S. Abiteboul, R. Hull, and V. Vianu, Foundations of Databases, 1995.

D. E. Bell and L. J. Lapadula, Secure computer systems: A mathematical model, volume II, Journal of Computer Security, vol.4, issue.23, pp.229-263, 1974.

E. Bertino, F. Buccafurri, E. Ferrari, and P. Rullo, A logic-based approach for enforcing access control, Journal of Computer Security, vol.8, issue.2, 2000.

J. Biskup, Security in Computing Systems ? Challenges, Approaches and Solutions, 2009.

J. Biskup, Usability Confinement of Server Reactions: Maintaining Inference-Proof Client Views by Controlled Interaction Execution, Databases in Networked Information Systems, pp.80-106, 2010.
DOI : 10.1007/978-3-642-12038-1_7

J. Biskup and P. A. Bonatti, Controlled query evaluation for enforcing confidentiality in complete information systems, International Journal of Information Security, vol.8, issue.1, pp.14-27, 2004.
DOI : 10.1145/319830.319833

Y. Chen and W. W. Chu, Protection of Database Security Via Collaborative Inference Detection, IEEE Trans. Knowl. Data Eng, vol.20, issue.8, pp.1013-1027, 2008.
DOI : 10.1007/978-3-540-69209-6_15

S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian, Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001.
DOI : 10.1145/383891.383894

K. Ligatti and S. Reddy, A Theory of Runtime Enforcement, with Results, European Symposium on Research in Computer Security, ESORICS 2010, pp.87-100, 2010.
DOI : 10.1007/978-3-642-15497-3_6

F. B. Schneider, Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000.
DOI : 10.1145/353323.353382

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.1853

G. L. Sicherman, W. De-jonge, and R. P. Van-de-riet, Answering queries without revealing secrets, ACM Transactions on Database Systems, vol.8, issue.1, pp.41-59, 1983.
DOI : 10.1145/319830.319833