G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-molina, K. Kenthapadi et al., Two can keep a secret: A distributed architecture for secure database services, Proc. CIDR, 2005.

A. Cesell, E. Damiani, S. De-capitani-di-vimercati, S. Jajodia, S. Paraboschi et al., Modeling and assessing inference exposure in encrypted databases, ACM Transactions on Information and System Security, vol.8, issue.1, pp.119-152, 2005.
DOI : 10.1145/1053283.1053289

V. Ciriani, S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.32-39, 2009.
DOI : 10.1109/ICDCS.2009.52

V. Ciriani, S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Combining fragmentation and encryption to protect privacy in data storage, ACM TISSEC, 2010.
DOI : 10.1145/1805974.1805978

V. Ciriani, S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Keep a Few: Outsourcing Data While Maintaining Confidentiality, Lecture Notes in Computer Science, vol.9, issue.4, pp.440-455, 2009.
DOI : 10.1145/1994.2209

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

V. Ciriani, S. Capitani-di-vimercati, S. Foresti, S. Jajodial, S. Paraboschi et al., Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients, Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII, pp.225-239, 2009.
DOI : 10.1145/67544.66966

D. Capitani, D. Vimercati, and S. Foresti, Privacy of outsourced data, Privacy and Identity Management for Life IFIP Advances in Information and Communication Technology, pp.174-187, 2010.
URL : https://hal.archives-ouvertes.fr/hal-01061071

B. Iyer, H. Hacigümüshacigümüs¸hacigümüs¸and, and S. Mehrotra, Providing database as a service, Proc. of ICDE, 2002.

H. Hacigümüshacigümüs¸, B. Iyer, C. Li, and S. Mehrotra, Executing sql over encrypted data in the database-service-provider model, SIGMOD '02: Proceedings of the 2002 ACM SIGMOD international conference on Management of data, pp.216-227, 2002.

M. Kantarcioglu and C. Clifton, Security Issues in Querying Encrypted Data, 2004.
DOI : 10.1007/3-540-44853-5_35

P. Samarati, S. De-capitani, and D. Vimercati, Data protection in outsourcing scenarios, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.1-14, 2010.
DOI : 10.1145/1755688.1755690

R. Agrawaland and R. Srikant, Privacy-preserving data mining, ACM SIGMOD Record, vol.29, issue.2, pp.439-450, 2000.
DOI : 10.1145/335191.335438

H. Wang and L. Lakshmanan, Efficient secure query evaluation over encrypted xml databases, Proceedings of the 32nd international conference on Very large data bases, VLDB '06, pp.127-138, 2006.

L. Xiong, L. Chitti, and . Liu, Preserving data privacy in outsourcing data aggregation services, ACM Transactions on Internet Technology, vol.7, issue.3, p.17, 2007.
DOI : 10.1145/1275505.1275510