E. Bertino, S. Castano, E. Ferrari, and M. Mesiti, Specifying and Enforcing Access Control Policies for XML Document Sources, WWW Journal, vol.3, issue.3, 2000.

E. Bertino and E. Ferrari, Secure and selective dissemination of XML documents, ACM Transactions on Information and System Security, vol.5, issue.3, 2002.
DOI : 10.1145/545186.545190

C. Bettini, X. S. Wang, and S. Jajodia, Identifying Sensitive Associations in Databases for Release Control, Proc. Of SDM:VLDB Workshop, 2004.
DOI : 10.1007/978-3-540-30073-1_14

J. Birget, X. Zou, G. Noubir, and B. Ramamurthy, Hierarchy-based access control in distributed environments, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240), 2001.
DOI : 10.1109/ICC.2001.936308

L. Bouganim, F. Dang-ngoc, and P. Pucheral, Client-Based Access Control Management for XML documents, 2004.
DOI : 10.1016/B978-012088469-8.50011-5

URL : https://hal.archives-ouvertes.fr/inria-00070718

S. Cho, S. Amer-yahia, L. Lakshmanan, and D. Srivastava, Optimizing the Secure Evaluation of Twig Queries, 2002.
DOI : 10.1016/B978-155860869-6/50050-0

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. Samarati, A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, 2002.
DOI : 10.1145/505586.505590

B. Finance, S. Medjdoub, and P. Pucheral, The case for access control on XML relationships, Proceedings of the 14th ACM international conference on Information and knowledge management , CIKM '05, 2005.
DOI : 10.1145/1099554.1099576

URL : https://hal.archives-ouvertes.fr/hal-00489266

A. Gabillon and E. Bruno, Regulating Access to XML Documents, IFIP Conf. on Database and Application Security, 2001.
DOI : 10.1007/978-0-387-35587-0_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.6414

A. Gabillon, An authorization model for XML databases, Proceedings of the 2004 workshop on Secure web service , SWS '04, 2004.
DOI : 10.1145/1111348.1111351

M. Kudo and S. Hada, XML document security based on provisional authorization, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, 2000.
DOI : 10.1145/352600.352613

G. Miklau and D. Suciu, Containment and equivalence for an XPath fragement, ACM PODS, 2002.
DOI : 10.1145/543621.543623

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.5847

G. Miklau and D. Suciu, Cryptographically Enforced Conditional Access for XML, 2002.

M. Olivier, V. Solms, and S. , A taxonomy for secure object-oriented databases, ACM Transactions on Database Systems, vol.19, issue.1, 1994.
DOI : 10.1145/174638.174640

I. Ray, I. Ray, and N. Narasimhamurthi, A cryptographic solution to implement access control in a hierarchy and more, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, 2002.
DOI : 10.1145/507711.507723

J. Wang and S. L. Osborn, A role-based approach to access control for XML databases, Proceedings of the ninth ACM symposium on Access control models and technologies , SACMAT '04, 2004.
DOI : 10.1145/990036.990047