Preserving multi-relational outsourced databases confidentiality using fragmentation and encryption International Conferences ? A. Bkakria, F. Cuppens, N. Cuppens-Boulahia, and D. Gross-Amblard. Security mechanisms planning to enforce security policies, Foundations and Practice of Security -7th International Symposium, pp.39-62, 2013. ,
Specification and Deployment of Integrated Security Policies for Outsourced Data, Data and Applications Security and Privacy XXVIII -28th Annual IFIP WG 11 ,
DOI : 10.1007/978-3-662-43936-4_2
URL : https://hal.archives-ouvertes.fr/hal-01087467
Optimized and controlled provisioning of encrypted outsourced data, 19th ACM Symposium on Access Control Models and Technologies, SACMAT '14, pp.141-152, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01207766
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data, Information and Communicatiaon Technology -International Conference, ICT- EurAsia 2013. Proceedings, pp.426-440, 2013. ,
DOI : 10.1007/978-3-642-36818-9_47
URL : https://hal.archives-ouvertes.fr/hal-01213982
Two can keep A secret: A distributed architecture for secure database services, CIDR, pp.186-199, 2005. ,
Orderpreserving encryption for numeric data, Proceedings of the ACM SIGMOD International Conference on Management of Data, pp.563-574, 2004. ,
Data Structures and Algorithms, p.44, 1983. ,
Provably-Secure Schemes for Basic Query Support in Outsourced Databases, Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security Proceedings, volume 4602 of Lecture Notes in Computer Science, pp.14-30, 2007. ,
DOI : 10.1007/11761679_23
Ordered hash tables, The Computer Journal, vol.17, issue.2, pp.135-142, 1974. ,
DOI : 10.1093/comjnl/17.2.135
Tools and Algorithms for the Construction and Analysis of Systems Held as Part of the European Joint Conferences on Theory and Practice of Software, 20th International Conference, TACAS 2014 Proceedings, pp.31-45, 2014. ,
Automatic satcompilation of protocol insecurity problems via reduction to planning, Formal Techniques for Networked and Distributed Systems -FORTE 2002, 22nd IFIP WG 6.1 International Conference Proceedings, volume 2529 of Lecture Notes in Computer Science, pp.210-225, 2002. ,
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis, FME 2003: Formal Methods, International Symposium of Formal Methods Europe Proceedings, volume 2805 of Lecture Notes in Computer Science, pp.875-893, 2003. ,
DOI : 10.1007/978-3-540-45236-2_47
Planning and verifying service composition, Journal of Computer Security, vol.17, issue.5, pp.799-837, 2009. ,
DOI : 10.3233/JCS-2009-0357
Deterministic and Efficiently Searchable Encryption, 27th Annual International Cryptology Conference Proceedings, pp.535-552, 2007. ,
DOI : 10.1007/978-3-540-74143-5_30
A concrete security treatment of symmetric encryption, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.394-403, 1997. ,
DOI : 10.1109/SFCS.1997.646128
Deterministic encryption: Definitional equivalences and constructions without random oracles, Advances in Cryptology -CRYPTO 2008, 28th Annual International Cryptology Conference Proceedings, volume 5157 of Lecture Notes in Computer Science, pp.360-378, 2008. ,
The edge Hamiltonian path problem is NP-complete, Information Processing Letters, vol.13, issue.4-5, pp.157-159, 1981. ,
DOI : 10.1016/0020-0190(81)90048-X
A distortion free watermark framework for relational databases, ICSOFT 2009 -Proceedings of the 4th International Conference on Software and Data Technologies, pp.229-234, 2009. ,
Stx b+ tree c++ template classes v 0.8.3, p.50, 2007. ,
On the inferenceproofness of database fragmentation satisfying confidentiality constraints, Information Security, 14th International Conference Proceedings, volume 7001 of Lecture Notes in Computer Science, pp.246-261, 2011. ,
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data, Information and Communicatiaon Technology -International Conference , ICT-EurAsia 2013 Proceedings, pp.426-440, 2013. ,
DOI : 10.1007/978-3-642-36818-9_47
URL : https://hal.archives-ouvertes.fr/hal-01213982
Preserving multi-relational outsourced databases confidentiality using fragmentation and encryption, JoWUA, vol.4, issue.147, pp.39-62, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01213956
