Z. Chen, Java Card Technology for Smart Cards: Architecture and Programmer's guide, 2000.

O. Corp, Oracle 9i lite: Release Notes -Release 5, 2002.

J. Karlsson, A. Lal, C. Leung, and T. Pham, IBM DB2 Everyplace: a small footprint relational database system, Proceedings 17th International Conference on Data Engineering, 2001.
DOI : 10.1109/ICDE.2001.914833

P. Seshadri and P. Garrett, SQLServer for Windows CE-a database engine for mobile and embedded platforms, Proceedings of 16th International Conference on Data Engineering (Cat. No.00CB37073), 2000.
DOI : 10.1109/ICDE.2000.839481

S. Inc, The Next Generation Database for Embedded Systems. White paper, 2000.

P. Pucheral, L. Bouganim, P. Valduriez, and C. Bobineau, PicoDBMS: Scaling down Database Techniques for the Smart card, Very Large Data Bases Journal, vol.10, issue.2-3, 2001.

M. Inc, MasterCard Open Data Storage (MODS), 2002.

. Smartright, The SmartRight Content Protection System. http://www.smartright.org/ [10] XrML. XrML eXtendible rights Markup Language

N. Anciaux, C. Bobineau, L. Bouganim, and P. Pucheral, PicoDBMS: Validation and Experience, Proceedings of the International Conference on Very Large Data Bases, 2001.

C. News, New report points way for profitable smart card IC manufacturing. Newsletter. http://www.secureidnews.com/news/new-report-points-way-for- profitable-smartcard-ic-manufacturing, 2004.

O. Potonniée, A decentralized privacy-enabling TV personalization framework, Proceedings of the European Conference on Interactive Television, 2004.

N. Anciaux, L. Bouganim, and P. Pucheral, Memory Requirements for Query Execution in Highly Constrained Devices, Proceedings of the International Conference on Very Large Data Bases, 2003.
DOI : 10.1016/B978-012722442-8/50067-7

R. Gupta, S. Dey, and P. Marwedel, Embedded System Design and Validation: Building Systems from IC cores to Chips, Proceedings of the International Conference on VLSI De- sign, 1998.

B. Schneier and A. Shostack, Breaking up is hard to do: Modeling Security Threats for Smart Cards, Proceedings of the USENIX Symposium on Smart Cards, 1999.

S. Microelectronics, ST's Trusted Platform Module Provides Complete TCG- Enabled Security Solution for Desktop and Laptop PCs. http://www.st.com/stonline Smart Cards: the computer in your wallet. White Paper, 2004.

D. L. Maloney, Card Technology in Healthcare, Proceedings of the Card- Tech/SecurTech, 2001.

S. Moriyama, H. Tanabe, S. Sasaki, and S. Toyomura, Traceability and Identification Solutions for Secure and Comfortable Society. Hitachi White Paper, pdf [26] SINCE. Secure and Interoperable Networking for Contactless in Europe, 2002.

N. Us-gao, United States General Accounting Office Electronic Government: Pro- gress in Promoting Adoption of Smart Card Technology. http://www.gao.gov/new.items/d03144.pdf [29] CardTechnology Omaha Hospitals To Accept Patient Smart Card. Press Release, 2000.

W. Kim, Smart Cards: Status, Issues, and US Adoption., The Journal of Object Technology, vol.3, issue.5, 2004.
DOI : 10.5381/jot.2004.3.5.c3

. Veterans, G-8 Healthcare Data Card Project, 2001.

N. J. Henderson, N. M. White, and P. H. Hartel, iButton Enrolment and Verification Requirments for the Pressure Sequence Smart Card Biometric, Proceedings of the International Conference on Research in Smart Cards, 2001.

O. Hipaa-privacy, General Overview of Standards for Privacy of Individually Identifiable Health Information, 2003.

. Smart-card-alliance, HIPAA Compliance and Smart Cards: Solutions to Privacy and Security Requirements, 2003.

