J. Abendroth and C. D. Jensen, Partial outsourcing, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, 2003.
DOI : 10.1145/775412.775429

S. Abiteboul, B. Alexe, O. Benjelloun, B. Cautis, I. Fundulaki et al., An Electronic Patient Record ???on Steroids???, VLDB (demo), 2004.
DOI : 10.1016/B978-012088469-8.50125-X

S. Abiteboul, B. Cautis, A. Fiat, and T. Milo, Digital signatures for modifiable collections, First International Conference on Availability, Reliability and Security (ARES'06), 2006.
DOI : 10.1109/ARES.2006.53

URL : https://hal.archives-ouvertes.fr/inria-00001032

M. Benedikt and I. Fundulaki, XML Subtree Queries:??Specification and Composition, DBPL, 2005.
DOI : 10.1007/11601524_9

E. Bertino and E. Ferrari, Secure and selective dissemination of XML documents, ACM Transactions on Information and System Security, vol.5, issue.3, pp.290-331, 2002.
DOI : 10.1145/545186.545190

E. Bertino, G. Mella, G. Correndo, and E. Ferrari, An infrastructure for managing secure update operations on XML data, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, 2003.
DOI : 10.1145/775412.775426

E. Bertino, G. Mella, G. Correndo, and E. Ferrari, An infrastructure for managing secure update operations on XML data, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, 2003.
DOI : 10.1145/775412.775426

L. Bull, P. Stanski, and D. M. Squire, Content extraction signatures using XML digital signatures and custom transforms on-demand, Proceedings of the twelfth international conference on World Wide Web , WWW '03, 2003.
DOI : 10.1145/775152.775176

B. Carminati, Selective and authentic third-party distribution of XML documents, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.10, 2004.

S. Cho, S. Amer-yahia, L. V. Lakshmanan, and D. Srivastava, Optimizing the Secure Evaluation of Twig Queries, VLDB, 2002.
DOI : 10.1016/B978-155860869-6/50050-0

B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, Private information retrieval, J. ACM, vol.45, issue.6, 1998.

E. Damiani, S. D. Di-vimercati, S. Paraboschi, and P. Samarati, Securing XML Documents, EDBT, 2001.
DOI : 10.1007/3-540-46439-5_8

E. Damiani, S. D. Di-vimercati, S. Paraboschi, and P. Samarati, A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, pp.169-202, 2002.
DOI : 10.1145/505586.505590

E. Damiani, S. D. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, Balancing confidentiality and efficiency in untrusted relational DBMSs, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, 2003.
DOI : 10.1145/948109.948124

S. D. Di-vimercati, S. Marrara, and P. Samarati, An access control model for querying XML data, SWS, 2005. [18] Health Level Seven

W. Fan, C. Chan, and M. Garofalakis, Secure XML querying with security views, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, 2004.
DOI : 10.1145/1007568.1007634

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.2679

C. Farkas and S. Jajodia, The inference problem, ACM SIGKDD Explorations Newsletter, vol.4, issue.2, 2002.
DOI : 10.1145/772862.772864

I. Fundulaki and M. Marx, Specifying access control policies for XML documents with XPath, Proceedings of the ninth ACM symposium on Access control models and technologies , SACMAT '04, 2004.
DOI : 10.1145/990036.990046

O. Goldreich, Foundations of Cryptography, 2000.

H. Hacigumus, B. R. Iyer, and S. Mehrotra, Providing database as a service, Proceedings 18th International Conference on Data Engineering, 2002.
DOI : 10.1109/ICDE.2002.994695

A. Harrington and C. Jensen, Cryptographic access control in a distributed file system, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, 2003.
DOI : 10.1145/775412.775432

R. Johnson, D. Molnar, D. Song, and D. Wagner, Homomorphic Signature Schemes, CT-RSA, 2002.
DOI : 10.1007/3-540-45760-7_17

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.1944

Y. Kanza, A. O. Mendelzon, R. J. Miller, and Z. Zhang, Authorization-Transparent Access Control for XML Under the Non-Truman Model, EDBT, 2006.
DOI : 10.1007/11687238_16

Y. Koglin, G. Mella, E. Bertino, and E. Ferrari, An Update Protocol for XML Documents in Distributed and Cooperative Systems, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), 2005.
DOI : 10.1109/ICDCS.2005.12

E. Kushilevitz and R. Ostrovsky, Replication is not needed: single database, computationally-private information retrieval, Proceedings 38th Annual Symposium on Foundations of Computer Science, 1997.
DOI : 10.1109/SFCS.1997.646125

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.2667

G. Miklau and D. Suciu, Containment and equivalence for an XPath fragment, PODS, 2002.
DOI : 10.1145/543621.543623

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.5847

M. Naor and V. Teague, Anti-persistence: History independent data structures, Cryptology ePrint Archive Report, p.36, 2001.

S. Rizvi, A. O. Mendelzon, S. Sudarshan, P. Roy, R. Vercammen et al., Extending query rewriting techniques for fine-grained access control Query translation for xpath-based security views, SIGMOD Conference EDBT Workshops, 2004.

E. B. Koglin, G. Mella, and E. Ferrari, An Update Protocol for XML Documents in Distributed and Cooperative Systems, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), 2005.
DOI : 10.1109/ICDCS.2005.12