Specification and deployment of integrated security policies for outsourced data, Data and Applications Security and Privacy XXVIII -28th Annual IFIP WG 11.3 Working Conference Proceedings, pp.17-32, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01087467
Optimized and controlled provisioning of encrypted outsourced data Space/time trade-offs in hash coding with allowable errors, 19th ACM Symposium on Access 184 BIBLIOGRAPHY Control Models and Technologies, SACMAT '14, pp.141-152, 1970. ,
Fast planning through planning graph analysis, Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence Volumes, pp.1636-1642, 1995. ,
DOI : 10.1016/S0004-3702(96)00047-1
Fast planning through planning graph analysis, Artificial Intelligence, vol.90, issue.1-2, pp.281-300, 1997. ,
DOI : 10.1016/S0004-3702(96)00047-1
End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation, IEEE Signal Processing Magazine, vol.30, issue.2, pp.97-107, 2013. ,
DOI : 10.1109/MSP.2012.2230220
Order-Preserving Symmetric Encryption, Advances in Cryptology -EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings, pp.224-241, 2009. ,
DOI : 10.1109/TMC.2006.144
Orderpreserving encryption revisited: Improved security analysis and alternative solutions, pp.578-595, 2011. ,
Orderpreserving encryption revisited: Improved security analysis and alternative solutions, IACR Cryptology ePrint Archive, vol.13, pp.625-642, 2012. ,
The Decision Diffie-Hellman problem, Algorithmic Number Theory, Third International Symposium Proceedings, volume 1423 of Lecture Notes in Computer Science, pp.48-63, 1998. ,
DOI : 10.1007/BFb0054851
Evaluating 2-DNF Formulas on Ciphertexts, Theory of Cryptography Conference, TCC 2005 Theory of Cryptography, 4th Theory of Cryptography Conference Proceedings, pp.325-341, 2005. ,
DOI : 10.1007/978-3-540-30576-7_18
Simple and spaceefficient minimal perfect hash functions, Algorithms and Data Structures, 10th International Workshop, WADS 2007 Proceedings, volume 4619 of Lecture Notes in Computer Science, pp.139-150, 2007. ,
Cmph : C minimal perfect hashing library, p.50, 2007. ,
External perfect hashing for very large key sets, Proceedings of the sixteenth ACM conference on Conference on information and knowledge management , CIKM '07, pp.653-662, 2007. ,
DOI : 10.1145/1321440.1321532
(leveled) fully homomorphic encryption without bootstrapping, Innovations in Theoretical Computer Science 2012, pp.309-325, 2012. ,
Efficient Fully Homomorphic Encryption from (Standard) LWE, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, p.109, 2011. ,
DOI : 10.1109/FOCS.2011.12
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages, pp.505-524, 2011. ,
DOI : 10.1007/978-3-642-22792-9_29
A commutative digital image watermarking and encryption method in the tree structured Haar transform domain, Proc.: Image Comm, pp.1-12, 2011. ,
DOI : 10.1016/j.image.2010.11.001
An asymmetric fingerprinting scheme based on tardos codes, Information Hiding -13th International Conference, pp.43-58, 2011. ,
URL : https://hal.archives-ouvertes.fr/inria-00581156
Structured encryption and controlled disclosure, IACR Cryptology ePrint Archive, vol.13, pp.10-19, 2011. ,
Dynamic binary analyzer for scanning vulnerabilities with taint analysis, Multimedia Tools Appl, vol.74, issue.7, pp.2301-2320, 2015. ,
Private information retrieval by keywords, IACR Cryptology ePrint Archive, vol.29, issue.3, p.43, 1998. ,
Fragmentation and Encryption to Enforce Privacy in Data Storage, Computer Security -ESORICS 2007, 12th European Symposium On Research In Computer Security Proceedings, pp.171-186, 2007. ,
DOI : 10.1007/978-3-540-74835-9_12
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.22-26, 2009. ,
DOI : 10.1109/ICDCS.2009.52
An OBDD approach to enforce confidentiality and visibility constraints in data publishing*, Journal of Computer Security, vol.20, issue.5, pp.463-508, 2012. ,
DOI : 10.3233/JCS-2012-0449
Introduction to Ring Theory, p.20, 2000. ,
DOI : 10.1007/978-1-4471-0475-9
Searchable symmetric encryption, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.79-88, 2006. ,
DOI : 10.1145/1180405.1180417
