R. Elmasri and S. B. Navathe, Fundamentals of Database Systems, Fourth Edition, 2004.

H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra, Executing SQL over encrypted data in the database-service-provider model, SIGMOD, pp.216-227, 2002.

R. Sion, Towards Secure Data Outsourcing. Handbook of Database Security, pp.137-161, 2008.
DOI : 10.1007/978-0-387-48533-1_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.86.8594

R. Agrawal, J. Kierman, R. Srikant, and . Y. Xu, Order preserving encryption for numeric data, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, 2004.
DOI : 10.1145/1007568.1007632

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.8664

C. Boyens and O. Gunter, Using online services in untrusted environments ? a privacy-preserving architecture, Proc. of the 11th European Conference on Information Systems (ECIS '03), Italy, 2003.

F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin, Authenticated Index Structures for Aggregation queries in Outsourced Databases, 2006.

D. Capitani, D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Over-encryption: Management of Access Control Evolution on Outsourced Data, pp.123-134, 2007.

M. J. Atallah, K. B. Frikken, and M. Blanton, Dynamic and efficient key management for access hierarchies, Proc. of the ACM CCS, 2005.

T. B. Hue, G. N. Luyen, N. D. Kha, S. Wohlgemuth, I. Echizen et al., An Efficient Fine-grained Access Control mechanism for database outsourcing service, 2012 International Conference on Information Security and Intelligent Control, pp.67-71, 2012.
DOI : 10.1109/ISIC.2012.6449709