Two can keep A secret: A distributed architecture for secure database services, CIDR, pp.186-199, 2005. ,
Sovereign Joins, 22nd International Conference on Data Engineering (ICDE'06), p.26, 2006. ,
DOI : 10.1109/ICDE.2006.144
Query processing in a system for distributed databases (SDD-1), ACM Transactions on Database Systems, vol.6, issue.4, pp.602-625, 1981. ,
DOI : 10.1145/319628.319650
Querying data under access limitations, Proceedings of the 24th International Conference on Data Engineering, pp.50-59, 2008. ,
An overview of query optimization in relational systems, Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems , PODS '98, pp.34-43, 1998. ,
DOI : 10.1145/275487.275492
Keep a Few: Outsourcing Data While Maintaining Confidentiality, ESORICS, pp.440-455, 2009. ,
DOI : 10.1145/1994.2209
Controlled information sharing in collaborative distributed query processing, ICDCS, 2008. ,
Authorization enforcement in distributed query evaluation*, Journal of Computer Security, vol.19, issue.4, pp.751-794, 2011. ,
DOI : 10.3233/JCS-2010-0413
Optimizing queries using materialized views: a practical , scalable solution, Proceedings of the 2001 ACM SIGMOD international conference on Management of data, pp.331-342 ,
Answering queries using views: A survey, The VLDB Journal, vol.10, issue.4, pp.270-294, 2001. ,
DOI : 10.1007/s007780100054
The state of the art in distributed query processing, ACM Computing Surveys, vol.32, issue.4, pp.422-469, 2000. ,
DOI : 10.1145/371578.371598
Access Rule Consistency in Cooperative Data Access Environment, Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.11-20 ,
DOI : 10.4108/icst.collaboratecom.2012.250467
Consistency and enforcement of access rules in cooperative data sharing environment, Computers and Security, 2013. ,
DOI : 10.1016/j.cose.2013.08.011
Rule Enforcement with Third Parties in Secure Cooperative Data Access, 27th Data and Applications Security and Privacy, 2013. ,
DOI : 10.1007/978-3-642-39256-6_20
URL : https://hal.archives-ouvertes.fr/hal-01490712
Computing complete answers to queries in the presence of limited access patterns, The VLDB Journal The International Journal on Very Large Data Bases, vol.12, issue.3, pp.211-227, 2003. ,
DOI : 10.1007/s00778-002-0085-6
Minicon: A scalable algorithm for answering queries using views, VLDB J, vol.10, issue.2-3, pp.182-198, 2001. ,
Extending query rewriting techniques for fine-grained access control, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, 2004. ,
DOI : 10.1145/1007568.1007631
Query execution assurance for outsourced databases, VLDB, pp.601-612, 2005. ,