D. J. Abadi, Y. Ahmad, M. Balazinska, U. , M. Cherniack et al., The Design of the Borealis Stream Processing Engine, Proc. of the CIDR, pp.277-289, 2005.

R. Adaikkalavan and T. Perez, Secure shared continuous query processing, Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pp.1005-1011, 2011.
DOI : 10.1145/1982185.1982404

R. Adaikkalavan, I. Ray, and X. Xie, Multilevel Secure Data Stream Processing, Proc. of the DBSec, pp.122-137, 2011.
DOI : 10.1007/978-3-642-22348-8_11

URL : https://hal.archives-ouvertes.fr/hal-01586572

R. Adaikkalavan, X. Xie, and I. Ray, Multilevel secure data stream processing: Architecture and implementation, Journal of Computer Security, vol.20, issue.5, pp.547-581, 2012.
DOI : 10.3233/JCS-2012-0451

URL : http://www.cs.colostate.edu/%7Eiray/research/dbsec11.pdf

A. Arasu, B. Babcock, S. Babu, J. Cieslewicz, M. Datar et al., STREAM: The Stanford Data Stream Management System, 2004.
DOI : 10.1109/TKDE.2003.1198390

A. Arasu, S. Babu, and J. Widom, The CQL continuous query language: semantic foundations and query execution, The VLDB Journal, vol.Francisco, issue.1, pp.121-142, 2006.
DOI : 10.1007/s00778-004-0147-z

A. Arasu and J. Widom, A denotational semantics for continuous queries over streams and relations, ACM SIGMOD Record, vol.33, issue.3, pp.6-11, 2004.
DOI : 10.1145/1031570.1031572

B. Babcock, S. Babu, M. Datar, R. Motwani, and J. Widom, Models and issues in data stream systems, Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '02, pp.1-16, 2002.
DOI : 10.1145/543613.543615

D. E. Bell and L. J. Lapadula, Secure Computer System: Unified Exposition and MULTICS Interpretation, The MITRE Corporation, issue.1, 1976.
DOI : 10.21236/ADA023588

URL : http://www.dtic.mil/dtic/tr/fulltext/u2/a023588.pdf

D. F. Brewer and M. J. Nash, The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.206-214, 1989.
DOI : 10.1109/SECPRI.1989.36295

J. Cao, B. Carminati, E. Ferrari, and K. Tan, ACStream: Enforcing Access Control over Data Streams, 2009 IEEE 25th International Conference on Data Engineering, pp.1495-1498, 2009.
DOI : 10.1109/ICDE.2009.25

B. Carminati, E. Ferrari, and K. L. Tan, Enforcing access control over data streams, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.21-30, 2007.
DOI : 10.1145/1266840.1266845

D. Carney, U. , M. Cherniack, C. Convey, S. Lee et al., Monitoring Streams ??? A New Class of Data Management Applications, Proc. of the VLDB, pp.215-226, 2002.
DOI : 10.1016/B978-155860869-6/50027-5

S. Chakravarthy and Q. Jiang, Stream Data Processing: A Quality of Service Perspective Modeling, Scheduling, Load Shedding, and Complex Event Processing, of Advances in Database Systems, 2009.

Y. Hsiao and G. Hwang, Implementing the Chinese Wall Security Model in Workflow Management Systems, International Symposium on Parallel and Distributed Processing with Applications, pp.574-581, 2010.
DOI : 10.1109/ISPA.2010.41

P. C. Hung and G. Qiu, Specifying conflict of interest assertions in WS-policy with Chinese wall security policy, ACM SIGecom Exchanges, vol.4, issue.1, pp.11-19, 2003.
DOI : 10.1145/844357.844362

W. Lindner and J. Meier, Securing the Borealis Data Stream Engine, 2006 10th International Database Engineering and Applications Symposium (IDEAS'06), pp.137-147, 2006.
DOI : 10.1109/IDEAS.2006.40

URL : http://www6.informatik.uni-erlangen.de/DE/people/wolfgang/papers/IDEAS2006.pdf

R. V. Nehme, H. Lim, and E. Bertino, FENCE, Proceedings of the third ACM conference on Data and application security and privacy, CODASPY '13, pp.243-254, 2013.
DOI : 10.1145/2435349.2435383

R. V. Nehme, E. A. Rundensteiner, and E. Bertino, A Security Punctuation Framework for Enforcing Access Control on Streaming Data, 2008 IEEE 24th International Conference on Data Engineering, pp.406-415, 2008.
DOI : 10.1109/ICDE.2008.4497449

R. V. Nehme, E. A. Rundensteiner, and E. Bertino, A Security Punctuation Framework for Enforcing Access Control on Streaming Data, 2008 IEEE 24th International Conference on Data Engineering, pp.406-415, 2008.
DOI : 10.1109/ICDE.2008.4497449

B. C. Pierce, The Computer Science and Engineering Handbook, chapter Foundational Calculi for Programming Languages, pp.2190-2207, 1997.

R. Sandhu, Lattice-based enforcement of Chinese Walls, Computers & Security, vol.11, issue.8, pp.753-763, 1992.
DOI : 10.1016/0167-4048(92)90131-A

D. A. Schmidt, Programming Language Semantics, The Computer Science and Engineering Handbook, pp.2237-2254, 1997.
DOI : 10.1201/b16812-78

W. She, I. Yen, B. M. Thuraisingham, and E. Bertino, Security-Aware Service Composition with Fine-Grained Information Flow Control, IEEE Transactions on Services Computing, vol.6, issue.3, pp.330-343, 2013.
DOI : 10.1109/TSC.2012.3

Q. Shen, X. Yang, P. Sun, Y. Yang, and Z. Wu, Towards Data Isolation & Collaboration in Storage Cloud, 2011 IEEE Asia-Pacific Services Computing Conference, pp.139-146, 2011.
DOI : 10.1109/APSCC.2011.56

T. Tsai, Y. Chen, H. Huang, P. Huang, and K. Chou, A practical Chinese wall security model in cloud computing, 2011 13th Asia-Pacific Network Operations and Management Symposium, pp.1-4, 2011.
DOI : 10.1109/APNOMS.2011.6076992

R. Wu, G. Ahn, H. Hu, and M. Singhal, Information flow control in cloud computing, Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing, pp.1-7, 2010.
DOI : 10.4108/icst.trustcol.2010.1

R. Xie and R. Gamble, A Tiered Strategy for Auditing in the Cloud, 2012 IEEE Fifth International Conference on Cloud Computing, 2012.
DOI : 10.1109/CLOUD.2012.144

X. Xie, I. Ray, and R. Adaikkalavan, On the Efficient Processing of Multilevel Secure Continuous Queries, 2013 International Conference on Social Computing, pp.417-422, 2013.
DOI : 10.1109/SocialCom.2013.65

X. Xie, I. Ray, R. Adaikkalavan, and R. Gamble, Information flow control for stream processing in clouds, Proceedings of the 18th ACM symposium on Access control models and technologies, SACMAT '13, pp.89-100, 2013.
DOI : 10.1145/2462410.2463205