Two can keep a secret: A distributed architecture for secure database services, Proc. of CIDR, 2005. ,
Above the clouds: A Berkeley view of cloud computing, 2009. ,
Concepts and languages for privacy-preserving attribute-based authentication, Policies and Research in Identity Management IFIP Advances in Information and Communication Technology, pp.34-52, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01470502
Modeling and assessing inference exposure in encrypted databases, ACM Transactions on Information and System Security, vol.8, issue.1, 2005. ,
DOI : 10.1145/1053283.1053289
Combining fragmentation and encryption to protect privacy in data storage, ACM Transactions on Information and System Security, vol.13, issue.3, 2010. ,
DOI : 10.1145/1805974.1805978
Searchable symmetric encryption, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006. ,
DOI : 10.1145/1180405.1180417
Balancing confidentiality and efficiency in untrusted relational DBMSs, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, 2003. ,
DOI : 10.1145/948109.948124
On information leakage by indexes over data fragments, 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW), 2013. ,
DOI : 10.1109/ICDEW.2013.6547434
Preserving Privacy in Data Outsourcing, 2011. ,
DOI : 10.1007/978-1-4419-7659-8
Executing SQL over Encrypted Data in the Database-Service-Provider Model, Proc. of SIGMOD, 2002. ,
Efficient execution of aggregation queries over encrypted relational databases, Database systems for Advanced Applications, pp.633-650, 2004. ,
Data Security in the World of Cloud Computing, 2009. ,
Security SLAs ??? An Idea Whose Time Has Come?, Lecture Notes in Computer Science, vol.7465, pp.123-130, 2012. ,
DOI : 10.1007/978-3-642-32498-7_10
Data Outsourcing Simplified: Generating Data Connectors from Confidentiality and Access Policies, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012), 2012. ,
DOI : 10.1109/CCGrid.2012.117
Aggregation queries in the database-as-a-service model. Data and Applications Security XX, pp.89-103, 2006. ,
Toward Accountability in the Cloud, IEEE Internet Computing, vol.15, issue.4, pp.64-69, 2011. ,
DOI : 10.1109/MIC.2011.98
CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.85-100, 2011. ,
DOI : 10.1145/2043556.2043566
Practical techniques for searches on encrypted data, Proc. of the IEEE Symposium on Security and Privacy (S&P), 2000. ,
Adaptive, secure, and scalable distributed data outsourcing, Proceedings of the 2011 workshop on Dynamic distributed data-intensive applications, programming abstractions, and systems, 3DAPAS '11, 2011. ,
DOI : 10.1145/1996010.1996012