G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-molina, K. Kenthapadi et al., Two can keep a secret: A distributed architecture for secure database services, Proc. of CIDR 2005, 2005.

J. Biskup and L. Wiese, Combining Consistency and Confidentiality Requirements in First-Order Databases, Proc. of ISC, 2009.
DOI : 10.1007/978-3-540-74835-9_12

R. Bryant, Graph-Based Algorithms for Boolean Function Manipulation, IEEE Transactions on Computers, vol.35, issue.8, pp.677-691, 1986.
DOI : 10.1109/TC.1986.1676819

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, Privacy-preserving multi-keyword ranked search over encrypted cloud data, Proc. of INFOCOM 2011, 2011.
DOI : 10.1109/tpds.2013.45

S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti, Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System, 2008 Annual Computer Security Applications Conference (ACSAC), 2008.
DOI : 10.1109/ACSAC.2008.13

V. Ciriani, S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases, 2009 29th IEEE International Conference on Distributed Computing Systems, 2009.
DOI : 10.1109/ICDCS.2009.52

V. Ciriani, S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Keep a Few: Outsourcing Data While Maintaining Confidentiality, Proc. of ESORICS, 2009.
DOI : 10.1145/1994.2209

V. Ciriani, S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Combining fragmentation and encryption to protect privacy in data storage, ACM Transactions on Information and System Security, vol.13, issue.3, pp.1-2233, 2010.
DOI : 10.1145/1805974.1805978

E. Damiani, S. De-capitani-di-vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, Balancing confidentiality and efficiency in untrusted relational DBMSs, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, 2003.
DOI : 10.1145/948109.948124

D. Capitani, D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Fragments and loose associations: Respecting privacy in data publishing, Proc. of the VLDB Endowment, pp.1370-1381, 2010.

M. Gamassi, M. Lazzaroni, M. Misino, V. Piuri, D. Sana et al., Accuracy and performance of biometric systems, Proceedings of the 21st IEEE Instrumentation and Measurement Technology Conference (IEEE Cat. No.04CH37510), 2004.
DOI : 10.1109/IMTC.2004.1351099

M. Gamassi, V. Piuri, D. Sana, and F. Scotti, Robust fingerprint detection for access control, Proc. of RoboCare Workshop 2005, 2005.

G. Gange, P. J. Stuckey, and V. Lagoon, Fast set bounds propagation using a bdd-sat hybrid, J. Artif. Int. Res, vol.38, pp.307-338, 2010.

H. Hacigümüs, B. Iyer, and S. Mehrotra, Providing database as a service, Proceedings 18th International Conference on Data Engineering, 2002.
DOI : 10.1109/ICDE.2002.994695

T. Hadzic, E. R. Hansen, and B. O-'sullivan, On automata, MDDs and BDDs in constraint satisfaction, Proc. of ECAI, 2008.

D. E. Knuth, The Art of Computer Programming Fascicle 1: Bitwise Tricks & Techniques; Binary Decision Diagrams, 2009.

M. Kurihara and H. Kondo, Efficient BDD Encodings for Partial Order Constraints with Application to Expert Systems in Software Verification, Innovations in Applied Artificial Intelligence, 2004.
DOI : 10.1007/978-3-540-24677-0_85

C. Meinel and T. Theobald, Algorithms and Data Structures in VLSI Design, 1998.
DOI : 10.1007/978-3-642-58940-9

P. Samarati, Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001.
DOI : 10.1109/69.971193

P. Samarati and S. De-capitani-di-vimercati, Data protection in outsourcing scenarios, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010.
DOI : 10.1145/1755688.1755690

L. Wiese, Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints, Proc. of IWSEC 2010, 2010.
DOI : 10.1007/978-0-387-27696-0_10