. Smart-card-alliance, Privacy and Secure Identification Systems: The Role of Smart Cards as a Privacy-Enabling Technology, 2003.

I. Harris, Multinational Consumer Privacy Study40] IFPI. International Federation of Phonographic Industry, 2000.

M. Bouganim, L. Dieu, N. Pucheral, and P. , MPEG-21 Right Expression Language, ISO/IEC 21000- 5:2004 standard MobiDiQ: Mobile Digital Quietude. Gold Award of the Simagine 2005 International Contest (more than 300 participating teams), organized by Sun, 2004.

R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Hippocratic Databases, Proceedings of the International Conference on Very Large Databases, 2002.
DOI : 10.1016/B978-155860869-6/50021-4

V. Singhal, S. Kakkad, and P. Wilson, Texas: An Efficient, Portable Persistent Store, Proceedings of the International Workshop on Persistent Object Systems, 1992.
DOI : 10.1007/978-1-4471-3209-7_2

M. Heytens, S. Listgarten, M. Neimat, and K. Wilkinson, Smallbase: A Main-Memory DBMS for High-Performance Applications. HP Lab, 1994.

S. Chaudhuri and G. Weikum, Rethinking Database System Architecture: Towards a Self-Tuning RISC-Style Database System, Proceedings of the International Conference on Very Large Data Bases, 2000.

M. A. Olson, Selecting and implementing an embedded database system, Computer, vol.33, issue.7, 2000.
DOI : 10.1109/2.868694

J. R. Ortiz, Embedded Databases Come out of Hiding, IEEE Computer Magazine, vol.33, issue.3, 2000.

I. Corp, DB2 Everywhere ? Administration and Application Programming Guide, 1999.

C. Intanagonwiwat, R. Govindan, and D. Estrin, Directed diffusion, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, 2000.
DOI : 10.1145/345910.345920

Y. Yao and J. Gehrke, The cougar approach to in-network query processing in sensor networks, ACM SIGMOD Record, vol.31, issue.3, 2002.
DOI : 10.1145/601858.601861

P. Bonnet and P. Seshadri, Device Database Systems, Proceedings of 16th International Conference on Data Engineering (Cat. No.00CB37073), 2000.
DOI : 10.1109/ICDE.2000.839408

P. Bonnet, J. Gehrke, and P. Seshadri, Towards Sensor Database Systems, Proceedings of the International Conference on Mobile Data Management, 2001.
DOI : 10.1007/3-540-44498-X_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.7876

S. Madden, M. J. Franklin, J. Hellerstein, and W. Hong, TAG: a Tiny AGgregation Service for Ad-Hoc Sensor Networks, Proceedings of the International Conference on Operating Systems Design and Implementation, 2002.

S. Madden and J. M. Hellerstein, Distributing queries over low-power wireless sensor networks, Proceedings of the 2002 ACM SIGMOD international conference on Management of data , SIGMOD '02, 2002.
DOI : 10.1145/564691.564776

C. Bolchini, F. Salice, F. Schreiber, and L. Tanca, Logical and physical design issues for smart card databases, ACM Transactions on Information Systems, vol.21, issue.3, 2003.
DOI : 10.1145/858476.858478

R. Vingralek, GnatDb, Proceedings of the International Conference on Very Large Databases, 2002.
DOI : 10.1016/B978-155860869-6/50087-1

M. Missikoff and M. Scholl, Relational Queries in a Domain Based DBMS, Proceedings of the International Conference on Management of Data, 1983.

A. C. Ammann, M. Hanrahan, and R. Krishnamruthy, Design of a memory resident DBMS, Proceedings of the IEEE International Conference Compcon, 1985.

P. Pucheral, J. Thevenin, and P. Valduriez, Efficient main memory data management using the DBGraph storage model, Proceedings of the International Conference on Very Large Data Bases, 1990.

P. Valduriez, Join indices, ACM Transactions on Database Systems, vol.12, issue.2, 1987.
DOI : 10.1145/22952.22955

E. Shekita, H. Young, and K. L. Tan, Multi-Join Optimization for Symmetric Multiprocessors, Proceedings of the International Conference on Very Large Data Bases, 1993.