The crypto++ library Implementation of a storage mechanism for untrusted dbmss Information Assurance, The Storage Security Perspective, 2nd International IEEE Security in Storage Workshop, pp.50-88, 1995. ,
Balancing confidentiality and efficiency in untrusted relational DBMSs, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.93-102, 2003. ,
DOI : 10.1145/948109.948124
Temporal modalities and the future, Notre Dame Journal of Formal Logic, vol.17, issue.2, pp.233-238, 1976. ,
Fragments and loose associations: Respecting privacy in data publishing, PVLDB, vol.3, issue.1, pp.1370-1381, 2010. ,
Resolution-based proof for multimodal temporal logics of knowledge, Seventh International Workshop on Temporal Representation and Reasoning, pp.69-78, 2000. ,
A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, vol.31, issue.4, pp.469-472, 1985. ,
DOI : 10.1109/TIT.1985.1057074
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones, 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2010, pp.393-407, 2010. ,
Reasoning about Knowledge, p.86, 1995. ,
Strips: A new approach to the application of theorem proving to problem solving, Artificial Intelligence, vol.2, issue.3-4, pp.189-208, 1971. ,
DOI : 10.1016/0004-3702(71)90010-5
Announcing the advanced encryption standard (aes), p.12, 2001. ,
Real-Time Motion Planning for Agile Autonomous Vehicles, Journal of Guidance, Control, and Dynamics, vol.25, issue.1, pp.116-129, 2000. ,
DOI : 10.2514/2.4856
Storing a sparse table with 0(1) worst case access time, J. ACM, issue.3, pp.31538-544, 1984. ,
On the temporal analysis of fairness, Proceedings of the 7th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '80, pp.163-173, 1980. ,
DOI : 10.1145/567446.567462
Computers and Intractability ; A Guide to the Theory of NP-Completeness, p.178, 1990. ,
A fully homomorphic encryption scheme, p.21, 2009. ,
Homomorphic Evaluation of the AES Circuit, Advances in Cryptology -CRYPTO 2012 -32nd Annual Cryptology Conference Proceedings Advances in Cryptology -CRYPTO 2013 -33rd Annual Cryptology Conference Proceedings, Part I, pp.850-867, 2012. ,
DOI : 10.1007/978-3-642-32009-5_49
Pddl -the planning domain definition language. version 1.2, pp.2015-2023 ,
Secure indexes, IACR Cryptology ePrint Archive, vol.13, pp.216-234, 2003. ,
Secure indexes. Cryptology ePrint Archive, Report, vol.216, 2003. ,
Improving the Robustness of Private Information Retrieval, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.131-148, 2007. ,
DOI : 10.1109/SP.2007.23
Percy++ / pir in c++, p.50, 2007. ,
Foundations of Cryptography, 1921. ,
Probabilistic encryption & how to play mental poker keeping secret all partial information, Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, STOC '82, pp.365-377, 1982. ,
Secure Conjunctive Keyword Search over Encrypted Data, Applied Cryptography and Network Security, Second International Conference, ACNS 2004 Proceedings, pp.31-45, 2004. ,
DOI : 10.1007/978-3-540-24852-1_3
Google app engine. https://appengine.google.com/. Accessed, pp.2015-2022 ,
Google drive. https://drive.google.com/. Accessed, pp.2015-2021 ,
Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data, Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), pp.19-21, 2014. ,
Fingerprinting relational databases, Proceedings of the 2006 ACM symposium on Applied computing , SAC '06, pp.487-492, 2006. ,
DOI : 10.1145/1141277.1141391
R-trees: A dynamic index structure for spatial searching, SIGMOD'84, Proceedings of Annual Meeting, pp.47-57, 1984. ,
Executing SQL over encrypted data in the database-service-provider model, Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, pp.216-227, 2002. ,
The complexity of reasoning about knowledge and time. I. Lower bounds, Journal of Computer and System Sciences, vol.38, issue.1, pp.195-237, 1989. ,
DOI : 10.1016/0022-0000(89)90039-1
Reasoning about knowledge in philosophy: The paradigm of epistemic logic, Proceedings of the 1st Conference on Theoretical Aspects of Reasoning about Knowledge, pp.63-80, 1986. ,
A Privacy-Preserving Index for Range Queries, (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, pp.720-731, 2004. ,
DOI : 10.1016/B978-012088469-8.50064-4
Verifying web applications using bounded model checking, 2004 International Conference on Dependable Systems and Networks, pp.199-208, 2004. ,
