Enterprise rights management for document protection, 2005. ,
Technical overview of windows rights management services for windows server, 2003. ,
Towards accountable management of identity and privacy: sticky policies and enforceable tracing services, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings., pp.377-382, 2003. ,
DOI : 10.1109/DEXA.2003.1232051
Security architectures for controlled digital information dissemination, 16th An. Computer Security Applications Conf. (ACSAC), p.224, 2000. ,
Distributed usage control, Communications of the ACM, vol.49, issue.9, pp.39-44, 2006. ,
DOI : 10.1145/1151030.1151053
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.3191
usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004. ,
DOI : 10.1145/984334.984339
Secure computer systems: Mathematical foundations The Mitre Corp, 1973. ,
PrivateFlow, Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, DEBS '09, 2009. ,
DOI : 10.1145/1619258.1619306
Mazì eres, D.: Labels and event processes in the Asbestos operating system, ACM Trans. Comput. Syst, vol.25, issue.4, 2007. ,
Open Digital Rights Language (ODRL), Version 1.1. W3c note, World Wide Web Consortium, 2002. ,
The enterprise privacy authorization language (epal 1.1) (2003) Reader's Guide to the Documentation ,
Tracing Data Lineage Using Automed Schema Transformation Pathways, In: BNCOD, pp.50-53, 2002. ,
DOI : 10.1007/3-540-45495-0_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.144.3092
Data Lineage Tracing in Data Warehousing Environments, In: BNCOD, pp.25-36, 2007. ,
DOI : 10.1007/978-3-540-73390-4_4
Using Schema Transformation Pathways for Data Lineage Tracing, In: BNCOD, pp.133-144, 2005. ,
DOI : 10.1007/11511854_11
An authorization model for temporal and derived data: securing information portals, ACM Transactions on Information and System Security, vol.5, issue.1, pp.62-94, 2002. ,
DOI : 10.1145/504909.504912
Protecting privacy using the decentralized label model, ACM Transactions on Software Engineering and Methodology, vol.9, issue.4, pp.410-442, 2000. ,
DOI : 10.1145/363516.363526
Declassification: Dimensions and principles, Proceedings of the 18th IEEE Workshop on Computer Security Foundations (CSFW05, pp.255-269, 2005. ,
Declassification with Explicit Reference Points, In: ESORICS, vol.9, issue.4, pp.69-85, 2009. ,
DOI : 10.1145/363516.363526
Securing XML documents with Author-X, IEEE Internet Computing, vol.5, issue.3, pp.21-31, 2001. ,
DOI : 10.1109/4236.935172
A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, pp.169-202, 2002. ,
DOI : 10.1145/505586.505590