A. Bouna, B. Clifton, C. Malluhi, and Q. , Using safety constraint for transactional dataset anonymization, DBSec 2013, pp.164-178, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01490703

V. Ciriani, S. D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Combining fragmentation and encryption to protect privacy in data storage, ACM Transactions on Information and System Security, vol.13, issue.3
DOI : 10.1145/1805974.1805978

T. Li, N. Li, J. Zhang, and I. Molloy, Slicing: A New Approach for Privacy Preserving Data Publishing, IEEE Transactions on Knowledge and Data Engineering, vol.24, issue.3, pp.561-574, 2012.
DOI : 10.1109/TKDE.2010.236

A. E. Nergiz and C. Clifton, Query processing in private data outsourcing using anonymization, LNCS, vol.6818, pp.138-153, 2011.

A. E. Nergiz, C. Clifton, and Q. Malluhi, Updating outsourced anatomized private databases, Proceedings of the 16th International Conference on Extending Database Technology, EDBT '13, pp.179-190, 2013.
DOI : 10.1145/2452376.2452399

X. Xiao and Y. Tao, Anatomy: Simple and effective privacy preservation, Proceedings of 32nd International Conference on Very Large Data Bases, 2006.

A. Bkakria, F. Cuppens, and .. , Nora Cuppens-Boulahia, and David Gross-Amblard Optimizing Integrity Checks for Join Queries in the Cloud, p.33

S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, and .. , Stefano Paraboschi, and Pierangela Samarati Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials, p.49

D. Derler, C. Hanser, and D. , Slamanig Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds, p.66

T. Moataz, B. Justus, I. Ray, and .. , Frédéric Cuppens, and Indrajit Ray Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud, p.82

Y. Zhauniarovich, O. Gadyatskaya, B. Crispo, F. L. Spina, E. Moser-'who et al., Location Proof Assertion for Mobile Devices, p.146

R. Khan and S. Zawoad, Md Munirul Haque, and Ragib Hasan XVI Table of Contents Design Patterns for Multiple Stakeholders in Social Computing, p.163

P. Mehregan, P. W. , and .. , Fong Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure, p.179

Y. Hong, J. Vaidya, and .. , Haibing Lu, and Lingyu Wang ELITE: zEro Links Identity managemenT systEm

T. Moataz, N. Cuppens-boulahia, and .. , Frédéric Cuppens, Indrajit Ray, and Indrakshi Ray Dynamic Workflow Adjustment with Security Constraints, p.211

H. Lu, Y. Hong, Y. Yang, and .. , Yi Fang, and Lian Duan Consistent Query Plan Generation in Secure Cooperative Data Access, p.227

M. Le and K. Kant, and Sushil Jajodia Hunting the Unknown: White-Box Database Leakage Detection, p.243

E. Costante, J. Den-hartog, M. Petkovi´cpetkovi´c, and .. , Sandro Etalle, and Mykola Pechenizkiy Incremental Analysis of Evolving Administrative Role Based Access Control Policies, 260 Silvio Ranise and Anh Truong Mining Attribute-Based Access Control Policies from Logs . . . . . . . . . . . . 276

Y. Cheng, J. Park, R. Sandhu-randomly-partitioned-encryption-for-cloud-databases, and .. , 307 Tahmineh Sanamrad, Lucas Braun, Donald Kossmann, and Ramarathnam Venkatesan Towards Secure Cloud Database with Fine-Grained Access Control, p.324

G. Michael and . Solomon, Vaidy Sunderam, and Li Xiong Practical Private Information Retrieval from a Time-Varying