4Rivest R L,Adleman L,Dertouzos M L.On Data Banks and Privacy Homomorphism[C]//In DeMillo R D.Foundations of Secure Computations.[s.l.]:Academic Press,1978:169-177.
5Domingo-Ferrer J.A New Privacy and Homomorphism Applications[J].Information Processing Letters,1996,60(5):277-282.
6Hacigumus H,Iyer B,Li C,et al.Executing SQL over Encrypted Data in the Database-Dervice-Provider Model[C]//In Proceedings SIGMOD 02,Madison,International Conference on Management of Data.Wisconsin,USA:[s.n.],2002:216-227.
7Fischmann M,Gunther O.Privacy Tradeoffs in Database Service Architectures[C]//In Proceedings of BIZSEC 03,the First ACM Workshop on Business Driven Security Engineering.Berlin,Germany:[s.n.],2003.
8Davida G I,Wells D H,Kam J H.A Database Encryption System with Subkeys[J].ACM Trans on Database Systems,1981(6):31-37.
9Hwang M-S,Yang W-P.Multilevel Secure Database Encryption with Subkeys[J].Data and Knowledge Engineering,1997,22(1):117-131.
10Agrawal R,Kiernan J.Watermarking Relational Databases[C]//In 28th Int'l Conference on Very Large Database.Hong Kong:[s.n.],2002.