A pilot study in financial services. Accenture Research., : .
[3] Accenture. .2018 .Side-channel attacks in cloud environments: Detection and mitigation strategies. , : .
[4] Amazon Web Services. .2018 .AWS Key Management Service: Best practices. AWS Whitepaper., : .
[5] Amazon Web Services. .2018 .AWS Key Management Service: Best practices for disaster recovery. AWS Whitepaper., : .
[6] .2018 .CMEK and data privacy laws: A comparative analysis. UC, : .
[7] Chen Y.,Chen H.,Li X. .2018 .Performance analysis of customer-managed encryption keys in cloud environments. IEEE Transactions on Cloud Computing, 6(4) : 1125-1134.
[8] Chen Y.,Zhang Q.,Zheng Y. .2018 .Performance analysis of customer-managed encryption keys in cloud environments. IEEE Transactions on Cloud Computing, 6(4) : 1024-1035.
[9] Cisco. .2019 .IoT security challenges in edge computing environments. Cisco Security Research., : .
[10] Cloud Security Alliance. .2018 .Cloud Controls Matrix (CCM). , : .
[11] Cloud Security Alliance. .2019 .State of cloud security 2019. CSA Report., : .
[12] Cloud Security Alliance. .2019 .. CSA Research Report., : .
[13] Deloitte. .2019 .GDPR compliance in cloud environments: A comparative analysis. Deloitte Risk Advisory Services., : .
[14] Deloitte. .2019 .GDPR compliance in cloud environments: A comprehensive analysis. Deloitte Insights., : .