G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-molina, K. Kenthapadi et al., Two can keep a secret: A distributed architecture for secure database services, Proc. of CIDR, 2005.

M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz et al., Above the clouds: A Berkeley view of cloud computing, 2009.

. Preiss, Concepts and languages for privacy-preserving attribute-based authentication, Policies and Research in Identity Management IFIP Advances in Information and Communication Technology, pp.34-52, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01470502

A. Ceselli, E. Damiani, S. De-capitani-di-vimercati, S. Jajodia, S. Paraboschi et al., Modeling and assessing inference exposure in encrypted databases, ACM Transactions on Information and System Security, vol.8, issue.1, 2005.
DOI : 10.1145/1053283.1053289

V. Ciriani, S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Combining fragmentation and encryption to protect privacy in data storage, ACM Transactions on Information and System Security, vol.13, issue.3, 2010.
DOI : 10.1145/1805974.1805978

R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, Searchable symmetric encryption, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006.
DOI : 10.1145/1180405.1180417

E. Damiani, S. De-capitani-di-vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, Balancing confidentiality and efficiency in untrusted relational DBMSs, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, 2003.
DOI : 10.1145/948109.948124

S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, On information leakage by indexes over data fragments, 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW), 2013.
DOI : 10.1109/ICDEW.2013.6547434

S. Foresti, Preserving Privacy in Data Outsourcing, 2011.
DOI : 10.1007/978-1-4419-7659-8

H. Hac?gümü¸hac?gümü¸s, B. Iyer, C. Li, and S. Mehrotra, Executing SQL over Encrypted Data in the Database-Service-Provider Model, Proc. of SIGMOD, 2002.

H. Hac?gümü¸hac?gümü¸s, B. Iyer, and S. Mehrotra, Efficient execution of aggregation queries over encrypted relational databases, Database systems for Advanced Applications, pp.633-650, 2004.

J. Harauz, L. M. Kaufman, and B. Potter, Data Security in the World of Cloud Computing, 2009.

M. Jaatun, K. Bernsmed, and A. Undheim, Security SLAs ??? An Idea Whose Time Has Come?, Lecture Notes in Computer Science, vol.7465, pp.123-130, 2012.
DOI : 10.1007/978-3-642-32498-7_10

K. Jünemann, J. Köhler, and H. Hartenstein, Data Outsourcing Simplified: Generating Data Connectors from Confidentiality and Access Policies, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012), 2012.
DOI : 10.1109/CCGrid.2012.117

E. Mykletun and G. Tsudik, Aggregation queries in the database-as-a-service model. Data and Applications Security XX, pp.89-103, 2006.

S. Pearson, Toward Accountability in the Cloud, IEEE Internet Computing, vol.15, issue.4, pp.64-69, 2011.
DOI : 10.1109/MIC.2011.98

R. A. Popa, C. Redfield, N. Zeldovich, and H. Balakrishnan, CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.85-100, 2011.
DOI : 10.1145/2043556.2043566

D. X. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, Proc. of the IEEE Symposium on Security and Privacy (S&P), 2000.

L. Xiong, S. Goryczka, and V. Sunderam, Adaptive, secure, and scalable distributed data outsourcing, Proceedings of the 2011 workshop on Dynamic distributed data-intensive applications, programming abstractions, and systems, 3DAPAS '11, 2011.
DOI : 10.1145/1996010.1996012