C. Cachin, S. Micali, and M. Stadler, Computationally Private Information Retrieval with Polylogarithmic Communication, Proc. of EUROCRYPT, 1999.
DOI : 10.1007/3-540-48910-X_28

URL : http://people.csail.mit.edu/silvio/Selected%20Scientific%20Papers/Private%20Information%20Retrieval/Computationally%20Private%20Information%20Retrieval%20with%20Polylogarithmic%20Communication.pdf

D. Capitani, D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Over-encryption: Management of access control evolution on outsourced data, Proc. of VLDB, 2007.

D. Capitani, D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Encryption policies for regulating access to outsourced data, ACM TODS, vol.35, issue.12, pp.1-1246, 2010.

D. Capitani, D. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Private data indexes for selective access to outsourced data, Proc. of WPES 2011, 2011.

D. Capitani, D. Vimercati, S. Foresti, S. Paraboschi, S. Pelosi et al., Efficient and private access to outsourced data, Proc. of ICDCS, 2011.

D. Capitani, D. Vimercati, S. Foresti, S. Paraboschi, S. Pelosi et al., Supporting concurrency and multiple indexes in private access to outsourced data, JCS, vol.21, issue.3, pp.425-461, 2013.

D. Capitani, D. Vimercati, S. Foresti, S. Paraboschi, S. Pelosi et al., Shuffle index: Efficient and private access to outsourced data, ACM TOS, vol.11, issue.19, pp.1-1955, 2015.

D. Capitani, D. Vimercati, S. Foresti, S. Paraboschi, S. Pelosi et al., Three-server swapping for access confidentiality, IEEE TCC, pp.pre-print, 2016.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006.
DOI : 10.1145/1180405.1180418

H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li, Executing SQL over encrypted data in the database-service-provider model, Proc. of SIGMOD, 2002.

R. Jhawar and V. Piuri, Fault tolerance management in IaaS clouds, 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL), 2012.
DOI : 10.1109/ESTEL.2012.6400113

R. Jhawar, V. Piuri, and P. Samarati, Supporting Security Requirements for Resource Management in Cloud Computing, 2012 IEEE 15th International Conference on Computational Science and Engineering, 2012.
DOI : 10.1109/ICCSE.2012.32

URL : http://spdp.dti.unimi.it/papers/JPS.CSE2012.pdf

P. Lin and K. Candan, Hiding Traversal of Tree Structured Data from Untrusted Data Stores, Proc. of WOSIS, 2004.
DOI : 10.1007/3-540-44853-5_35

R. Ostrovsky, I. Skeith, and W. E. , A Survey of Single-Database Private Information Retrieval: Techniques and Applications, Proc. of PKC, 2007.
DOI : 10.1007/978-3-540-71677-8_26

P. Samarati and S. De-capitani-di-vimercati, Cloud Security, Encyclopedia on Cloud Computing, 2016.
DOI : 10.1109/TCC.2013.18

E. Stefanov and E. Shi, ObliviStore: High Performance Oblivious Cloud Storage, 2013 IEEE Symposium on Security and Privacy, 2013.
DOI : 10.1109/SP.2013.25

URL : http://doi.org/10.1109/sp.2013.25

E. Stefanov, M. Van-dijk, E. Shi, C. Fletcher, L. Ren et al., Path ORAM, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013.
DOI : 10.1145/2508859.2516660

C. Wang, N. Cao, K. Ren, and W. Lou, Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data, IEEE Transactions on Parallel and Distributed Systems, vol.23, issue.8, pp.1467-1479, 2012.
DOI : 10.1109/TPDS.2011.282

P. Williams, R. Sion, and B. Carbunar, Building castles out of mud, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, 2008.
DOI : 10.1145/1455770.1455790