W. Bender, D. Gruhl, N. Morimoto, and A. Liu, Techniques for data hiding, IBM Systems Journal, vol.35, issue.3.4, pp.313-336, 1996.
DOI : 10.1147/sj.353.0313

P. Fruhwirt, M. Huber, M. Mulazzani, and E. Weippl, InnoDB Database Forensics, 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp.1028-1036, 2010.
DOI : 10.1109/AINA.2010.152

P. Fruhwirt, P. Kieseberg, K. Krombholz, and E. Weippl, Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations, Digital Investigation, pp.336-348, 2014.
DOI : 10.1016/j.diin.2014.09.003

P. Fruhwirt, P. Kieseberg, S. Schrittwieser, M. Huber, and E. Weippl, InnoDB Database Forensics: Reconstructing Data Manipulation Queries from Redo Logs, 2012 Seventh International Conference on Availability, Reliability and Security, pp.625-633, 2012.
DOI : 10.1109/ARES.2012.50

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.372.8132

P. Fruhwirt, P. Kieseberg, S. Schrittwieser, M. Huber, and E. Weippl, InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs, Information Security Technical Report, vol.17, issue.4, pp.227-238, 2013.
DOI : 10.1016/j.istr.2013.02.003

A. Grebhahn, M. Schaler, and V. Koppen, Secure deletion: Towards tailor-made privacy in database systems, Proceedings of the Fifteenth Conference on Database Systems for Business, Technology and Web, pp.99-113, 2013.

P. Kieseberg, S. Schrittwieser, L. Morgan, M. Mulazzani, M. Huber et al., ???trees for enhancing logging mechanisms of databases, International Journal of Web Information Systems, vol.9, issue.1, pp.53-68, 2013.
DOI : 10.1108/17440081311316389

P. Kieseberg, S. Schrittwieser, M. Mulazzani, M. Huber, and E. Weippl, Trees Cannot Lie: Using Data Structures for Forensics Purposes, 2011 European Intelligence and Security Informatics Conference, pp.282-285, 2011.
DOI : 10.1109/EISIC.2011.18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.372.6220

P. Koruga and M. Baca, Analysis of B-tree data structure and its usage in computer forensics, Proceedings of the Central European Conference on Information and Intelligent Systems, 2010.

T. Lahdenmaki and M. Leach, Relational Database Index Design and the Optimizers, 2005.
DOI : 10.1002/0471721379

H. Lu, Y. Ng, and Z. Tian, T-tree or B-tree: Main memory database index structure revisited, Proceedings of the Eleventh Australasian Database Conference, pp.65-73, 2000.

G. Miklau, B. Levine, and P. Stahlberg, Securing history: Privacy and accountability in database systems, Proceedings of the Third Biennial Conference on Innovative Data Systems Research, pp.387-396, 2007.

P. Stahlberg, G. Miklau, and B. Levine, Threats to privacy in the forensic analysis of database systems, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, pp.91-102, 2007.
DOI : 10.1145/1247480.1247492

H. Pieterse and M. Olivier, Data hiding techniques for database environments, in Advances in Digital Forensics VIII, pp.289-301, 2012.