R. Agrawal, J. Kierman, R. Srikant, and Y. Xu, Order preserving encryption for numeric data, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, 2004.
DOI : 10.1145/1007568.1007632

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

M. Atallah, K. Frikken, and M. Blanton, Dynamic and efficient key management for access hierarchies, Proc. of CCS 2005, 2005.
DOI : 10.1145/1455526.1455531

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

M. Bellare, R. Canetti, and H. Krawczyk, Keying Hash Functions for Message Authentication, Proc. of CRYPTO, 1996.
DOI : 10.1007/3-540-68697-5_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti, Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System, 2008 Annual Computer Security Applications Conference (ACSAC), 2008.
DOI : 10.1109/ACSAC.2008.13

E. Damiani, S. De-capitani-di-vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, Balancing confidentiality and efficiency in untrusted relational DBMSs, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, 2003.
DOI : 10.1145/948109.948124

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. Samarati, Fine grained access control for SOAP E-services, Proceedings of the tenth international conference on World Wide Web , WWW '01, 2001.
DOI : 10.1145/371920.372152

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

D. Capitani, D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., A data outsourcing architecture combining cryptography and access control, Proc. of CSAW, 2007.

D. Capitani, D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Encryption policies for regulating access to outsourced data, ACM TODS, vol.35, issue.12, pp.1-1246, 2010.

M. Gamassi, V. Piuri, D. Sana, and F. Scotti, Robust fingerprint detection for access control, Proc. of RoboCare, 2005.

H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li, Executing SQL over encrypted data in the database-service-provider model, Proc. of the SIGMOD 2002, 2002.

R. Merkle, A Certified Digital Signature, Proc. of CRYPTO, 1989.
DOI : 10.1007/0-387-34805-0_21

G. Miklau and D. Suciu, Controlling Access to Published Data Using Cryptography, Proc. of VLDB 2003, 2003.
DOI : 10.1016/B978-012722442-8/50084-7

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

E. Mykletun, M. Narasimha, and G. Tsudik, Authentication and integrity in outsourced databases, ACM Transactions on Storage, vol.2, issue.2, pp.107-138, 2006.
DOI : 10.1145/1149976.1149977

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

H. Pang, A. Jain, K. Ramamritham, and K. Tan, Verifying completeness of relational query results in data publishing, Proceedings of the 2005 ACM SIGMOD international conference on Management of data , SIGMOD '05, 2005.
DOI : 10.1145/1066157.1066204

M. Raykova, H. Zhao, and S. Bellovin, Privacy Enhanced Access Control for Outsourced Data Sharing, Proc. of FC 2012. Bonaire, 2012.
DOI : 10.1007/978-3-642-32946-3_17

URL : http://academiccommons.columbia.edu/download/fedora_content/download/ac:138935/CONTENT/cucs-039-11.pdf

P. Samarati and S. De-capitani-di-vimercati, Data protection in outsourcing scenarios, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010.
DOI : 10.1145/1755688.1755690

H. Wang and L. V. Lakshmanan, Efficient secure query evaluation over encrypted XML databases, Proc. of VLDB, 2006.

M. Xie, H. Wang, J. Yin, and X. Meng, Integrity auditing of outsourced data, Proc. of VLDB, 2007.

S. Yu, C. Wang, K. Ren, and W. Lou, Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, 2010 Proceedings IEEE INFOCOM, 2010.
DOI : 10.1109/INFCOM.2010.5462174

F. Zhao, T. Nishide, and K. Sakurai, Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems, Proc. of ISPEC 2011, 2011.
DOI : 10.1007/978-3-642-21031-0_7