A Security Policy Model for Clinical Infor-mation Systems, IEEE Symp. on Security and Privacy, 1996. ,
Specifying and Enforcing Access Control Policies for XML Document Sources, WWW Journal, vol.3, issue.3, 2000. ,
Secure and selective dissemination of XML documents, ACM Transactions on Information and System Security, vol.5, issue.3, 2002. ,
DOI : 10.1145/545186.545190
Hierarchy-based access control in distributed environments, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240), 2001. ,
DOI : 10.1109/ICC.2001.936308
Client-Based Access Control Management for XML documents, 2004. ,
DOI : 10.1016/B978-012088469-8.50011-5
URL : https://hal.archives-ouvertes.fr/inria-00070718
Extending xQuery with transformation operators, Proceedings of the 2003 ACM symposium on Document engineering , DocEng '03, pp.1-8, 2003. ,
DOI : 10.1145/958220.958223
Optimizing the Secure Evaluation of Twig Queries, 2002. ,
DOI : 10.1016/B978-155860869-6/50050-0
A Fine-Grained Access Control System for XML DocumentsProtection of individuals with regard the processing of personal data, Fine-Grained XML Access Control PrototypeOfficial Journal L 281, 1985. ,
A model for evaluation and administration of security in object-oriented databases, IEEE Transactions on Knowledge and Data Engineering, vol.6, issue.2, 1994. ,
DOI : 10.1109/69.277771
Database security and integrity, 1981. ,
Regulating Access to XML Documents, IFIP Conf. on Database and Application Security, 2001. ,
DOI : 10.1007/978-0-387-35587-0_21
Legislative Survey of State Confidentiality Laws, Final Report Presented to: The U, S. Centers for Disease Control and Prevention, vol.http, 1997. ,
Evaluation of negative and predicate-based authorization in object-oriented databases, 1990. ,
Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, 2001. ,
DOI : 10.1145/383891.383894
XML document security based on provisional authorization, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, 2000. ,
DOI : 10.1145/352600.352613
Containment and equivalence for an XPath fragement, ACM PODS, 2002. ,
Cryptographically Enforced Conditional Access for XML, 2002. ,
A taxonomy for secure object-oriented databases, ACM Transactions on Database Systems, vol.19, issue.1, 1994. ,
DOI : 10.1145/174638.174640
XML Access Control for Semantically Related XML Documents, HICSS, 2003. ,
DOI : 10.1109/hicss.2003.1174827
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.2911
Medical Privacy in the Electronic Age, 2003. ,
A model of the authorization for nextgeneration databases systems, ACM Trans Database Syst, vol.16, issue.1, 1991. ,
A model of authorization for object-oriented and semantic databases, 1988. ,
DOI : 10.1007/3-540-19074-0_56
A cryptographic solution to implement access control in a hierarchy and more, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, 2002. ,
DOI : 10.1145/507711.507723
A role-based approach to access control for XML databases, Proceedings of the ninth ACM symposium on Access control models and technologies , SACMAT '04, 2004. ,
DOI : 10.1145/990036.990047