Confidentiality-Preserving Query Execution of Fragmented Outsourced Data, Information and Communicatiaon Technology -International Conference, ICT- EurAsia 2013. Proceedings, pp.426-440, 2013. ,
DOI : 10.1007/978-3-642-36818-9_47
URL : https://hal.archives-ouvertes.fr/hal-01213982
Preserving multi-relational outsourced databases confidentiality using fragmentation and encryption, JoWUA, vol.4, issue.2, pp.39-62, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01213956
Specification and Deployment of Integrated Security Policies for Outsourced Data, Data and Applications Security and Privacy XXVIII -28th Annual IFIP WG 11.3 Working Conference. Proceedings, pp.17-32, 2014. ,
DOI : 10.1007/978-3-662-43936-4_2
URL : https://hal.archives-ouvertes.fr/hal-01087467
Frédéric Cuppens, Nora Cuppens-Boulahia, and David Gross-Amblard. Optimized and controlled provisioning of encrypted outsourced data, 19th ACM Symposium on Access Control Models and Technologies, SACMAT '14, pp.141-152, 2014. ,
Fast planning through planning graph analysis, Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, IJCAI 95 Volumes, pp.1636-1642, 1995. ,
DOI : 10.1016/S0004-3702(96)00047-1
End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation, IEEE Signal Processing Magazine, vol.30, issue.2, pp.97-107, 2013. ,
DOI : 10.1109/MSP.2012.2230220
Orderpreserving symmetric encryption, Advances in Cryptology -EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings, pp.224-241, 2009. ,
Fragmentation and Encryption to Enforce Privacy in Data Storage, Computer Security -ESORICS 2007, 12th European Symposium On Research In Computer Security Proceedings, pp.171-186, 2007. ,
DOI : 10.1007/978-3-540-74835-9_12
Strips: A new approach to the application of theorem proving to problem solving, Artificial Intelligence, vol.2, issue.3-4, pp.189-208, 1971. ,
DOI : 10.1016/0004-3702(71)90010-5
On the temporal analysis of fairness, Proceedings of the 7th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '80, pp.163-173, 1980. ,
DOI : 10.1145/567446.567462
Query-preserving watermarking of relational databases and xml documents, ACM Trans. Database Syst, vol.36, issue.1, p.3, 2011. ,
URL : https://hal.archives-ouvertes.fr/inria-00587712
Executing SQL over encrypted data in the database-service-provider model, Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, pp.216-227, 2002. ,
Pushing the envelope: Planning, propositional logic and stochastic search, Proceedings of the Thirteenth National Conference on Artificial Intelligence and Eighth Innovative Applications of Artificial Intelligence Conference, AAAI 96, IAAI 96, pp.1194-1201, 1996. ,
SatPlan: Planning as satisfiability, Abstracts of the 5th International Planning Competition, 2006. ,
Authentication and integrity in outsourced databases, Proceedings of the Network and Distributed System Security Symposium, NDSS 2004, 2004. ,
DOI : 10.1145/1149976.1149977
DSAC, Proceedings of the 14th ACM international conference on Information and knowledge management , CIKM '05, p.297, 2005. ,
DOI : 10.1145/1099554.1099604
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology -EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, pp.223-238, 1999. ,
DOI : 10.1007/3-540-48910-X_16
Rsat 2.0: Sat solver description, 2007. ,
Cryptdb: protecting confidentiality with encrypted query processing, Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, SOSP 2011, pp.85-100, 2011. ,
Co-plan: Combining sat-based planning with forward-search, Proc. IPC-6, 2008. ,
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
Security analysis for order preserving encryption schemes, 46th Annual Conference on Information Sciences and Systems, CISS 2012, pp.1-6, 2012. ,