. Références, The Aware Home Research Initiative ? Georgia Institute of Technology http

D. Aksoy, Research in Data Broadcast and Dissemination, Proc. Int. Conf. On Advanced Multimedia Processing, 1998.
DOI : 10.1007/3-540-48962-2_14

R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Hippocratic Databases, Int. Conf. on Very Large Data Bases (VLDB), 2002.
DOI : 10.1016/B978-155860869-6/50021-4

A. Cnrs-mobilité and /. Accès-aux-données, Mobilité et bases de données : état de l'art et perspectives, Chronique Technique et Science Informatiques (TSI) ACM Sigmod Record, vol.22, pp.3-4, 2003.

E. Bertino, S. Castano, E. Ferrari, and M. Mesiti, Specifying and Enforcing Access Control Policies for XML Document Sources, 2000.

P. Bonnet, J. Gehrke, and P. Seshadri, Towards Sensor Database Systems, Mobile Data Management, pp.3-14, 2001.
DOI : 10.1007/3-540-44498-X_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

P. A. Bernstein, V. Hadzilacos, and N. Goodman, Concurrency Control and Recovery in Database Systems, 1987.

L. Bouganim and P. Pucheral, Chip-Secured Data Access: Confidential Data on Untrusted Servers, Int. Conf. on Very Large Data Bases (VLDB), 2002.
DOI : 10.1016/b978-012722442-8/50123-3

A. Baraani, J. Pieprzyk, and R. Safavi-naini, Security In Databases: A Survey Study, 1996.

M. Cherniack, M. J. Franklin, and S. Zdonik, Expressing user profiles for data recharging, IEEE Personal Communications, vol.8, issue.4, 2001.
DOI : 10.1109/98.944001

P. Eugster, R. Guerraoui, R. Guting, P. Bohlen, M. Erwig et al., Probabilistic MulticastCSI/FBI Computer Crime and Security Survey A Foundation for Representing and Querying Moving Objects, Conf. on Dependable Systems and Networks (DSN)FBI02] Computer Security Institute, 2000.

A. Gabillon and E. Bruno, Regulating Access to XML Documents, Fifteenth Annual IFIP Working Conference on Database Security, 2001.
DOI : 10.1007/978-0-387-35587-0_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. He and M. Wang, Cryptography and relational database management systems, Proceedings 2001 International Database Engineering and Applications Symposium, 2001.
DOI : 10.1109/IDEAS.2001.938095

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

H. Hacigumus, B. R. Iyer, C. Li, and S. Mehrotra, Executing SQL over Encrypted Data in the Database-Service-Provider Model, Conf. On Management of Data (SIGMOD), 2002.

T. Imielinski and B. Nath, Wireless Graffiti ??? Data, data everywhere, Int. Conf. on Very Large Data Bases (VLDB), 2002.
DOI : 10.1016/B978-155860869-6/50010-X

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Imine, P. Molli, G. Oster, and R. M. , Proving Correctness of Transformation Functions in Real-Time Groupware, European Conf. on Computer-Supported Cooperative Work, 2003.
DOI : 10.1007/978-94-010-0068-0_15

URL : https://hal.archives-ouvertes.fr/inria-00107652

. Int, Standardization Organization (ISO) Integrated Circuit(s) Cards with Contacts ? Part 7: Interindustry Commands for Structured Card Query Language-SCQL, pp.7816-7823, 1999.

A. Joshi and D. Goldin, Report of the Group Discussion on Pervasive Computing, 2001.

A. Kalam, R. Baida, P. Balbiani, S. Benferhat, F. Cuppens et al., Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003.
DOI : 10.1109/POLICY.2003.1206966

URL : https://hal.archives-ouvertes.fr/hal-01483818

S. Lecomte and P. Trane, Failure Recovery Using Action Log for Smartcards Transaction Based System, IEEE On, 1997.

S. Madden, M. Franklin, J. Hellerstein, and W. Hong, The design of an acquisitional query processor for sensor networks, Proceedings of the 2003 ACM SIGMOD international conference on on Management of data , SIGMOD '03, 2003.
DOI : 10.1145/872757.872817

U. Mattsson, Secure.Data Functional Overview, 2000.

S. Olsen, Top Web Sites Compromise Consumer Privacy, CNET News Archive, 1999.

O. Corp, Database Security in Oracle8i, Oracle Documentation, 1999.

E. Pitoura and B. Bhargava, Data consistency in intermittently connected distributed systems, IEEE Transactions on Knowledge and Data Engineering, vol.11, issue.6, 1999.
DOI : 10.1109/69.824602

P. Pucheral, L. Bouganim, P. Valduriez, and C. Bobineau, PicoDBMS: Scaling down Database Techniques for the Smartcard, Very Large Data Bases Journal (VLDBJ), vol.10, issue.2-3, 2001.
URL : https://hal.archives-ouvertes.fr/hal-00442710

B. Schneier, Applied Cryptography, 1996.

P. Serrano-alvarado, C. Roncancio, and M. Adiba, Analyzing mobile transactions support for DBMS, 12th International Workshop on Database and Expert Systems Applications, 2001.
DOI : 10.1109/DEXA.2001.953124

C. Sun and C. S. Ellis, Operational transformation in real-time group editors, Proceedings of the 1998 ACM conference on Computer supported cooperative work , CSCW '98, 1998.
DOI : 10.1145/289444.289469

N. Vidot, M. Cart, J. Ferrié, and M. Suleiman, Copies convergence in a distributed real-time collaborative environment, Proceedings of the 2000 ACM conference on Computer supported cooperative work , CSCW '00, 2000.
DOI : 10.1145/358916.358988

URL : https://hal.archives-ouvertes.fr/hal-00684563

O. Wolfson, B. Xu, S. Chamberlain, and L. Jiang, Moving objects databases: issues and solutions, Proceedings. Tenth International Conference on Scientific and Statistical Database Management (Cat. No.98TB100243), 1998.
DOI : 10.1109/SSDM.1998.688116

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=