What Can Database Do for Peer-to-Peer?, Proc. of WebDB, 2001. ,
A research agenda for query processing in large-scale peer data management systems, Information Systems, vol.33, issue.7-8, pp.7-8, 2008. ,
DOI : 10.1016/j.is.2008.01.012
Distributed databases and peer-to-peer databases, ACM SIGMOD Record, vol.37, issue.1, pp.5-11, 2008. ,
DOI : 10.1145/1374780.1374781
Peer-to-peer access control architecture using trusted computing technology, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, 2005. ,
DOI : 10.1145/1063979.1064005
Oceanstore: an architecture for global-scale persistent storage. SIGPLAN Not, pp.35-190, 2000. ,
Plutus: Scalable secure file sharing on untrusted storage, Proc. of FAST, 2003. ,
Distributed Privilege Enforcement in PACS, In: DBSec, vol.13, issue.2, pp.142-158, 2009. ,
DOI : 10.1007/s001459910011
Controlling Access to Published Data Using Cryptography, Proc. of VLDB, 2003. ,
DOI : 10.1016/B978-012722442-8/50084-7
Securing XML Documents, Proc. of EDBT, 2000. ,
DOI : 10.1007/3-540-46439-5_8
Cryptographic access control in a distributed file system, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, 2003. ,
DOI : 10.1145/775412.775432
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Conjunctive query containment revisited, Proceedings of ICDT, pp.56-70, 1998. ,
DOI : 10.1016/s0304-3975(99)00220-0
URL : http://doi.org/10.1016/s0304-3975(99)00220-0
Optimal implementation of conjunctive queries in relational databases, Proc. of STC, 1977. ,
Subtree-elimination algorithms in deductive databases, 1991. ,
Ubiquitous and robust authentication services for ad hoc wireless networks, 2000. ,
Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis, EURASIP Journal on Wireless Communications and Networking, vol.2005, issue.4, pp.579-589, 2005. ,
DOI : 10.1155/WCN.2005.579
Cryptree: A Folder Tree Structure for Cryptographic File Systems, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06), pp.189-198, 2006. ,
DOI : 10.1109/SRDS.2006.15
Access control and signatures via quorum secret sharing, IEEE TPDS, vol.9, issue.9, pp.909-922, 1998. ,
DOI : 10.1145/238168.238209
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.135.9046
A survey on peer-to-peer key management for mobile ad hoc networks, ACM Computing Surveys, vol.39, issue.1, 2007. ,
DOI : 10.1145/1216370.1216371
On replacing cryptographic keys in hierarchical key management systems, Journal of Computer Security, vol.16, issue.3, pp.289-309, 2008. ,
DOI : 10.3233/JCS-2008-16303
Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes, IEEE Transactions on Information Forensics and Security, vol.2, issue.2, pp.213-226, 2007. ,
DOI : 10.1109/TIFS.2007.897274
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios, Proceedings of SEC, 2009. ,
DOI : 10.1016/0020-0190(88)90099-3
Chord: A scalable peer-to-peer lookup service for internet applications, Proc. of SIGCOMM, 2001. ,
A scalable contentaddressable network, Proc. of SIGCOMM, 2001. ,
XACML Policy Integration Algorithms, ACM Transactions on Information and System Security, vol.11, issue.1, pp.1-29, 2008. ,
DOI : 10.1145/1330295.1330299
Secure XML querying with security views, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, 2004. ,
DOI : 10.1145/1007568.1007634
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.2679