Specifying and Enforcing Access Control Policies for XML Document Sources, WWW Journal, vol.3, issue.3, 2000. ,
Secure and selective dissemination of XML documents, ACM Transactions on Information and System Security, vol.5, issue.3, 2002. ,
DOI : 10.1145/545186.545190
Identifying Sensitive Associations in Databases for Release Control, Proc. Of SDM:VLDB Workshop, 2004. ,
DOI : 10.1007/978-3-540-30073-1_14
Hierarchy-based access control in distributed environments, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240), 2001. ,
DOI : 10.1109/ICC.2001.936308
Client-Based Access Control Management for XML documents, 2004. ,
DOI : 10.1016/B978-012088469-8.50011-5
URL : https://hal.archives-ouvertes.fr/inria-00070718
Optimizing the Secure Evaluation of Twig Queries, 2002. ,
DOI : 10.1016/B978-155860869-6/50050-0
A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, 2002. ,
DOI : 10.1145/505586.505590
The case for access control on XML relationships, Proceedings of the 14th ACM international conference on Information and knowledge management , CIKM '05, 2005. ,
DOI : 10.1145/1099554.1099576
URL : https://hal.archives-ouvertes.fr/hal-00489266
Regulating Access to XML Documents, IFIP Conf. on Database and Application Security, 2001. ,
DOI : 10.1007/978-0-387-35587-0_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.6414
An authorization model for XML databases, Proceedings of the 2004 workshop on Secure web service , SWS '04, 2004. ,
DOI : 10.1145/1111348.1111351
XML document security based on provisional authorization, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, 2000. ,
DOI : 10.1145/352600.352613
Containment and equivalence for an XPath fragement, ACM PODS, 2002. ,
DOI : 10.1145/543621.543623
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.5847
Cryptographically Enforced Conditional Access for XML, 2002. ,
A taxonomy for secure object-oriented databases, ACM Transactions on Database Systems, vol.19, issue.1, 1994. ,
DOI : 10.1145/174638.174640
A cryptographic solution to implement access control in a hierarchy and more, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, 2002. ,
DOI : 10.1145/507711.507723
A role-based approach to access control for XML databases, Proceedings of the ninth ACM symposium on Access control models and technologies , SACMAT '04, 2004. ,
DOI : 10.1145/990036.990047