1. Agrawal, R., Kiernan, J., Srikant, R., & Xu, Y. (2002). Hippocratic Databases. Proceedings of VLDB’02 (pp. 143-154).
2. Alhaqbani, B., & Fidge, C. J. (2007). Access Control Requirements for Processing Electronic Health Records Business. In Process Management Workshops, (pp. 371-382).
3. Anciaux, N., Benzine, M., Bouganim, L., Pucheral, P., & Shasha, D. (2007). GhostDB: querying visible and hidden data without leaks. In ACM SIGMOD Conference (pp. 677-688).
4. Anciaux, N., Bobineau, C., Bouganim, L., Pucheral, P., & Valduriez, P. (2001). PicoDBMS: Validation and Experience. In International Conference on Very Large Data Bases (VLDB) (pp. 709-710).
5. Data Confidentiality: to which extent cryptography and secured hardware can help.;N.Anciaux;Annales des Télécommunications,2006