G. Graefe, Query evaluation techniques for large databases, ACM Computing Surveys, vol.25, issue.2, 1993.
DOI : 10.1145/152610.152611

M. Abdallah, R. Guerraoui, and P. Pucheral, Dictatorial Transaction Processing: Atomic Commitment Without Veto Right, Proceedings of the International Conference on Distributed and Parallel Databases, 2002.

H. Yu, D. Agrawal, and A. Abbadi, Tabular Placement of Relational Data on MEMSbased Storage Devices, Proceedings of the International Conference on Very Large Data Bases, 2003.

J. Rao and K. A. Ross, Cache Conscious Indexing for Decision-Support in Main Memory, Proceedings of the International Conference on Very Large Data Bases, 1999.

A. G. Ailamaki, D. J. Dewitt, and M. D. Hill, Data page layouts for relational databases on deep memory hierarchies, Proceedings of the International Conference on Very Large Data Bases, 2002.
DOI : 10.1007/s00778-002-0074-9

A. G. Ailamaki, D. J. Dewitt, M. D. Hill, and M. Skounakis, Weaving Relations for Cache Performance, Proceedings of the International Conference on Very Large Data Bases, 2001.

. Gemplus, A 224MB microprocessor Smart Card, 2002.

K. Atasu, L. Breveglieri, and M. Macchetti, Efficient AES implementations for ARM based platforms, Proceedings of the 2004 ACM symposium on Applied computing , SAC '04, 2004.
DOI : 10.1145/967900.968073

R. Tec, X-Mobile Card Overview, 2004.

N. Anciaux, Database Systems on Chips, 2004.

M. Gertz, A. Kwong, C. Martel, G. Nuckolls, P. Devanbu et al., Databases that tell the Truth: Authentic Data Publication, Bulletin of the Technical Committee on Data Engineering, vol.7, issue.1, 2004.

B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, Private information retrieval, Proceedings of the Annual Symposium on Foundations of Computer Science, 1995.

E. Damiani, S. De-capitani-vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, Balancing confidentiality and efficiency in untrusted relational DBMSs, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, 2003.
DOI : 10.1145/948109.948124

H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, Executing SQL over Encrypted Data in the DSP Model, Proceedings of the International Conference on Management of Data, 2002.

L. Bouganim and P. Pucheral, Chip-Secured Data Access: Confidential Data on Untrusted Servers, Proceedings of the International Conference on Very Large Data Bases, 2002.

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. Samarati, A fine-grained access control system for XML documents, Proceedings of the ACM TISSEC. RR, p.80840, 2002.
DOI : 10.1145/505586.505590

B. Iyer, S. Mehrotra, E. Mykletun, G. Tsudik, and Y. Wu, A Framework for Efficient Storage Security in RDBMS, Proceedings of the International Conference on Extending Database Technology, 2004.
DOI : 10.1007/978-3-540-24741-8_10

M. Weiser, The Computer for the Twenty-First century, Scientific American, 1991.

E. Bertino, S. Castano, and E. Ferrari, Securing XML documents with Author-X, IEEE Internet Computing, vol.5, issue.3, 2001.
DOI : 10.1109/4236.935172

A. Gabillon and E. Bruno, Regulating Access to XML Documents, Proceedings of the IFIP Working Conference on Database and Application Security, 2001.
DOI : 10.1007/978-0-387-35587-0_21

L. Bouganim, F. Dang-ngoc, and P. Pucheral, Client-Based Access Control Management for XML documents, Proceedings of the International Conference on Very Large Data Bases, 2004.
DOI : 10.1016/B978-012088469-8.50011-5

URL : https://hal.archives-ouvertes.fr/inria-00070718

C. Bobineau, L. Bouganim, P. Pucheral, and P. Valduriez, PicoDBMS: Scaling down Database Techniques for the Smart card, Proceedings of the International Conference on Very Large Data Bases. (Best Paper Award), 2000.