Data confidentiality using fragmentation in cloud computing, Int. J. Pervasive Computing and Communications, vol.9, issue.22, pp.2013-2036 ,
Avoiding information leakage in security-policy-aware planning, Proceedings of the 7th ACM workshop on Privacy in the electronic society, WPES '08, pp.85-94, 2008. ,
DOI : 10.1145/1456403.1456418
Access pattern disclosure on searchable encryption: Ramification, attack and mitigation, 19th Annual Network and Distributed System Security Symposium, NDSS 2012, p.58, 2012. ,
The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east, IDC iView, issue.1, pp.1-16, 2012. ,
Static analysis for detecting taint-style vulnerabilities in web applications, Journal of Computer Security, vol.18, issue.5, pp.861-907, 2010. ,
DOI : 10.3233/JCS-2009-0385
Parallel and Dynamic Searchable Symmetric Encryption, Financial Cryptography and Data Security -17th International Conference, pp.258-274, 2013. ,
DOI : 10.1007/978-3-642-39884-1_22
Dynamic searchable symmetric encryption, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.965-976, 2012. ,
DOI : 10.1145/2382196.2382298
Pushing the envelope: Planning, propositional logic and stochastic search, Proceedings of the Thirteenth BIBLIOGRAPHY National Conference on Artificial Intelligence and Eighth Innovative Applications of Artificial Intelligence Conference, AAAI 96, IAAI 96, pp.1194-1201, 1996. ,
Unifying sat-based and graph-based planning, Proceedings of the Sixteenth International Joint Conference on Artificial Intelligence, IJCAI 99, pp.318-325, 1450. ,
SatPlan: Planning as satisfiability, Abstracts of the 5th International Planning Competition, p.129, 2006. ,
DEMO: Adjustably encrypted in-memory column-store, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1325-1328, 2013. ,
DOI : 10.1145/2508859.2512491
Optimal re-encryption strategy for joins in encrypted databases, Data and Applications Security and Privacy XXVII -27th Annual IFIP WG 11.3 Conference Proceedings, volume 7964 of Lecture Notes in Computer Science, pp.195-210, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01490705
An encrypted in-memory column-store: The onion selection problem, Information Systems Security -9th International Conference, ICISS 2013, pp.14-26, 2013. ,
Kinodynamic motion planning amidst moving obstacles, Proceedings 2000 ICRA. Millennium Conference. IEEE International Conference on Robotics and Automation. Symposia Proceedings (Cat. No.00CH37065), pp.537-543, 2000. ,
DOI : 10.1109/ROBOT.2000.844109
On The Limits of Privacy Provided by Order-Preserving Encryption, Bell Labs Technical Journal, vol.17, issue.3, pp.135-146, 2012. ,
DOI : 10.1002/bltj.21564
Efficient privacy-preserving data distribution in outsourced environments: a fragmentation-based approach, 2012 International Conference on Advances in Computing, Communications and Informatics, ICACCI '12, pp.589-595, 2012. ,
Symbolic logic Century Co New York] D. Lewis. icloud data breach: Hacking and celebrity photos icloud-data-breach-hacking-and-nude-celebrity-photos, pp.83-2015, 1932. ,
t-closeness: Privacy beyond k-anonymity and l-diversity The Marmara Hotel, Proceedings of the 23rd International Conference on Data Engineering, pp.106-115, 2007. ,
-diversity, Proceedings of the 22nd International Conference on Data Engineering, pp.3-8, 2006. ,
DOI : 10.1145/1217299.1217302
Regular expressions in c++, p.49, 2001. ,
The nist definition of cloud computing . National Institute of Standards and Technology, 2011. ,
Microsoft share point. https://products.office.com/ fr-fr/sharepoint/collaboration, pp.2015-2022 ,
Boolean symmetric searchable encryption, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.265-276, 2013. ,
DOI : 10.1145/2484313.2484347
URL : https://hal.archives-ouvertes.fr/hal-00952541
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space, 20th USENIX Security Symposium Proceedings, 2011. ,
Authentication and integrity in outsourced databases, Proceedings of the Network and Distributed System Security Symposium, NDSS 2004, p.81, 2004. ,
DOI : 10.1145/1149976.1149977
DSAC: an approach to ensure integrity of outsourced databases using signature aggregation and chaining, IACR Cryptology ePrint Archive, pp.297-81, 2005. ,
