S. Akl and P. Taylor, Cryptographic solution to a problem of access control in a hierarchy -ACM TOCS, 1983.

L. Bouganim and P. , Pucheral -Chip-Secured Data Access: Confidential Data on Untrusted Servers -VLDB, 2002.
DOI : 10.1016/b978-012722442-8/50123-3

J. Birget, X. Zou, G. Noubir, and B. , Ramamurthy -Hierarchy-Based Access Control in Distributed Environments, IEEE ICC, 2001.

S. Cho, S. Amer-yahia, L. Lakshmanan, and D. , Srivastava -Optimizing the secure evaluation of twig queries -VLDB, 2002.

C. Chan, P. Felber, M. Garofalakis, and R. , Rastogi -Efficient Filtering of XML Documents with Xpath Expressions -ICDE, 2002.

R. Chandramouli-, Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks -5th ACM workshop on Role-based Access Control, 2000.

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. , Samarati -A Fine-Grained Access Control System for XML, Documents -ACM TISSEC, vol.5, issue.2, 2002.

Y. Diao and M. , Franklin -High-Performance XML Filtering: An Overview of YFilter - ICDE, 2003. [FBI03] Computer Security Institute -CSI/FBI Computer Crime and Security Survey http

I. Gab01, ]. A. Gabillon, and E. Bruno, Regulating access to XML documents -IFIP Working Conference on Database and Application Security, 2001.

J. He and M. , Wang -Cryptography and Relational Database Management Systems -IDEAS, 2001.
DOI : 10.1109/ideas.2001.938095

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.7.8573

H. Hacigumus, B. Iyer, C. Li, and S. , Mehrotra -Executing SQL over encrypted data in the database-service-provider model -ACM SIGMOD, 2002.

J. Hopcroft and J. , Ullman -Introduction to Automata Theory, Languages and Computation, 1979.

M. Kudo and S. , Hada -XML document security based on provisional authorization -ACM CCS, Med] Windows Microsoft Windows Media 9, 2000.

R. Merkle-a, Certified Digital Signature -Advances in Cryptology--Crypto'89, Miklau and D. Suciu -Containment and equivalence for an XPath fragment -ACM PODS, 1989.

G. Micklau and D. , Suciu -Controlling Access to Published Data Using Cryptography - VLDB, 2003.

W. Ng, B. Ooi, K. Tan, and A. , Zhou -Peerdb: A p2p-based system for distributed data sharing -ICDE, 2003. [ODR] The Open Digital Rights Language Initiative

F. Peng and S. , Chawathe -XPath Queries on Streaming Data -ACM SIGMOD, 2003. [PIC] W3C consortium -PICS: Platform for Internet Content Selection http
DOI : 10.1145/872808.872810

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.7726

I. Ray, I. Ray, and N. , Narasimhamurthi -A Cryptographic Solution to Implement Access Control in a Hierarchy and More -ACM SACMAT, 2002.

P. Tolani and J. , Haritsa -XGRIND: A Query-Friendly XML Compressor -ICDE, 2002.
DOI : 10.1109/icde.2002.994712

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.9087

R. Vingralek-gnatdb, A Small-Footprint, Secure Database System -VLDB, XrM] XrML eXtendible rights Markup Language, 2002.