Balancing confidentiality and efficiency in untrusted relational DBMSs, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, 2003. ,
DOI : 10.1145/948109.948124
Modeling and assessing inference exposure in encrypted databases, ACM Transactions on Information and System Security, vol.8, issue.1, pp.119-152, 2005. ,
DOI : 10.1145/1053283.1053289
Executing SQL over encrypted data in the database-service-provider model, Proc. of the ACM SIGMOD International Conference on Management of Data, 2002. ,
Providing database as a service, Proc. of 18th International Conference on Data Engineering, 2002. ,
Over-encryption: Management of access control evolution on outsourced data, Proc. of the 33rd International Conference on Very Large Data Bases, 2007. ,
Encryption policies for regulating access to outsourced data, ACM Transactions on Database Systems, 2010. ,
Two can keep a secret: a distributed architecture for secure database services, Proc. of the Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), 2005. ,
Fragmentation and Encryption to Enforce Privacy in Data Storage, Proc. of the 12th European Symposium On Research In Computer Security, 2007. ,
DOI : 10.1007/978-3-540-74835-9_12
Keep a Few: Outsourcing Data While Maintaining Confidentiality, Proc. of the 14th European Symposium On Research In Computer Security, 2009. ,
DOI : 10.1145/1994.2209
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.148.4033
Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001. ,
DOI : 10.1109/69.971193
Data protection in outsourcing scenarios, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010. ,
DOI : 10.1145/1755688.1755690
Computers and Intractability; a Guide to the Theory of NP-Completeness, 1979. ,
Combining fragmentation and encryption to protect privacy in data storage, ACM Transactions on Information and System Security, vol.13, issue.3, 2010. ,
DOI : 10.1145/1805974.1805978
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases, 2009 29th IEEE International Conference on Distributed Computing Systems, 2009. ,
DOI : 10.1109/ICDCS.2009.52
Applied Cryptography, 1996. ,
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients, Proc. of the 23rd IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, 2009. ,
DOI : 10.1145/371578.371598