Two can keep A secret: A distributed architecture for secure database services, CIDR, 2005. ,
Encryption and fragmentation for data confidentiality in the cloud, FOSAD, 2013. ,
Sticky Policies: An Approach for Managing Privacy across Multiple Parties, Computer, vol.44, issue.9, 2011. ,
DOI : 10.1109/MC.2011.225
A softwarehardware architecture for self-protecting data, CCS, 2012. ,
Information accountability, Communications of the ACM, vol.51, issue.6, 2008. ,
DOI : 10.1145/1349026.1349043
Data privacy and security: encryption and information hiding, 2003. ,
DOI : 10.1007/978-0-387-21707-9
Distance makes the types grow stronger: a calculus for differential privacy, ICFP, 2010. ,
ZQL: A compiler for privacypreserving data processing, USENIX Security, 2013. ,
Applied cryptography -protocols, algorithms, and source code in C (2, 1996. ,
Can homomorphic encryption be practical?, Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, 2011. ,
DOI : 10.1145/2046660.2046682
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.225.8007
Can Programming Be Liberated From the von Neumann Style? A Functional Style and its Algebra of Programs, Commun. ACM, vol.21, issue.8, 1978. ,
Functional Programming in Scala, 2014. ,
Comprehending monads, Proceedings of the 1990 ACM conference on LISP and functional programming , LFP '90, 1992. ,
DOI : 10.1145/91556.91592
Type classes as objects and implicits, OOPSLA, 2010. ,
DOI : 10.1145/1869459.1869489
URL : http://infoscience.epfl.ch/record/150280
MrCrypt: static analysis for secure cloud computations, OOPSLA, 2013. ,
Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data, Privacy Enhancing Technologies, 2002. ,
DOI : 10.1007/3-540-36467-6_6
A Systematic Survey of Self-Protecting Software Systems, ACM Transactions on Autonomous and Adaptive Systems, vol.8, issue.4, 2014. ,
DOI : 10.1145/2555611
Using selfdefending objects to develop security aware applications in java, ACSC, 2004. ,