Visibly pushdown languages, Proceedings of the thirty-sixth annual ACM symposium on Theory of computing , STOC '04, pp.202-211, 2004. ,
DOI : 10.1145/1007352.1007390
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.3757
XML Subtree Queries:??Specification and Composition, International Symposium on Database Programming Languages (DBPL), pp.138-153, 2005. ,
DOI : 10.1007/11601524_9
Modal logic, 2001. ,
DOI : 10.1017/CBO9781107050884
URL : https://hal.archives-ouvertes.fr/inria-00100502
Information preserving XML Schema embedding, VLDB, pp.85-96, 2005. ,
Weak Second-Order Arithmetic and Finite Automata, Zeitschrift f??r Mathematische Logik und Grundlagen der Mathematik, vol.9, issue.1-6, pp.66-92, 1960. ,
DOI : 10.1002/malq.19600060105
An automatatheoretic approach to regular XPath, DBPL, pp.18-35, 2009. ,
Rewriting of regular expressions and regular path queries, J. Comput . Syst. Sci, vol.64, issue.3, pp.443-465, 2002. ,
View-based query processing: On the relationship between rewriting, answering and losslessness, Theoretical Computer Science, vol.371, issue.3, pp.169-182, 2007. ,
DOI : 10.1016/j.tcs.2006.11.006
An Automata-Theoretic Approach to Regular XPath, Lecture Notes in Computer Science, vol.98, issue.2, pp.18-35, 2009. ,
DOI : 10.1007/3-540-46093-4_3
Efficient rewriting of XPath queries using Query Set Specifications, Proceedings of the VLDB Endowment, vol.2, issue.1, pp.301-312, 2009. ,
DOI : 10.14778/1687627.1687662
Available online since, 1997. ,
Secure XML querying with security views, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.587-598, 2004. ,
DOI : 10.1145/1007568.1007634
SMOQE: A system for providing secure access to XML, International Conference on Very Large Data Bases (VLDB), pp.1227-1230, 2006. ,
Rewriting Regular XPath Queries on XML Views, 2007 IEEE 23rd International Conference on Data Engineering, pp.666-675, 2007. ,
DOI : 10.1109/ICDE.2007.367912
The case for access control on XML relationships, Proceedings of the 14th ACM international conference on Information and knowledge management , CIKM '05, pp.107-114, 2005. ,
DOI : 10.1145/1099554.1099576
URL : https://hal.archives-ouvertes.fr/hal-00489266
The complexity of decision problems for finite-turn multicounter machines, Journal of Computer and System Sciences, vol.22, issue.2, pp.220-229, 1981. ,
DOI : 10.1016/0022-0000(81)90028-3
A note on finite-valued and finitely ambiguous transducers, Mathematical Systems Theory, vol.4, issue.1, pp.61-66, 1983. ,
DOI : 10.1007/BF01744569
Generalized XML security views, SACMAT '05: Proceedings of the tenth ACM Symposium on Access Control Models and Technologies, pp.77-84, 2005. ,
DOI : 10.1145/1063979.1063994
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.8168
Reasoning about XML with temporal logics and automata, International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR), pp.97-112 ,
Reasoning about XML with temporal logics and automata, Journal of Applied Logic, vol.8, issue.2, pp.210-232, 2010. ,
DOI : 10.1016/j.jal.2009.09.005
COMPRESSED MEMBERSHIP PROBLEMS FOR REGULAR EXPRESSIONS AND HIERARCHICAL AUTOMATA, International Journal of Foundations of Computer Science, vol.21, issue.05, pp.817-841, 2010. ,
DOI : 10.1142/S012905411000757X
XPath with Conditional Axis Relations, International Conference on Extending Database Technology (EDBT), pp.477-494, 2004. ,
DOI : 10.1007/978-3-540-24741-8_28
XML access control using static analysis, ACM Transactions on Information and System Security, vol.9, issue.3, pp.292-324, 2006. ,
DOI : 10.1145/1178618.1178621
Views and queries, ACM Transactions on Database Systems, vol.35, issue.3, 2010. ,
DOI : 10.1145/1806907.1806913
Testing equivalence of morphisms on context-free languages, ESA, pp.460-470, 1994. ,
DOI : 10.1007/BFb0049431
Policy Classes and Query Rewriting Algorithm for XML Security Views, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), pp.104-118, 2006. ,
DOI : 10.1007/3-540-36285-1_6
Query Rewriting Algorithm Evaluation for XML Security Views, Secure Data Management, pp.64-80, 2007. ,
DOI : 10.1007/978-3-540-75248-6_5
Secure XML Views, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security of Research Directions in Data and Applications Security, pp.133-146, 2002. ,
DOI : 10.1007/978-0-387-35697-6_11
Non-canonical parsing, 14th Annual Symposium on Switching and Automata Theory (swat 1973), pp.122-129, 1973. ,
DOI : 10.1109/SWAT.1973.16
Transitive closure logic, and nested tree walking automata, and Xpath, ACM Symposium on Principles of Database Systems (PODS), pp.251-260, 2008. ,
DOI : 10.1145/1706591.1706598
The expressivity of XPath with transitive closure, PODS, pp.328-337, 2006. ,
Generalized finite automata theory with an application to a decision problem of second-order logic, Mathematical System Theory, pp.57-82, 1968. ,
DOI : 10.1007/BF01691346
Query Translation for XPath-Based Security Views, EDBT Workshops, pp.250-263, 2006. ,
DOI : 10.1007/11896548_22