A calculus for access control in distributed systems, ACM Transactions on Programming Languages and Systems, vol.15, issue.4, pp.706-734, 1993. ,
DOI : 10.1145/155183.155225
A rule-based language for web data management, Proceedings of the 30th symposium on Principles of database systems of data, PODS '11, 2011. ,
DOI : 10.1145/1989284.1989320
URL : https://hal.archives-ouvertes.fr/inria-00582891
A model for web information management with access control, WebDB Workshop, 2011. ,
Foundations of Databases, 1995. ,
Consistency analysis in bloom: a calm and collected approach, CIDR, pp.249-260, 2011. ,
Dedalus: Datalog in Time and Space, 2009. ,
DOI : 10.1007/978-3-642-24206-9_16
Provenance for aggregate queries, Proceedings of the 30th symposium on Principles of database systems of data, PODS '11, 2011. ,
DOI : 10.1145/1989284.1989302
URL : http://arxiv.org/abs/1101.1110
Distributed data management with the rule-based language: WebdamLog, 2013. ,
URL : https://hal.archives-ouvertes.fr/tel-00908155
Transaction datalog: A compositional language for transaction programming, Proceedings of the International Workshop on Database Programming Languages, 1997. ,
DOI : 10.1007/3-540-64823-2_21
A semantic web based framework for social network access control, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.177-186, 2009. ,
DOI : 10.1145/1542207.1542237
Semantic web-based social network access control. Computers &, pp.30108-115, 2011. ,
DOI : 10.1016/j.cose.2010.08.003
Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, pp.646-655, 2012. ,
DOI : 10.1109/SocialCom-PASSAT.2012.57
Access Control in Data Management Systems. Synthesis Lectures on Data Management, 2010. ,
Provenance semirings, Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '07, pp.31-40, 2007. ,
DOI : 10.1145/1265530.1265535
Multiparty access control for online social networks: model and mechanisms. Knowledge and Data Engineering, IEEE Transactions on, vol.25, issue.7, pp.1614-1627, 2013. ,
Limiting disclosure in hippocratic databases A formal framework for reflective database access control policies, VLDB '04: Proceedings of the Thirtieth international conference on Very large data bases ACM Conference on Computer and Communications Security, pp.108-119, 2004. ,
Principles of Distributed Database Systems, 2011. ,
A provenance-based access control model, 2012 Tenth Annual International Conference on Privacy, Security and Trust, pp.137-144, 2012. ,
DOI : 10.1109/PST.2012.6297930
Bloom programming language ,
Extending query rewriting techniques for fine-grained access control, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.551-562, 2004. ,
DOI : 10.1145/1007568.1007631
Access control for online social networks third party applications. computers &, pp.31897-911, 2012. ,
On the correctness criteria of fine-grained access control in relational databases, Conference on Very Large Data Bases, pp.555-566, 2007. ,