A calculus for access control in distributed systems, In ACM Trans. Program. Lang. Syst, pp.706-734, 1993. ,
[Demo] rule-based application development using WebdamLog, SIGMOD, 2013. ,
A rule-based language for web data management, Proceedings of the 30th symposium on Principles of database systems of data, PODS '11, 2011. ,
DOI : 10.1145/1989284.1989320
URL : https://hal.archives-ouvertes.fr/inria-00582891
Complexity of answering queries using materialized views, Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems , PODS '98, pp.254-263, 1998. ,
DOI : 10.1145/275487.275516
URL : https://hal.archives-ouvertes.fr/hal-00802873
A model for web information management with access control, WebDB Workshop, 2011. ,
Foundations of Databases, 1995. ,
Provenance for aggregate queries, Proceedings of the 30th symposium on Principles of database systems of data, PODS '11, 2011. ,
DOI : 10.1145/1989284.1989302
Queries with guarded negation, PVLDB, vol.5, issue.11, pp.1328-1339, 2012. ,
Database security-concepts, approaches, and challenges. Dependable and Secure Computing, IEEE Transactions on, vol.2, issue.1, pp.2-19, 2005. ,
DOI : 10.1109/tdsc.2005.9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.2176
Transaction datalog: A compositional language for transaction programming, 1997. ,
DOI : 10.1007/3-540-64823-2_21
A semantic web based framework for social network access control, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.177-186, 2009. ,
DOI : 10.1145/1542207.1542237
Alternation, Journal of the ACM, vol.28, issue.1, pp.114-133, 1981. ,
DOI : 10.1145/322234.322243
Fine Grained Authorization Through Predicated Grants, 2007 IEEE 23rd International Conference on Data Engineering, pp.1174-1183, 2007. ,
DOI : 10.1109/ICDE.2007.368976
On the Equivalence of Recursive and Nonrecursive Datalog Programs, Journal of Computer and System Sciences, vol.54, issue.1, pp.61-78, 1997. ,
DOI : 10.1006/jcss.1997.1452
Access Control in Data Management Systems. Synthesis Lectures on Data Management, 2010. ,
Provenance semirings, Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '07, pp.31-40, 2007. ,
DOI : 10.1145/1265530.1265535
Parallel processing of recursive queries in distributed architectures, VLDB, pp.87-96, 1989. ,
Cassandra, ACM SIGOPS Operating Systems Review, vol.44, issue.2, pp.35-40, 2010. ,
DOI : 10.1145/1773912.1773922
Limiting Disclosure in Hippocratic Databases, VLDB, pp.108-119, 2004. ,
DOI : 10.1016/B978-012088469-8.50013-9
Collaborative access control in WebdamLog, SIGMOD, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01136473
Evaluating recursive queries in distributed databases. Knowledge and Data Engineering, IEEE Transactions on, vol.5, issue.1, pp.104-121, 1993. ,
A formal framework for reflective database access control policies, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.289-298, 2008. ,
DOI : 10.1145/1455770.1455808
Principles of Distributed Database Systems, 2011. ,
A provenance-based access control model, 2012 Tenth Annual International Conference on Privacy, Security and Trust, pp.137-144, 2012. ,
DOI : 10.1109/PST.2012.6297930
Bloom programming language ,
Answering queries using templates with binding patterns, PODS, pp.105-112, 1995. ,
Extending query rewriting techniques for fine-grained access control, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.551-562, 2004. ,
DOI : 10.1145/1007568.1007631
Access path selection in a relational database management system, Proceedings of the 1979 ACM SIGMOD international conference on Management of data , SIGMOD '79, pp.23-34, 1979. ,
DOI : 10.1145/582095.582099
Introduction to the Theory of Computation, ACM SIGACT News, vol.27, issue.1, 1996. ,
DOI : 10.1145/230514.571645
The design and implementation of INGRES, ACM Transactions on Database Systems, vol.1, issue.3, pp.189-222, 1976. ,
DOI : 10.1145/320473.320476
Automatic Enforcement of Data Use Policies with DataLawyer, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, SIGMOD '15, pp.213-225, 2015. ,
DOI : 10.1145/2723372.2723721
On the correctness criteria of fine-grained access control in relational databases, VLDB, pp.555-566, 2007. ,
Controlling Information Leakage of Fine-Grained Access Model in DBMSs, 2008 The Ninth International Conference on Web-Age Information Management, pp.583-590, 2008. ,
DOI : 10.1109/WAIM.2008.52