M. Abadi, B. Burrows, G. Lampson, and . Plotkin, A calculus for access control in distributed systems, In ACM Trans. Program. Lang. Syst, pp.706-734, 1993.

E. Abiteboul, G. Antoine, J. Miklau, J. Stoyanovich, and . Testard, [Demo] rule-based application development using WebdamLog, SIGMOD, 2013.

M. Abiteboul, A. Bienvenu, E. Galland, and . Antoine, A rule-based language for web data management, Proceedings of the 30th symposium on Principles of database systems of data, PODS '11, 2011.
DOI : 10.1145/1989284.1989320

URL : https://hal.archives-ouvertes.fr/inria-00582891

O. M. Abiteboul and . Duschka, Complexity of answering queries using materialized views, Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems , PODS '98, pp.254-263, 1998.
DOI : 10.1145/275487.275516

URL : https://hal.archives-ouvertes.fr/hal-00802873

A. Abiteboul, N. Galland, and . Polyzotis, A model for web information management with access control, WebDB Workshop, 2011.

R. Abiteboul, V. Hull, and . Vianu, Foundations of Databases, 1995.

D. Amsterdamer, V. Deutch, and . Tannen, Provenance for aggregate queries, Proceedings of the 30th symposium on Principles of database systems of data, PODS '11, 2011.
DOI : 10.1145/1989284.1989302

B. Bárány, M. Cate, and . Otto, Queries with guarded negation, PVLDB, vol.5, issue.11, pp.1328-1339, 2012.

R. Bertino and . Sandhu, Database security-concepts, approaches, and challenges. Dependable and Secure Computing, IEEE Transactions on, vol.2, issue.1, pp.2-19, 2005.
DOI : 10.1109/tdsc.2005.9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.2176

. Bonner, Transaction datalog: A compositional language for transaction programming, 1997.
DOI : 10.1007/3-540-64823-2_21

E. Carminati, R. Ferrari, M. Heatherly, B. Kantarcioglu, and . Thuraisingham, A semantic web based framework for social network access control, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.177-186, 2009.
DOI : 10.1145/1542207.1542237

K. Chandra, D. C. Kozen, and L. J. Stockmeyer, Alternation, Journal of the ACM, vol.28, issue.1, pp.114-133, 1981.
DOI : 10.1145/322234.322243

T. Chaudhuri, S. Dutta, and . Sudarshan, Fine Grained Authorization Through Predicated Grants, 2007 IEEE 23rd International Conference on Data Engineering, pp.1174-1183, 2007.
DOI : 10.1109/ICDE.2007.368976

M. Y. Chaudhuri and . Vardi, On the Equivalence of Recursive and Nonrecursive Datalog Programs, Journal of Computer and System Sciences, vol.54, issue.1, pp.61-78, 1997.
DOI : 10.1006/jcss.1997.1452

. Ferrari, Access Control in Data Management Systems. Synthesis Lectures on Data Management, 2010.

J. Green, G. Karvounarakis, and V. Tannen, Provenance semirings, Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '07, pp.31-40, 2007.
DOI : 10.1145/1265530.1265535

. Hulin, Parallel processing of recursive queries in distributed architectures, VLDB, pp.87-96, 1989.

P. Lakshman and . Malik, Cassandra, ACM SIGOPS Operating Systems Review, vol.44, issue.2, pp.35-40, 2010.
DOI : 10.1145/1773912.1773922

R. Lefevre, V. Agrawal, R. Ercegovac, Y. Ramakrishnan, D. Xu et al., Limiting Disclosure in Hippocratic Databases, VLDB, pp.108-119, 2004.
DOI : 10.1016/B978-012088469-8.50013-9

Z. Moffit, J. Stoyanovich, S. Abiteboul, and G. Miklau, Collaborative access control in WebdamLog, SIGMOD, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01136473

S. Nejdl, G. Ceri, and . Wiederhold, Evaluating recursive queries in distributed databases. Knowledge and Data Engineering, IEEE Transactions on, vol.5, issue.1, pp.104-121, 1993.

E. Olson, C. A. Gunter, and P. Madhusudan, A formal framework for reflective database access control policies, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.289-298, 2008.
DOI : 10.1145/1455770.1455808

T. Özsu and P. Valduriez, Principles of Distributed Database Systems, 2011.

D. Park, R. Nguyen, and . Sandhu, A provenance-based access control model, 2012 Tenth Annual International Conference on Privacy, Security and Trust, pp.137-144, 2012.
DOI : 10.1109/PST.2012.6297930

O. O. Project, Bloom programming language

Y. Rajaraman, J. D. Sagiv, and . Ullman, Answering queries using templates with binding patterns, PODS, pp.105-112, 1995.

A. Rizvi, S. Mendelzon, P. Sudarshan, and . Roy, Extending query rewriting techniques for fine-grained access control, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.551-562, 2004.
DOI : 10.1145/1007568.1007631

G. Selinger, M. M. Astrahan, D. D. Chamberlin, R. A. Lorie, and T. G. Price, Access path selection in a relational database management system, Proceedings of the 1979 ACM SIGMOD international conference on Management of data , SIGMOD '79, pp.23-34, 1979.
DOI : 10.1145/582095.582099

. Sipser, Introduction to the Theory of Computation, ACM SIGACT News, vol.27, issue.1, 1996.
DOI : 10.1145/230514.571645

G. Stonebraker, E. Held, P. Wong, and . Kreps, The design and implementation of INGRES, ACM Transactions on Database Systems, vol.1, issue.3, pp.189-222, 1976.
DOI : 10.1145/320473.320476

M. Upadhyaya, D. Balazinska, and . Suciu, Automatic Enforcement of Data Use Policies with DataLawyer, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, SIGMOD '15, pp.213-225, 2015.
DOI : 10.1145/2723372.2723721

T. Wang, N. Yu, J. Li, E. Lobo, K. Bertino et al., On the correctness criteria of fine-grained access control in relational databases, VLDB, pp.555-566, 2007.

J. Zhu, Y. Shi, Y. Wang, and . Feng, Controlling Information Leakage of Fine-Grained Access Model in DBMSs, 2008 The Ninth International Conference on Web-Age Information Management, pp.583-590, 2008.
DOI : 10.1109/WAIM.2008.52