E. Damiani, S. De-capitani-di-vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, Balancing confidentiality and efficiency in untrusted relational DBMSs, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, 2003.
DOI : 10.1145/948109.948124

A. Ceselli, E. Damiani, S. De-capitani-di-vimercati, S. Jajodia, S. Paraboschi et al., Modeling and assessing inference exposure in encrypted databases, ACM Transactions on Information and System Security, vol.8, issue.1, pp.119-152, 2005.
DOI : 10.1145/1053283.1053289

H. Hacigümü¸hacigümü¸s, B. Iyer, S. Mehrotra, and C. Li, Executing SQL over encrypted data in the database-service-provider model, Proc. of the ACM SIGMOD International Conference on Management of Data, 2002.

H. Hacigümü¸hacigümü¸s, B. Iyer, and S. Mehrotra, Providing database as a service, Proc. of 18th International Conference on Data Engineering, 2002.

D. Capitani, D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Over-encryption: Management of access control evolution on outsourced data, Proc. of the 33rd International Conference on Very Large Data Bases, 2007.

D. Capitani, D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Encryption policies for regulating access to outsourced data, ACM Transactions on Database Systems, 2010.

G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-molina, K. Kenthapadi et al., Two can keep a secret: a distributed architecture for secure database services, Proc. of the Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), 2005.

V. Ciriani, S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Fragmentation and Encryption to Enforce Privacy in Data Storage, Proc. of the 12th European Symposium On Research In Computer Security, 2007.
DOI : 10.1007/978-3-540-74835-9_12

V. Ciriani, S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Keep a Few: Outsourcing Data While Maintaining Confidentiality, Proc. of the 14th European Symposium On Research In Computer Security, 2009.
DOI : 10.1145/1994.2209

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.148.4033

P. Samarati, Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001.
DOI : 10.1109/69.971193

P. Samarati and S. De-capitani-di-vimercati, Data protection in outsourcing scenarios, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010.
DOI : 10.1145/1755688.1755690

M. Garey and D. Johnson, Computers and Intractability; a Guide to the Theory of NP-Completeness, 1979.

V. Ciriani, S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Combining fragmentation and encryption to protect privacy in data storage, ACM Transactions on Information and System Security, vol.13, issue.3, 2010.
DOI : 10.1145/1805974.1805978

V. Ciriani, S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases, 2009 29th IEEE International Conference on Distributed Computing Systems, 2009.
DOI : 10.1109/ICDCS.2009.52

B. Schneier, Applied Cryptography, 1996.

V. Ciriani, S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients, Proc. of the 23rd IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, 2009.
DOI : 10.1145/371578.371598