Controlled Information Sharing in Collaborative Distributed Query Processing, Proc. of ICDCS, 2008. ,
Assessing query privileges via safe and efficient permission composition, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, 2008. ,
DOI : 10.1145/1455770.1455810
Two can keep a secret: A distributed architecture for secure database services, Proc. of CIDR 2005, 2005. ,
Keep a Few: Outsourcing Data While Maintaining Confidentiality, Proc. of ESORICS, 2009. ,
DOI : 10.1145/1994.2209
The state of the art in distributed query processing, ACM Computing Surveys, vol.32, issue.4, pp.422-469, 2000. ,
DOI : 10.1145/371578.371598
Firewall design: consistency, completeness, and compactness, 24th International Conference on Distributed Computing Systems, 2004. Proceedings., 2004. ,
DOI : 10.1109/ICDCS.2004.1281597
URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.90.1042&rep=rep1&type=pdf
Query execution assurance for outsourced databases, Proc. of VLDB 2005, 2005. ,
Query processing in a system for distributed databases (SDD-1), ACM Transactions on Database Systems, vol.6, issue.4, pp.602-625, 1981. ,
DOI : 10.1145/319628.319650
Querying Data under Access Limitations, 2008 IEEE 24th International Conference on Data Engineering, 2008. ,
DOI : 10.1109/ICDE.2008.4497413
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.324.232
Query optimization in the presence of limited access patterns, Proc. of SIGMOD 1999, 1999. ,
URL : https://hal.archives-ouvertes.fr/inria-00073035
The theory of joins in relational databases, ACM Transactions on Database Systems, vol.4, issue.3, pp.297-314, 1979. ,
DOI : 10.1145/320083.320091
Computing complete answers to queries in the presence of limited access patterns, The VLDB Journal The International Journal on Very Large Data Bases, vol.12, issue.3, 2003. ,
DOI : 10.1007/s00778-002-0085-6