G. Aggarwal, M. Bawa, P. Ganesan, H. Garcia-molina, K. Kenthapadi et al., Two can keep A secret: A distributed architecture for secure database services, CIDR, pp.186-199, 2005.

R. Agrawal, D. Asonov, M. Kantarcioglu, and Y. Li, Sovereign Joins, 22nd International Conference on Data Engineering (ICDE'06), p.26, 2006.
DOI : 10.1109/ICDE.2006.144

P. A. Bernstein, N. Goodman, E. Wong, C. L. Reeve, J. B. Rothnie et al., Query processing in a system for distributed databases (SDD-1), ACM Transactions on Database Systems, vol.6, issue.4, pp.602-625, 1981.
DOI : 10.1145/319628.319650

A. Caì-i and D. Martinenghi, Querying data under access limitations, Proceedings of the 24th International Conference on Data Engineering, pp.50-59, 2008.

S. Chaudhuri, An overview of query optimization in relational systems, Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems , PODS '98, pp.34-43, 1998.
DOI : 10.1145/275487.275492

V. Ciriani, S. D. Di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi et al., Keep a Few: Outsourcing Data While Maintaining Confidentiality, ESORICS, pp.440-455, 2009.
DOI : 10.1145/1994.2209

S. De-capitani-di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, Controlled information sharing in collaborative distributed query processing, ICDCS, 2008.

S. D. Di-vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, Authorization enforcement in distributed query evaluation*, Journal of Computer Security, vol.19, issue.4, pp.751-794, 2011.
DOI : 10.3233/JCS-2010-0413

J. Goldstein and P. Larson, Optimizing queries using materialized views: a practical , scalable solution, Proceedings of the 2001 ACM SIGMOD international conference on Management of data, pp.331-342

A. Y. Halevy, Answering queries using views: A survey, The VLDB Journal, vol.10, issue.4, pp.270-294, 2001.
DOI : 10.1007/s007780100054

D. Kossmann, The state of the art in distributed query processing, ACM Computing Surveys, vol.32, issue.4, pp.422-469, 2000.
DOI : 10.1145/371578.371598

M. Le, K. Kant, and S. Jajodia, Access Rule Consistency in Cooperative Data Access Environment, Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.11-20
DOI : 10.4108/icst.collaboratecom.2012.250467

M. Le, K. Kant, and S. Jajodia, Consistency and enforcement of access rules in cooperative data sharing environment, Computers and Security, 2013.
DOI : 10.1016/j.cose.2013.08.011

M. Le, K. Kant, and S. Jajodia, Rule Enforcement with Third Parties in Secure Cooperative Data Access, 27th Data and Applications Security and Privacy, 2013.
DOI : 10.1007/978-3-642-39256-6_20

URL : https://hal.archives-ouvertes.fr/hal-01490712

C. Li, Computing complete answers to queries in the presence of limited access patterns, The VLDB Journal The International Journal on Very Large Data Bases, vol.12, issue.3, pp.211-227, 2003.
DOI : 10.1007/s00778-002-0085-6

R. Pottinger and A. Y. Halevy, Minicon: A scalable algorithm for answering queries using views, VLDB J, vol.10, issue.2-3, pp.182-198, 2001.

S. Rizvi, A. Mendelzon, S. Sudarshan, and P. Roy, Extending query rewriting techniques for fine-grained access control, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, 2004.
DOI : 10.1145/1007568.1007631

R. Sion, Query execution assurance for outsourced databases, VLDB, pp.601-612, 2005.