5Mykletun E, Narasimha M, Tsudik G. Authentication and in- tegrity in outsourced databases. ACM Trans. on Storage, 2006, 2 (2) : 107-138.
6Shmueli E, Waisenberg R, Elovici Y, Gudes E. Designing se- cure indexes for encrypted databases. In: Proc. of the IFIP Conf. on Database and Applications Security. LNCS 3654, Heidelberg, Berlin: Springer-Verlag, 2005: 54-68.
7ESTRIND,TSUDIK G .Visa scheme for inter2 organization net work security [ C ] //Proc of the 1987 Symposium on Secu- rity and Privacy. New York: IEEE, 1987:174 - 183.
8Emekci F, Agrawal D, Abbadi AE, Gulbeden A. Privacy pre- serving query processing using third parties. In: Barga RS, Zhou XF, eds. Proc. of the Int'l Conf. on Data Engineering. Washington: IEEE Computer Society Press, 2006, 27.