J. Celko, Joe Celko´sCelko´s Trees and Hierarchies in SQL for Smarties, 2004.

F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach et al., Bigtable, ACM Transactions on Computer Systems, vol.26, issue.2, pp.1-4, 2008.
DOI : 10.1145/1365815.1365816

P. Devanbu, M. Gertz, C. Martel, and S. G. Stubblebine, Authentic data publication over the Internet1, Journal of Computer Security, vol.11, issue.3, pp.291-314, 2003.
DOI : 10.3233/JCS-2003-11302

P. T. Devanbu, M. Gertz, C. U. Martel, and S. G. Stubblebine, Authentic Third-Party Data Publication, Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions, pp.101-112, 2001.
DOI : 10.1007/0-306-47008-X_9

URL : http://castle.cs.ucdavis.edu/~devanbu/files/dbsec.pdf

G. , D. Battista, and B. Palazzi, Authenticated relational tables and authenticated skip lists, Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security, pp.31-46, 2007.

M. T. Goodrich, R. Tamassia, T. R. , J. Hopkins, . Security et al., Efficient authenticated dictionaries with skip lists and commutative hashing, 2001.
DOI : 10.1109/discex.2001.932160

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.2282

M. T. Goodrich, R. Tamassia, and N. Triandopoulos, Super-Efficient Verification of Dynamic Outsourced Databases, Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology, CT-RSA'08, pp.407-424, 2008.
DOI : 10.1007/978-3-540-79263-5_26

F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, Dynamic authenticated index structures for outsourced databases, Proceedings of the 2006 ACM SIGMOD international conference on Management of data , SIGMOD '06, pp.121-132, 2006.
DOI : 10.1145/1142473.1142488

S. Micali, Efficient certificate revocation, 1996.

G. Miklau and D. Suciu, Implementing a Tamper-Evident Database System, Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web, ASIAN'05, pp.28-48, 2005.
DOI : 10.1007/11596370_5

K. Mouratidis, D. Sacharidis, and H. Pang, Partially materialized digest scheme: an efficient verification method for outsourced databases, The VLDB Journal, vol.21, issue.2, pp.363-381, 2009.
DOI : 10.1007/s00778-008-0108-z

E. Mykletun, M. Narasimha, and G. Tsudik, Authentication and integrity in outsourced databases, ACM Transactions on Storage, vol.2, issue.2, pp.107-138, 2006.
DOI : 10.1145/1149976.1149977

M. Narasimha and G. Tsudik, Authentication of Outsourced Databases Using Signature Aggregation and Chaining, International Conference on Database Systems for Advanced Applications (DASFAA, pp.420-436, 2006.
DOI : 10.1007/11733836_30

B. Palazzi, M. Pizzonia, and S. Pucacco, Query Racing: Fast Completeness Certification of Query Results, Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy, DBSec'10, pp.177-192, 2010.
DOI : 10.1007/978-3-642-13739-6_12

URL : https://hal.archives-ouvertes.fr/hal-01056689

H. Pang, A. Jain, K. Ramamritham, and K. Tan, Verifying completeness of relational query results in data publishing, Proceedings of the 2005 ACM SIGMOD international conference on Management of data , SIGMOD '05, pp.407-418, 2005.
DOI : 10.1145/1066157.1066204

H. Pang and K. Tan, Authenticating query results in edge computing, Proceedings. 20th International Conference on Data Engineering, p.560, 2004.
DOI : 10.1109/ICDE.2004.1320027

H. Pang, J. Zhang, and K. Mouratidis, Scalable verification for outsourced dynamic databases, Proc. VLDB Endow, pp.802-813, 2009.
DOI : 10.14778/1687627.1687718

L. Pizzette and T. Cabot, Database as a service: A marketplace assessment, 2012.

R. Sion, Query execution assurance for outsourced databases, Proceedings of the 31st international conference on Very large data bases, VLDB '05, pp.601-612, 2005.

V. Tropashko, Nested intervals tree encoding in SQL, ACM SIGMOD Record, vol.34, issue.2, pp.47-52, 2005.
DOI : 10.1145/1083784.1083793

W. Wei and T. Yu, Practical Integrity Assurance for Big Data Processing Deployed over Open Cloud, 2013.

W. Wei, T. Yu, and R. Xue, iBigTable, Proceedings of the third ACM conference on Data and application security and privacy, CODASPY '13, 2013.
DOI : 10.1145/2435349.2435399

M. Xie, H. Wang, J. Yin, and X. Meng, Integrity auditing of outsourced data, Proceedings of the 33rd international conference on Very large data bases, VLDB '07, pp.782-793, 2007.

M. Xie, H. Wang, J. Yin, and X. Meng, Providing freshness guarantees for outsourced databases, Proceedings of the 11th international conference on Extending database technology Advances in database technology, EDBT '08, pp.323-332, 2008.
DOI : 10.1145/1353343.1353384