Digital signatures for modifiable collections, First International Conference on Availability, Reliability and Security (ARES'06), 2006. ,
DOI : 10.1109/ARES.2006.53
URL : https://hal.archives-ouvertes.fr/inria-00001032
Foundations of Databases, 1995. ,
Representing and querying XML with incomplete information, PODS, 2001. ,
DOI : 10.1145/1132863.1132869
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.189.5285
Regular path queries with constraints, J. Comput. Syst. Sci, vol.58, issue.3, 1999. ,
DOI : 10.1006/jcss.1999.1627
URL : http://doi.org/10.1006/jcss.1999.1627
Design principles for XML data, 2005. ,
XML data exchange: consistency and query answering, PODS, 2005. ,
Consistency of XML Specifications, Inconsistency Tolerance, 2005. ,
DOI : 10.1007/978-3-540-30597-2_2
Incremental Cryptography: The Case of Hashing and Signing, Lecture Notes in Computer Science, 1994. ,
DOI : 10.1007/3-540-48658-5_22
XPath leashed, ACM Computing Surveys, vol.41, issue.1, 2006. ,
DOI : 10.1145/1456650.1456653
Two-variable logic on data trees and XML reasoning, PODS, 2006. ,
URL : https://hal.archives-ouvertes.fr/hal-00151833
Hara, and 6 ? is a predicate that checks equality of two data values (such as the Id attribute), while < refers to two relations ,
Reasoning about keys for XML, Inf. Syst, vol.28, issue.8, 2003. ,
Reasoning about XML update constraints, BDA, 2006. ,
DOI : 10.1145/1265530.1265558
URL : https://hal.archives-ouvertes.fr/inria-00137171
Tree Pattern Aggregation for Scalable XML Data Dissemination, VLDB, 2002. ,
DOI : 10.1016/B978-155860869-6/50078-0
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.8038
XML queries and constraints, containment and reformulation, Theoretical Computer Science, vol.336, issue.1, 2005. ,
DOI : 10.1016/j.tcs.2004.10.032
Authentic Third-Party Data Publication, IFIP Workshop on Database Security, 2000. ,
DOI : 10.1007/0-306-47008-X_9
XML constraints: Specification, analysis, and applications, DEXA Workshops, 2005. ,
On XML integrity constraints in the presence of DTDs, J. ACM, 2002. ,
Integrity constraints for XML, J. Comput. Syst. Sci, vol.66, issue.1, 2003. ,
The complexity of XPath query evaluation and XML typing, Journal of the ACM, vol.52, issue.2, 2005. ,
DOI : 10.1145/1059513.1059520
Processing XML streams with deterministic automata Homomorphic signature schemes, ICDT CT-RSA, 2002. ,
Containment and equivalence for an XPath fragment, Proc. of ACM PODS, 2002. ,
Modeling Integrity in Data Exchange, SDM, 2004. ,
DOI : 10.1007/978-3-540-30073-1_4
On the complexity of XPath containment in the presence of disjunction, DTDs, and variables, Logical Methods in Computer Science, vol.2, issue.3, 2006. ,
DOI : 10.2168/LMCS-2(3:1)2006
DTD inference for views of XML data, Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '00, 2000. ,
DOI : 10.1145/335168.335173
Two signature schemes, 2000. ,
XPath query containment, ACM SIGMOD Record, vol.33, issue.1, 2004. ,
DOI : 10.1145/974121.974140
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.7281
A formal semantics of patterns in XSLT, 1999. ,