R. Alur and P. Madhusudan, Visibly pushdown languages, Proceedings of the thirty-sixth annual ACM symposium on Theory of computing , STOC '04, pp.202-211, 2004.
DOI : 10.1145/1007352.1007390

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.3757

M. Benedikt and I. Fundulaki, XML Subtree Queries:??Specification and Composition, International Symposium on Database Programming Languages (DBPL), pp.138-153, 2005.
DOI : 10.1007/11601524_9

P. Blackburn, Y. Maarten-de-rijke, and . Venema, Modal logic, 2001.
DOI : 10.1017/CBO9781107050884

URL : https://hal.archives-ouvertes.fr/inria-00100502

P. Bohannon, W. Fan, M. Flaster, and P. P. Narayan, Information preserving XML Schema embedding, VLDB, pp.85-96, 2005.

A. R. Büchi, Weak Second-Order Arithmetic and Finite Automata, Zeitschrift f??r Mathematische Logik und Grundlagen der Mathematik, vol.9, issue.1-6, pp.66-92, 1960.
DOI : 10.1002/malq.19600060105

D. Calvanese, G. De-giacomo, M. Lenzerini, and M. Y. Vardi, An automatatheoretic approach to regular XPath, DBPL, pp.18-35, 2009.

. Vardi, Rewriting of regular expressions and regular path queries, J. Comput . Syst. Sci, vol.64, issue.3, pp.443-465, 2002.

D. Calvanese, G. D. Giacomo, M. Lenzerini, and M. Y. Vardi, View-based query processing: On the relationship between rewriting, answering and losslessness, Theoretical Computer Science, vol.371, issue.3, pp.169-182, 2007.
DOI : 10.1016/j.tcs.2006.11.006

D. Calvanese, G. D. Giacomo, M. Lenzerini, and M. Y. Vardi, An Automata-Theoretic Approach to Regular XPath, Lecture Notes in Computer Science, vol.98, issue.2, pp.18-35, 2009.
DOI : 10.1007/3-540-46093-4_3

B. Cautis, A. Deutsch, N. Onose, and V. Vassalos, Efficient rewriting of XPath queries using Query Set Specifications, Proceedings of the VLDB Endowment, vol.2, issue.1, pp.301-312, 2009.
DOI : 10.14778/1687627.1687662

H. Comon, M. Dauchet, R. Gilleron, C. Löding, F. Jacquemard et al., Available online since, 1997.

W. Fan, C. Chan, and M. N. Garofalakis, Secure XML querying with security views, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.587-598, 2004.
DOI : 10.1145/1007568.1007634

W. Fan, F. Geerts, X. Jia, and A. Kementsietsidis, SMOQE: A system for providing secure access to XML, International Conference on Very Large Data Bases (VLDB), pp.1227-1230, 2006.

W. Fan, F. Geerts, X. Jia, and A. Kementsietsidis, Rewriting Regular XPath Queries on XML Views, 2007 IEEE 23rd International Conference on Data Engineering, pp.666-675, 2007.
DOI : 10.1109/ICDE.2007.367912

B. Finance, S. Medjdoub, and P. Pucheral, The case for access control on XML relationships, Proceedings of the 14th ACM international conference on Information and knowledge management , CIKM '05, pp.107-114, 2005.
DOI : 10.1145/1099554.1099576

URL : https://hal.archives-ouvertes.fr/hal-00489266

E. M. Gurari and O. Ibarra, The complexity of decision problems for finite-turn multicounter machines, Journal of Computer and System Sciences, vol.22, issue.2, pp.220-229, 1981.
DOI : 10.1016/0022-0000(81)90028-3

E. M. Gurari and O. Ibarra, A note on finite-valued and finitely ambiguous transducers, Mathematical Systems Theory, vol.4, issue.1, pp.61-66, 1983.
DOI : 10.1007/BF01744569

G. Kuper, F. Massacci, and N. Rassadko, Generalized XML security views, SACMAT '05: Proceedings of the tenth ACM Symposium on Access Control Models and Technologies, pp.77-84, 2005.
DOI : 10.1145/1063979.1063994

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.8168

L. Libkin and C. Sirangelo, Reasoning about XML with temporal logics and automata, International Conference on Logic for Programming, Artificial Intelligence, and Reasoning (LPAR), pp.97-112

L. Libkin and C. Sirangelo, Reasoning about XML with temporal logics and automata, Journal of Applied Logic, vol.8, issue.2, pp.210-232, 2010.
DOI : 10.1016/j.jal.2009.09.005

M. Lohrey, COMPRESSED MEMBERSHIP PROBLEMS FOR REGULAR EXPRESSIONS AND HIERARCHICAL AUTOMATA, International Journal of Foundations of Computer Science, vol.21, issue.05, pp.817-841, 2010.
DOI : 10.1142/S012905411000757X

M. Marx, XPath with Conditional Axis Relations, International Conference on Extending Database Technology (EDBT), pp.477-494, 2004.
DOI : 10.1007/978-3-540-24741-8_28

M. Murata, A. Tozawa, M. Kudo, and S. Hada, XML access control using static analysis, ACM Transactions on Information and System Security, vol.9, issue.3, pp.292-324, 2006.
DOI : 10.1145/1178618.1178621

A. Nash, L. Segoufin, and V. Vianu, Views and queries, ACM Transactions on Database Systems, vol.35, issue.3, 2010.
DOI : 10.1145/1806907.1806913

W. Plandowski, Testing equivalence of morphisms on context-free languages, ESA, pp.460-470, 1994.
DOI : 10.1007/BFb0049431

N. Rassadko, Policy Classes and Query Rewriting Algorithm for XML Security Views, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), pp.104-118, 2006.
DOI : 10.1007/3-540-36285-1_6

N. Rassadko, Query Rewriting Algorithm Evaluation for XML Security Views, Secure Data Management, pp.64-80, 2007.
DOI : 10.1007/978-3-540-75248-6_5

A. Stoica and C. Farkas, Secure XML Views, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security of Research Directions in Data and Applications Security, pp.133-146, 2002.
DOI : 10.1007/978-0-387-35697-6_11

T. G. Szymanski and J. H. Williams, Non-canonical parsing, 14th Annual Symposium on Switching and Automata Theory (swat 1973), pp.122-129, 1973.
DOI : 10.1109/SWAT.1973.16

B. Cate and L. Segoufin, Transitive closure logic, and nested tree walking automata, and Xpath, ACM Symposium on Principles of Database Systems (PODS), pp.251-260, 2008.
DOI : 10.1145/1706591.1706598

C. Balder-ten, The expressivity of XPath with transitive closure, PODS, pp.328-337, 2006.

J. W. Thatcher and W. J. , Generalized finite automata theory with an application to a decision problem of second-order logic, Mathematical System Theory, pp.57-82, 1968.
DOI : 10.1007/BF01691346

R. Vercammen, J. Hidders, and J. Paredaens, Query Translation for XPath-Based Security Views, EDBT Workshops, pp.250-263, 2006.
DOI : 10.1007/11896548_22