. Authentica, Enterprise rights management for document protection, 2005.

. Microsoft, Technical overview of windows rights management services for windows server, 2003.

M. C. Mont, S. Pearson, and P. Bramhall, Towards accountable management of identity and privacy: sticky policies and enforceable tracing services, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings., pp.377-382, 2003.
DOI : 10.1109/DEXA.2003.1232051

J. Park, R. S. Sandhu, and J. Schifalacqua, Security architectures for controlled digital information dissemination, 16th An. Computer Security Applications Conf. (ACSAC), p.224, 2000.

A. Pretschner, M. Hilty, and D. A. Basin, Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006.
DOI : 10.1145/1151030.1151053

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.3191

J. Park and R. S. Sandhu, usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004.
DOI : 10.1145/984334.984339

D. E. Bell and L. J. Lapadula, Secure computer systems: Mathematical foundations The Mitre Corp, 1973.

I. Papagiannis, M. Migliavacca, P. R. Pietzuch, B. Shand, D. M. Eyers et al., PrivateFlow, Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, DEBS '09, 2009.
DOI : 10.1145/1619258.1619306

S. Vandebogart, P. Efstathopoulos, E. Kohler, M. N. Krohn, C. Frey et al., Mazì eres, D.: Labels and event processes in the Asbestos operating system, ACM Trans. Comput. Syst, vol.25, issue.4, 2007.

R. Iannella, Open Digital Rights Language (ODRL), Version 1.1. W3c note, World Wide Web Consortium, 2002.

P. Ashley, S. Hada, G. Karjoth, C. Powers, and M. Schunter, The enterprise privacy authorization language (epal 1.1) (2003) Reader's Guide to the Documentation

H. Fan, Tracing Data Lineage Using Automed Schema Transformation Pathways, In: BNCOD, pp.50-53, 2002.
DOI : 10.1007/3-540-45495-0_6

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.144.3092

H. Fan, Data Lineage Tracing in Data Warehousing Environments, In: BNCOD, pp.25-36, 2007.
DOI : 10.1007/978-3-540-73390-4_4

H. Fan and A. Poulovassilis, Using Schema Transformation Pathways for Data Lineage Tracing, In: BNCOD, pp.133-144, 2005.
DOI : 10.1007/11511854_11

V. Atluri and A. Gal, An authorization model for temporal and derived data: securing information portals, ACM Transactions on Information and System Security, vol.5, issue.1, pp.62-94, 2002.
DOI : 10.1145/504909.504912

A. C. Myers and B. Liskov, Protecting privacy using the decentralized label model, ACM Transactions on Software Engineering and Methodology, vol.9, issue.4, pp.410-442, 2000.
DOI : 10.1145/363516.363526

A. Sabelfeld and D. Sands, Declassification: Dimensions and principles, Proceedings of the 18th IEEE Workshop on Computer Security Foundations (CSFW05, pp.255-269, 2005.

A. Lux and H. Mantel, Declassification with Explicit Reference Points, In: ESORICS, vol.9, issue.4, pp.69-85, 2009.
DOI : 10.1145/363516.363526

E. Bertino, S. Castano, and E. Ferrari, Securing XML documents with Author-X, IEEE Internet Computing, vol.5, issue.3, pp.21-31, 2001.
DOI : 10.1109/4236.935172

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. Samarati, A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, pp.169-202, 2002.
DOI : 10.1145/505586.505590