S. Abiteboul, B. Cautis, A. Fiat, and T. Milo, Digital signatures for modifiable collections, First International Conference on Availability, Reliability and Security (ARES'06), 2006.
DOI : 10.1109/ARES.2006.53

URL : https://hal.archives-ouvertes.fr/inria-00001032

S. Abiteboul, R. Hull, and V. Vianu, Foundations of Databases, 1995.

S. Abiteboul, L. Segoufin, and V. Vianu, Representing and querying XML with incomplete information, PODS, 2001.
DOI : 10.1145/1132863.1132869

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.189.5285

S. Abiteboul and V. Vianu, Regular path queries with constraints, J. Comput. Syst. Sci, vol.58, issue.3, 1999.
DOI : 10.1006/jcss.1999.1627

URL : http://doi.org/10.1006/jcss.1999.1627

M. Arenas, Design principles for XML data, 2005.

M. Arenas and L. Libkin, XML data exchange: consistency and query answering, PODS, 2005.

M. Arenas, W. Fan, and L. Libkin, Consistency of XML Specifications, Inconsistency Tolerance, 2005.
DOI : 10.1007/978-3-540-30597-2_2

M. Bellare, O. Goldreich, and S. Goldwasser, Incremental Cryptography: The Case of Hashing and Signing, Lecture Notes in Computer Science, 1994.
DOI : 10.1007/3-540-48658-5_22

M. Benedikt and C. Koch, XPath leashed, ACM Computing Surveys, vol.41, issue.1, 2006.
DOI : 10.1145/1456650.1456653

M. Bojanczyk, C. David, A. Muscholl, T. Schwentick, and L. Segoufin, Two-variable logic on data trees and XML reasoning, PODS, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00151833

P. Buneman, S. Davidson, W. Fan, and C. , Hara, and 6 ? is a predicate that checks equality of two data values (such as the Id attribute), while < refers to two relations

W. C. Tan, Reasoning about keys for XML, Inf. Syst, vol.28, issue.8, 2003.

B. Cautis, S. Abiteboul, and T. Milo, Reasoning about XML update constraints, BDA, 2006.
DOI : 10.1145/1265530.1265558

URL : https://hal.archives-ouvertes.fr/inria-00137171

C. Y. Chan, W. Fan, P. Felber, M. N. Garofalakis, and R. Rastogi, Tree Pattern Aggregation for Scalable XML Data Dissemination, VLDB, 2002.
DOI : 10.1016/B978-155860869-6/50078-0

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.8038

A. Deutsch and V. Tannen, XML queries and constraints, containment and reformulation, Theoretical Computer Science, vol.336, issue.1, 2005.
DOI : 10.1016/j.tcs.2004.10.032

P. Devanbu, M. Gertz, C. Martel, and S. Stubblebine, Authentic Third-Party Data Publication, IFIP Workshop on Database Security, 2000.
DOI : 10.1007/0-306-47008-X_9

W. Fan, XML constraints: Specification, analysis, and applications, DEXA Workshops, 2005.

W. Fan and L. Libkin, On XML integrity constraints in the presence of DTDs, J. ACM, 2002.

W. Fan and J. Siméon, Integrity constraints for XML, J. Comput. Syst. Sci, vol.66, issue.1, 2003.

G. Gottlob, C. Koch, R. Pichler, and L. Segoufin, The complexity of XPath query evaluation and XML typing, Journal of the ACM, vol.52, issue.2, 2005.
DOI : 10.1145/1059513.1059520

T. J. Green, G. Miklau, M. Onizuka, and D. Suciu, Processing XML streams with deterministic automata Homomorphic signature schemes, ICDT CT-RSA, 2002.

G. Miklau and D. Suciu, Containment and equivalence for an XPath fragment, Proc. of ACM PODS, 2002.

G. Miklau and D. Suciu, Modeling Integrity in Data Exchange, SDM, 2004.
DOI : 10.1007/978-3-540-30073-1_4

F. Neven and T. Schwentick, On the complexity of XPath containment in the presence of disjunction, DTDs, and variables, Logical Methods in Computer Science, vol.2, issue.3, 2006.
DOI : 10.2168/LMCS-2(3:1)2006

Y. Papakonstantinou and V. Vianu, DTD inference for views of XML data, Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '00, 2000.
DOI : 10.1145/335168.335173

R. L. Rivest, Two signature schemes, 2000.

T. Schwentick, XPath query containment, ACM SIGMOD Record, vol.33, issue.1, 2004.
DOI : 10.1145/974121.974140

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.7281

P. Wadler, A formal semantics of patterns in XSLT, 1999.