R. J. Anderson, A Security Policy Model for Clinical Infor-mation Systems, IEEE Symp. on Security and Privacy, 1996.

E. Bertino, S. Castano, E. Ferrari, and M. Mesiti, Specifying and Enforcing Access Control Policies for XML Document Sources, WWW Journal, vol.3, issue.3, 2000.

E. Bertino and E. Ferrari, Secure and selective dissemination of XML documents, ACM Transactions on Information and System Security, vol.5, issue.3, 2002.
DOI : 10.1145/545186.545190

J. Birget, X. Zou, G. Noubir, and B. Ramamurthy, Hierarchy-based access control in distributed environments, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240), 2001.
DOI : 10.1109/ICC.2001.936308

L. Bouganim, F. Dang-ngoc, and P. Pucheral, Client-Based Access Control Management for XML documents, 2004.
DOI : 10.1016/B978-012088469-8.50011-5

URL : https://hal.archives-ouvertes.fr/inria-00070718

E. Bruno, J. Le-maitre, and E. Murisasco, Extending xQuery with transformation operators, Proceedings of the 2003 ACM symposium on Document engineering , DocEng '03, pp.1-8, 2003.
DOI : 10.1145/958220.958223

S. Cho, S. Amer-yahia, L. Lakshmanan, and D. Srivastava, Optimizing the Secure Evaluation of Twig Queries, 2002.
DOI : 10.1016/B978-155860869-6/50050-0

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, P. Samarati, E. Damiani et al., A Fine-Grained Access Control System for XML DocumentsProtection of individuals with regard the processing of personal data, Fine-Grained XML Access Control PrototypeOfficial Journal L 281, 1985.

E. B. Fernandez, E. Gudes, and H. Song, A model for evaluation and administration of security in object-oriented databases, IEEE Transactions on Knowledge and Data Engineering, vol.6, issue.2, 1994.
DOI : 10.1109/69.277771

E. Fernandez, R. Summers, and C. Wood, Database security and integrity, 1981.

A. Gabillon and E. Bruno, Regulating Access to XML Documents, IFIP Conf. on Database and Application Security, 2001.
DOI : 10.1007/978-0-387-35587-0_21

L. O. Gostin, Z. Lazzarini, and K. M. Flaherty, Legislative Survey of State Confidentiality Laws, Final Report Presented to: The U, S. Centers for Disease Control and Prevention, vol.http, 1997.

E. Gudes, H. Song, and E. B. Fernandez, Evaluation of negative and predicate-based authorization in object-oriented databases, 1990.

S. Jajodia, P. Samarati, M. Sapino, and V. Subrahmanian, Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, 2001.
DOI : 10.1145/383891.383894

M. Kudo and S. Hada, XML document security based on provisional authorization, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, 2000.
DOI : 10.1145/352600.352613

G. Miklau and D. Suciu, Containment and equivalence for an XPath fragement, ACM PODS, 2002.

G. Miklau and D. Suciu, Cryptographically Enforced Conditional Access for XML, 2002.

M. Olivier, V. Solms, and S. , A taxonomy for secure object-oriented databases, ACM Transactions on Database Systems, vol.19, issue.1, 1994.
DOI : 10.1145/174638.174640

V. Parmar and H. Shi, XML Access Control for Semantically Related XML Documents, HICSS, 2003.
DOI : 10.1109/hicss.2003.1174827

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.2911

/. Privacy-rights-clearinghouse, H. Ucan, and . Basics, Medical Privacy in the Electronic Age, 2003.

F. Rabitti, E. Bertino, W. Kim, and D. Woelk, A model of the authorization for nextgeneration databases systems, ACM Trans Database Syst, vol.16, issue.1, 1991.

F. Rabitti, D. Woelk, and W. Ki, A model of authorization for object-oriented and semantic databases, 1988.
DOI : 10.1007/3-540-19074-0_56

I. Ray, I. Ray, and N. Narasimhamurthi, A cryptographic solution to implement access control in a hierarchy and more, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, 2002.
DOI : 10.1145/507711.507723

J. Wang and S. L. Osborn, A role-based approach to access control for XML databases, Proceedings of the ninth ACM symposium on Access control models and technologies , SACMAT '04, 2004.
DOI : 10.1145/990036.990047