E. Bertino, S. Castano, and E. Ferrari, Securing XML documents with Author-X, IEEE Internet Computing, vol.5, issue.3, 2001.
DOI : 10.1109/4236.935172

L. Bouganim, F. Dang-ngoc, and P. Pucheral, Client-Based Access Control Management for XML documents, 2004.
DOI : 10.1016/B978-012088469-8.50011-5

URL : https://hal.archives-ouvertes.fr/inria-00070718

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. Samarati, A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, 2002.
DOI : 10.1145/505586.505590

Y. Diao and M. Franklin, High-Performance XML Filtering: An Overview of YFilter, ICDE, 2003.

H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, Executing SQL over encrypted data in the database-service-provider model, ACM SIGMOD, 2002.

G. Miklau and D. Suciu, Containment and equivalence for an XPath fragment, ACM PODS, 2002.
DOI : 10.1145/543621.543623

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.5847

R. Vingralek and . Gnatdb, A Small-Footprint, Secure Database System, VLDB, DSP Access rules Integrity control Decryption Access rights evaluator Keys Smart card Device hosting the smart card Proxy XML data Access rules JDBC APDU Application 1, 2002.