Vertical partitioning algorithms for database design, ACM Transactions on Database Systems, vol.9, issue.4, pp.680-710, 1984. ,
DOI : 10.1145/1994.2209
Dropbox authentication: insecure by design, pp.2015-2021, 2011. ,
Data encryption standard (des), Technology, vol.46, issue.3, pp.1-26, 1999. ,
Nsa spying poisons the cloud market: survey. http://www.zdnet. com/nsa-spying-poisons-the-cloud-market-survey-7000022964, pp.2015-2022, 2013. ,
Nsa surveillance: First prism, now muscled out of cloud. http://www.darkreading.com/cloud-security/ nsa-surveillance-first-prismnow-muscled-out-of-cloud, p.50 ,
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology -EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, pp.223-238, 1999. ,
DOI : 10.1007/3-540-48910-X_16
Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted Data, PCIDSS ] PCIDSS. Pci security standards council, pp.1483-1497, 2011. ,
DOI : 10.1109/TKDE.2010.206
An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.), IEEE Transactions on Information Theory, vol.24, issue.1, pp.106-110, 1978. ,
DOI : 10.1109/TIT.1978.1055817
CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, 2011. ,
DOI : 10.1145/2043556.2043566
A new watermarking approach for relational data, Proceedings of the 46th Annual Southeast Regional Conference on XX, ACM-SE 46, pp.127-131, 2008. ,
DOI : 10.1145/1593105.1593138
Mechanisms for usage control, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.240-244, 2008. ,
DOI : 10.1145/1368310.1368344
Rackspace?Äôs cloud services, pp.2015-2022 ,
On data banks and privacy homomorphisms. Foundations of Secure Computation, pp.169-179, 1978. ,
Co-plan: Combining sat-based planning with forward-search, Proc. IPC-6, p.129, 2008. ,
Highlights of the History of the Lambda-Calculus, IEEE Annals of the History of Computing, vol.6, issue.4, pp.337-349, 1984. ,
DOI : 10.1109/MAHC.1984.10040
https://www.sics.se/sites/default/files/pub/ andreasschaad.pdf. Accessed, pp.2015-2021 ,
Multi-dimensional range query over encrypted data, pp.350-364, 2007. ,
Database Watermarking for Copyright Protection, Handbook of Database Security -Applications and Trends, pp.297-328, 2008. ,
DOI : 10.1007/978-0-387-48533-1_13
Practical techniques for searches on encrypted data, IEEE Symposium on Security and Privacy, pp.44-55, 2000. ,
Faster Fully Homomorphic Encryption, Advances in Cryptology -ASIACRYPT 2010 -16th International Conference on the Theory and Application of Cryptology and Information Security Proceedings, pp.377-394, 2010. ,
DOI : 10.1007/978-3-642-17373-8_22
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
Statistics on Encrypted Cloud Data, Advances in Information and Computer Security -8th International Workshop on Security, IWSEC 2013 Proceedings, pp.133-150, 2013. ,
DOI : 10.1007/978-3-642-41383-4_9
Computing blindfolded: New developments in fully homomorphic encryption Fully homomorphic encryption over the integers, IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011 Advances in Cryptology -EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, volume 6110 of Lecture Notes in Computer Science, pp.5-16, 2010. ,
Maple, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.111-122, 2014. ,
DOI : 10.1145/2590296.2590305
URL : https://hal.archives-ouvertes.fr/inria-00099637
DROIT: dynamic alternation of dual-level tainting for malware analysis, J. Inf. Sci. Eng, vol.31, issue.1, pp.111-129, 2015. ,
Security analysis for order preserving encryption schemes, 46th Annual Conference on Information Sciences and Systems, CISS 2012, pp.1-6, 2012. ,
Static detection of security vulnerabilities in scripting languages, Proceedings of the 15th USENIX Security Symposium, p.135, 2006. ,
Provably-correct stochastic motion planning with safety constraints, 2013 IEEE International Conference on Robotics and Automation, pp.981-986, 2013. ,
DOI : 10.1109/ICRA.2013.6630692
Relational databases watermark technique based on content characteristic 97, 100 List of Figures 2.1 (a) Patient relation, (b) partition function used for attribute Dob, and (c) the encrypted relation P atient s stored in the cloud server, First International Conference on Innovative Computing, Information and Control, pp.677-680, 2006. ,