R. Akbarinia, E. Pacitti, and P. Valduriez, Best position algorithms for efficient top-k query processing, Inf. Syst, vol.36, issue.6, pp.973-989, 2011.
URL : https://hal.archives-ouvertes.fr/lirmm-00607882

M. Barhamgi, A. K. Bandara, Y. Yu, K. Belhajjame, and B. Nuseibeh, Protecting privacy in the cloud: Current practices, future directions, IEEE Computer, vol.49, issue.2, pp.68-72, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01477714

H. Bast, D. Majumdar, R. Schenkel, M. Theobald, and G. Weikum, Io-top-k: Indexaccess optimized top-k query processing, Proc. of International Conference on Very Large Databases (VLDB), pp.475-486, 2006.

P. Cao and Z. Wang, Efficient top-k query calculation in distributed networks, Proc. of ACM PODC, pp.206-215, 2004.

Y. Chang and M. Mitzenmacher, Privacy preserving keyword searches on remote encrypted data, ACNS. pp, pp.442-455, 2005.

S. Choi, G. Ghinita, H. Lim, and E. Bertino, Secure knn query processing in untrusted cloud environments, IEEE TKDE, vol.26, issue.11, pp.2818-2831, 2014.

E. Ciceri, P. Fraternali, D. Martinenghi, and M. Tagliasacchi, Crowdsourcing for top-k query processing over uncertain data, IEEE TKDE, vol.28, issue.1, pp.41-53, 2016.

G. Das, D. Gunopulos, N. Koudas, and D. Tsirogiannis, Answering top-k queries using views, Proc. of International Conference on Very Large Databases (VLDB), pp.451-462, 2006.

I. Demertzis, S. Papadopoulos, O. Papapetrou, A. Deligiannakis, and M. N. Garofalakis, Practical private range search revisited, Proceedings of the 2016 International Conference on Management of Data, SIGMOD Conference, pp.185-198, 2016.

X. Ding, P. Liu, and H. Jin, Privacy-preserving multi-keyword top-k similarity search over encrypted data, IEEE TDSC, issue.99, pp.1-14, 2017.

M. Dylla, I. Miliaraki, and M. Theobald, Top-k query processing in probabilistic databases with non-materialized views, Proc. of IEEE International Conference on Data Engineering (ICDE), pp.122-133, 2013.

Y. Elmehdwi, B. K. Samanthula, and W. Jiang, Secure k-nearest neighbor query over encrypted data in outsourced environments, Proc. of IEEE ICDE, pp.664-675, 2014.

R. Fagin, A. Lotem, and M. Naor, Optimal aggregation algorithms for middleware, Proc. of ACM PODS, 2001.

R. Fagin, A. Lotem, and M. Naor, Optimal aggregation algorithms for middleware, J. Comput. Syst. Sci, vol.66, issue.4, pp.614-656, 2003.

C. Gentry, Fully homomorphic encryption using ideal lattices, ACM STOC, pp.169-178, 2009.

M. Gupta, J. Gao, X. Yan, H. Cam, and J. Han, Top-k interesting subgraph discovery in information networks, IEEE ICDE, pp.820-831, 2014.

B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, Secure multidimensional range queries over outsourced data, J. VLDB, vol.21, issue.3, pp.333-358, 2012.

B. Hore, S. Mehrotra, and G. Tsudik, A privacy-preserving index for range queries, Proc. of International Conference on Very Large Databases (VLDB), pp.720-731, 2004.

S. Khemmarat and L. Gao, Fast top-k path-based relevance query on massive graphs, Proc. of IEEE International Conference on Data Engineering (ICDE), pp.316-327, 2014.

H. Kim, H. Kim, and J. Chang, A privacy-preserving top-k query processing algorithm in the cloud computing, Economics of Grids, Clouds, Systems, and Services (GECON), pp.277-292, 2016.

R. Li, A. X. Liu, A. L. Wang, and B. Bruhadeshwar, Fast range query processing with strong privacy protection for cloud computing, PVLDB, vol.7, issue.14, pp.1953-1964, 2014.

X. Liao and J. Li, Privacy-preserving and secure top-k query in two-tier wireless sensor network, Global Communications Conference (GLOBECOM), pp.335-341, 2012.

S. Mahboubi, R. Akbarinia, and P. Valduriez, Privacy-preserving top-k query processing in distributed systems, 24th International Conference on Parallel and Distributed Computing, pp.281-292, 2018.
URL : https://hal.archives-ouvertes.fr/lirmm-01886160

M. Naveed, S. Kamara, and C. V. Wright, Inference attacks on property-preserving encrypted databases, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.644-655, 2015.

J. Pilourdault, V. Leroy, and S. Amer-yahia, Distributed evaluation of top-k temporal joins, pp.1027-1039, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01266188

R. A. Popa, C. M. Redfield, N. Zeldovich, and H. Balakrishnan, Cryptdb: processing queries on an encrypted database, Commun. ACM, vol.55, issue.9, pp.103-111, 2012.

C. Sahin, T. Allard, R. Akbarinia, A. E. Abbadi, and E. Pacitti, A differentially private index for range query processing in clouds, ICDE Conf, 2018.
URL : https://hal.archives-ouvertes.fr/lirmm-01886725

Z. Shen, M. A. Cheema, X. Lin, W. Zhang, and H. Wang, Efficiently monitoring top-k pairs over sliding windows, Proc. of IEEE International Conference on Data Engineering (ICDE), pp.798-809, 2012.

J. Shi, D. Wu, and N. Mamoulis, Top-k relevant semantic place retrieval on spatial RDF data, pp.1977-1990, 2016.

M. A. Soliman, I. F. Ilyas, and K. C. Chang, Top-k query processing in uncertain databases, Proc. of IEEE International Conference on Data Engineering (ICDE), pp.896-905, 2007.

D. X. Song, D. Wagner, and A. Perrig, Practical techniques for searches on encrypted data, IEEE S&P, pp.44-55, 2000.

U. , L. H. Mamoulis, N. Berberich, K. Bedathur, and S. J. , Durable top-k search in document archives, Proc. of ACM International Conference on Management of Data (SIGMOD), pp.555-566, 2010.

J. Vaidya and C. Clifton, Privacy-preserving top-k queries, Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on, pp.545-546, 2005.

J. Wang, G. Li, D. Deng, Y. Zhang, and J. Feng, Two birds with one stone: An efficient hierarchical framework for top-k and threshold-based string similarity search, Proc. of IEEE International Conference on Data Engineering (ICDE), pp.519-530, 2015.

X. Wang, Y. Zhang, W. Zhang, X. Lin, and Z. Huang, SKYPE: top-k spatialkeyword publish/subscribe over sliding window, PVLDB, vol.9, issue.7, pp.588-599, 2016.

W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, Secure knn computation on encrypted databases, ACM SIGMOD, pp.139-152, 2009.

H. Z. Xianrui-meng and G. Kollios, Top-k query processing on encrypted databases with strong security guarantees, ICDE Conf, 2018.

H. Yang, C. Chung, and M. Kim, An efficient top-k query processing framework in mobile sensor networks, Data Knowl. Eng, vol.102, pp.78-95, 2016.