A. Bkakria, F. Cuppens, N. Cuppens-boulahia, and J. M. Fernandez, Confidentiality-Preserving Query Execution of Fragmented Outsourced Data, Information and Communicatiaon Technology -International Conference, ICT- EurAsia 2013. Proceedings, pp.426-440, 2013.
DOI : 10.1007/978-3-642-36818-9_47

URL : https://hal.archives-ouvertes.fr/hal-01213982

A. Bkakria, F. Cuppens, N. Cuppens-boulahia, J. M. Fernandez, and D. Gross-amblard, Preserving multi-relational outsourced databases confidentiality using fragmentation and encryption, JoWUA, vol.4, issue.2, pp.39-62, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01213956

A. Bkakria, F. Cuppens, N. Cuppens-boulahia, and D. Gross-amblard, Specification and Deployment of Integrated Security Policies for Outsourced Data, Data and Applications Security and Privacy XXVIII -28th Annual IFIP WG 11.3 Working Conference. Proceedings, pp.17-32, 2014.
DOI : 10.1007/978-3-662-43936-4_2

URL : https://hal.archives-ouvertes.fr/hal-01087467

A. Bkakria, A. Schaad, and F. Kerschbaum, Frédéric Cuppens, Nora Cuppens-Boulahia, and David Gross-Amblard. Optimized and controlled provisioning of encrypted outsourced data, 19th ACM Symposium on Access Control Models and Technologies, SACMAT '14, pp.141-152, 2014.

A. Blum and M. L. Furst, Fast planning through planning graph analysis, Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, IJCAI 95 Volumes, pp.1636-1642, 1995.
DOI : 10.1016/S0004-3702(96)00047-1

A. Boho, G. Van-wallendael, A. Dooms-de-cock, G. Braeckman, P. Schelkens et al., End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation, IEEE Signal Processing Magazine, vol.30, issue.2, pp.97-107, 2013.
DOI : 10.1109/MSP.2012.2230220

A. Boldyreva, N. Chenette, Y. Lee, and A. Neill, Orderpreserving symmetric encryption, Advances in Cryptology -EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings, pp.224-241, 2009.

V. Ciriani, S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Fragmentation and Encryption to Enforce Privacy in Data Storage, Computer Security -ESORICS 2007, 12th European Symposium On Research In Computer Security Proceedings, pp.171-186, 2007.
DOI : 10.1007/978-3-540-74835-9_12

R. Fikes and N. J. Nilsson, Strips: A new approach to the application of theorem proving to problem solving, Artificial Intelligence, vol.2, issue.3-4, pp.189-208, 1971.
DOI : 10.1016/0004-3702(71)90010-5

D. Gabbay, A. Pnueli, S. Shelah, and J. Stavi, On the temporal analysis of fairness, Proceedings of the 7th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '80, pp.163-173, 1980.
DOI : 10.1145/567446.567462

D. Gross-amblard, Query-preserving watermarking of relational databases and xml documents, ACM Trans. Database Syst, vol.36, issue.1, p.3, 2011.
URL : https://hal.archives-ouvertes.fr/inria-00587712

H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra, Executing SQL over encrypted data in the database-service-provider model, Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, pp.216-227, 2002.

A. Henry, B. Kautz, and . Selman, Pushing the envelope: Planning, propositional logic and stochastic search, Proceedings of the Thirteenth National Conference on Artificial Intelligence and Eighth Innovative Applications of Artificial Intelligence Conference, AAAI 96, IAAI 96, pp.1194-1201, 1996.

A. Henry, B. Kautz, J. Selman, and . Hoffmann, SatPlan: Planning as satisfiability, Abstracts of the 5th International Planning Competition, 2006.

E. Mykletun, M. Narasimha, and G. Tsudik, Authentication and integrity in outsourced databases, Proceedings of the Network and Distributed System Security Symposium, NDSS 2004, 2004.
DOI : 10.1145/1149976.1149977

M. Narasimha and G. Tsudik, DSAC, Proceedings of the 14th ACM international conference on Information and knowledge management , CIKM '05, p.297, 2005.
DOI : 10.1145/1099554.1099604

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology -EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

K. Pipatsrisawat and A. Darwiche, Rsat 2.0: Sat solver description, 2007.

A. Raluca, C. M. Popa, N. Redfield, H. Zeldovich, and . Balakrishnan, Cryptdb: protecting confidentiality with encrypted query processing, Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, SOSP 2011, pp.85-100, 2011.

N. Robinson, C. Gretton, and D. Pham, Co-plan: Combining sat-based planning with forward-search, Proc. IPC-6, 2008.

L. Sweeney, k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002.
DOI : 10.1142/S0218488502001648

L. Xiao and I. Yen, Security analysis for order preserving encryption schemes, 46th Annual Conference on Information Sciences and Systems, CISS 2012, pp.1-6, 2012.