2Beimel A, Ishai Y. Information-Theoretic Private Information Retrieval: A Unified Construction: [ECCC Report TR01-015].Feb. 2001
3Chor B, Goldreich O, Kushilevitz E, et. al. Private Information Retrieval. In:Proe. of 36th IEEE Conference on FOCS, 1995
4Marks D G. Inference in MLS Database Systems [J]. IEEE Transaction on Knowledhe and Data Engineering, 1996, 8(1):46-55
5Song Xiaodong D, Wanger D,Perring A. Practical Techniques for Searches on Encrypted Data. In: The IEEE Symp on Security and Privacy, Oakland, California, 2000
6Bertino E,Ooi Beng Chin,Yang Yanjiang,et al. Privacy and Ownership Preserving of Outsourced Medical Data. ICDE, 2005. 521-532
7Mykletun E, Narasimha M, Tsudik G. Authentication and Integrity in Outsourced Databases. In:Proceedings of NDSS 2004, San Diego, California, USA
8Mykletun E,Tsudik G. Incorporating a Secure Coprocessor in the Database-as-a-Service Model. In: IWIA2005 for Future Generation High Performance Processors and Systems, Oahu, Hawaii,USA, Jan. 2005
9Miklau G, Suciu D. Controlling Access to Published Data Using Cryptography. In: VLDB, 2003
10Hacigumus H,Iyer B,Mehrotra S, Providing Database as a Service. In:Proc. of ICDE, 2002