Partial outsourcing, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, 2003. ,
DOI : 10.1145/775412.775429
An Electronic Patient Record ???on Steroids???, VLDB (demo), 2004. ,
DOI : 10.1016/B978-012088469-8.50125-X
Digital signatures for modifiable collections, First International Conference on Availability, Reliability and Security (ARES'06), 2006. ,
DOI : 10.1109/ARES.2006.53
URL : https://hal.archives-ouvertes.fr/inria-00001032
XML Subtree Queries:??Specification and Composition, DBPL, 2005. ,
DOI : 10.1007/11601524_9
Secure and selective dissemination of XML documents, ACM Transactions on Information and System Security, vol.5, issue.3, pp.290-331, 2002. ,
DOI : 10.1145/545186.545190
An infrastructure for managing secure update operations on XML data, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, 2003. ,
DOI : 10.1145/775412.775426
An infrastructure for managing secure update operations on XML data, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, 2003. ,
DOI : 10.1145/775412.775426
Content extraction signatures using XML digital signatures and custom transforms on-demand, Proceedings of the twelfth international conference on World Wide Web , WWW '03, 2003. ,
DOI : 10.1145/775152.775176
Selective and authentic third-party distribution of XML documents, IEEE Transactions on Knowledge and Data Engineering, vol.16, issue.10, 2004. ,
Optimizing the Secure Evaluation of Twig Queries, VLDB, 2002. ,
DOI : 10.1016/B978-155860869-6/50050-0
Private information retrieval, J. ACM, vol.45, issue.6, 1998. ,
Securing XML Documents, EDBT, 2001. ,
DOI : 10.1007/3-540-46439-5_8
A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, pp.169-202, 2002. ,
DOI : 10.1145/505586.505590
Balancing confidentiality and efficiency in untrusted relational DBMSs, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, 2003. ,
DOI : 10.1145/948109.948124
An access control model for querying XML data, SWS, 2005. [18] Health Level Seven ,
Secure XML querying with security views, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, 2004. ,
DOI : 10.1145/1007568.1007634
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.2679
The inference problem, ACM SIGKDD Explorations Newsletter, vol.4, issue.2, 2002. ,
DOI : 10.1145/772862.772864
Specifying access control policies for XML documents with XPath, Proceedings of the ninth ACM symposium on Access control models and technologies , SACMAT '04, 2004. ,
DOI : 10.1145/990036.990046
Foundations of Cryptography, 2000. ,
Providing database as a service, Proceedings 18th International Conference on Data Engineering, 2002. ,
DOI : 10.1109/ICDE.2002.994695
Cryptographic access control in a distributed file system, Proceedings of the eighth ACM symposium on Access control models and technologies , SACMAT '03, 2003. ,
DOI : 10.1145/775412.775432
Homomorphic Signature Schemes, CT-RSA, 2002. ,
DOI : 10.1007/3-540-45760-7_17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.1944
Authorization-Transparent Access Control for XML Under the Non-Truman Model, EDBT, 2006. ,
DOI : 10.1007/11687238_16
An Update Protocol for XML Documents in Distributed and Cooperative Systems, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), 2005. ,
DOI : 10.1109/ICDCS.2005.12
Replication is not needed: single database, computationally-private information retrieval, Proceedings 38th Annual Symposium on Foundations of Computer Science, 1997. ,
DOI : 10.1109/SFCS.1997.646125
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.2667
Containment and equivalence for an XPath fragment, PODS, 2002. ,
DOI : 10.1145/543621.543623
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.5847
Anti-persistence: History independent data structures, Cryptology ePrint Archive Report, p.36, 2001. ,
Extending query rewriting techniques for fine-grained access control Query translation for xpath-based security views, SIGMOD Conference EDBT Workshops, 2004. ,
An Update Protocol for XML Documents in Distributed and Cooperative Systems, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), 2005. ,
DOI : 10.1109/ICDCS.2005.12