D. Steven, Y. Gribble-and-alon, Z. G. Halevy, M. Ives, D. Rodrigand et al., What Can Database Do for Peer-to-Peer?, Proc. of WebDB, 2001.

K. Hose, A. Roth, A. Zeitz, K. U. Sattler, and F. Naumann, A research agenda for query processing in large-scale peer data management systems, Information Systems, vol.33, issue.7-8, pp.7-8, 2008.
DOI : 10.1016/j.is.2008.01.012

A. Bonifati, P. K. Chrysanthis, A. M. Ouksel, and K. U. Sattler, Distributed databases and peer-to-peer databases, ACM SIGMOD Record, vol.37, issue.1, pp.5-11, 2008.
DOI : 10.1145/1374780.1374781

R. Sandhu and X. Zhang, Peer-to-peer access control architecture using trusted computing technology, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, 2005.
DOI : 10.1145/1063979.1064005

J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton et al., Oceanstore: an architecture for global-scale persistent storage. SIGPLAN Not, pp.35-190, 2000.

M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu, Plutus: Scalable secure file sharing on untrusted storage, Proc. of FAST, 2003.

C. Sturm, E. Hunt, and M. H. Scholl, Distributed Privilege Enforcement in PACS, In: DBSec, vol.13, issue.2, pp.142-158, 2009.
DOI : 10.1007/s001459910011

G. Miklau and D. Suciu, Controlling Access to Published Data Using Cryptography, Proc. of VLDB, 2003.
DOI : 10.1016/B978-012722442-8/50084-7

E. Damiani, S. D. Di-vimercati, S. Paraboschi, and P. Sarnarati, Securing XML Documents, Proc. of EDBT, 2000.
DOI : 10.1007/3-540-46439-5_8

A. Harrington and C. Jensen, Cryptographic access control in a distributed file system, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, 2003.
DOI : 10.1145/775412.775432

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

C. Chekuri and A. Rajaraman, Conjunctive query containment revisited, Proceedings of ICDT, pp.56-70, 1998.
DOI : 10.1016/s0304-3975(99)00220-0

URL : http://doi.org/10.1016/s0304-3975(99)00220-0

A. K. Chandra and P. M. Merlin, Optimal implementation of conjunctive queries in relational databases, Proc. of STC, 1977.

Y. P. Saraiya, Subtree-elimination algorithms in deductive databases, 1991.

H. Luo and S. Lu, Ubiquitous and robust authentication services for ad hoc wireless networks, 2000.

D. Joshi, K. Namuduri, and R. Pendse, Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis, EURASIP Journal on Wireless Communications and Networking, vol.2005, issue.4, pp.579-589, 2005.
DOI : 10.1155/WCN.2005.579

D. Grolimund, L. Meisser, S. Schmid, and R. Wattenhofer, Cryptree: A Folder Tree Structure for Cryptographic File Systems, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06), pp.189-198, 2006.
DOI : 10.1109/SRDS.2006.15

M. Naor and A. Wool, Access control and signatures via quorum secret sharing, IEEE TPDS, vol.9, issue.9, pp.909-922, 1998.
DOI : 10.1145/238168.238209

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.135.9046

J. V. Merwe, D. Dawoud, and S. Mcdonald, A survey on peer-to-peer key management for mobile ad hoc networks, ACM Computing Surveys, vol.39, issue.1, 2007.
DOI : 10.1145/1216370.1216371

A. V. Kayem, S. G. Akl, and P. Martin, On replacing cryptographic keys in hierarchical key management systems, Journal of Computer Security, vol.16, issue.3, pp.289-309, 2008.
DOI : 10.3233/JCS-2008-16303

Y. L. Sun and K. J. Liu, Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes, IEEE Transactions on Information Forensics and Security, vol.2, issue.2, pp.213-226, 2007.
DOI : 10.1109/TIFS.2007.897274

C. Blundo, S. Cimato, S. D. Di-vimercati, A. D. Santis, S. Foresti et al., Efficient Key Management for Enforcing Access Control in Outsourced Scenarios, Proceedings of SEC, 2009.
DOI : 10.1016/0020-0190(88)90099-3

I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, Proc. of SIGCOMM, 2001.

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A scalable contentaddressable network, Proc. of SIGCOMM, 2001.

P. Mazzoleni, B. Crispo, S. Sivasubramanian, and E. Bertino, XACML Policy Integration Algorithms, ACM Transactions on Information and System Security, vol.11, issue.1, pp.1-29, 2008.
DOI : 10.1145/1330295.1330299

W. Fan, C. Chan, and M. G. , Secure XML querying with security views, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, 2004.
DOI : 10.1145/1007568.1007634

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.2679