R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Hippocratic Databases, 28th International Conference on Very Large Databases, pp.143-154, 2002.
DOI : 10.1016/B978-155860869-6/50021-4

R. Agrawal, P. Bird, T. Grandison, J. Kiernan, S. Logan et al., Extending Relational Database Systems to Automatically Enforce Privacy Policies, 21st International Conference on Data Engineering (ICDE'05), pp.1013-1022, 2005.
DOI : 10.1109/ICDE.2005.64

S. S. Al-fedaghi, Beyond Purpose-based privacy access control, 18th Australian Database Conference, pp.23-32, 2007.

S. Barker and P. N. Stuckey, Flexible access control policy specification with constraint logic programming, ACM Transactions on Information and System Security, vol.6, issue.4, pp.501-546, 2003.
DOI : 10.1145/950191.950194

E. Bertino, S. Jajodia, and P. Samarati, Data-base security: Research and practice. Information systems, pp.537-556, 1995.

J. W. Byun, E. Bertino, and N. Li, Purpose based access control of complex data for privacy protection, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, pp.102-110, 2005.
DOI : 10.1145/1063979.1063998

J. W. Byun, E. Bertino, and N. Li, Purpose based access control for privacy protection in relational database systems, The VLDB Journal, vol.29, issue.2, pp.603-619, 2008.
DOI : 10.1007/s00778-006-0023-0

D. Denning, T. Lunt, R. Schell, W. Shockley, and M. Heckman, The SeaView security model, Proceedings. 1988 IEEE Symposium on Security and Privacy, pp.218-233, 1988.
DOI : 10.1109/SECPRI.1988.8114

F. Research, Privacy concerns cost e-commerce $15 billion, 2001.

M. E. Kabir and H. Wang, Conditional Purpose Based Access Control Model for Privacy Protection, 20th Australisian Database Conference, pp.137-144, 2009.

K. Lefevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu et al., Disclosure in Hippocratic databases, 30th International Conference on Very Large Databases, pp.108-119, 2004.

M. Marchiori, The platform for privacy preferences 1.0 (P3P1.0) specification, p.3, 2002.

F. Massacci, J. Mylopoulos, and N. Zannone, Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation, 10th Europran Symposium on Research in Computer Security, pp.438-454, 2005.
DOI : 10.1007/11555827_25

S. Rizvi, A. O. Mendelzon, S. Sudarshan, and P. Roy, Extending query rewriting techniques for fine-grained access control, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.551-562, 2004.
DOI : 10.1145/1007568.1007631

C. S. Powers, P. Ashley, and M. Schunter, Privacy promises, access control, and privacy management, 3rd International Symposium on Electronic Commerce, pp.13-21, 2002.

R. Sandhu and S. Jajodia, Toward a multilevel secure relational data model, ACM Transactional Conference on Management of Data, pp.50-59, 1991.

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.
DOI : 10.1109/2.485845

R. Sandhu and F. Chen, The multilevel relational (MLR) data model, ACM Transactions on Information and System Security, vol.1, issue.1, pp.93-132, 1998.
DOI : 10.1145/290163.290171

N. Yang, H. Barringer, and N. Zhang, A Purpose-Based Access Control Model, 3rd International Symposium on Information Assurance and Security, pp.143-148, 2007.

H. Peng, J. Gu, and X. Ye, Dynamic Purpose-Based Access Control, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications, pp.695-700, 2008.
DOI : 10.1109/ISPA.2008.80

P. C. Hung, Towards a Privacy Access Control Model for e-Healthcare Services, Third Annual Conference on Privacy, Security and Trust, 2005.