1. Barnes R. Database Security and Auditing: Leading Practices. Enterprise Auditing Solutions Applications Security; 2011. Băjenescu T.I.Progresele informaticii, criptografiei şi telecomunicaţiilor în secolul 20. Bucureşti. Editura Matrix Rom;2003.
2. Crampton J. Cryptographically-enforced hierarchical access control with multiple keys. The Journal of Logic and Algebraic Programming 78.; 2009, pag. 690-700.
3. Fusaru D. Arhitectura bazelor de date. Mediul SQL, Editura Fundaţiei România de Mâine, Bucureşti. 2002.
4. Hicks J., Criptography in SQL Server. http://msdn.microsoft.com/enus/library/cc837966%28v=sql.100%29.aspx. 2008.
5. Hsueh S. Database encryption in SQL Server 2008 Enterprise Edition. http://msdn.microsoft.com/enus/library/cc278098(v=sql.100).aspx; 2008.