N. Anciaux, C. Bobineau, L. Bouganim, P. Pucheral, and P. Valduriez, PicoDBMS: Validation and Experience, 27th Int. Conf. on Very Large Data Bases (VLDB), demo session, 2001.

A. [. Arion, G. Bonifati, S. Costa, I. D-'aguanno, A. Manolescu et al., Efficient Query Evaluation over Compressed XML Data, EDBT, 2004.
DOI : 10.1007/978-3-540-24741-8_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.105.1210

G. Deswarte and . Trouessin, Organization based access control, IEEE 4th Int. Workshop on Policies for Distributed Systems and Networks, 2003.

A. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, Hippocratic Databases, 28th Int. Conf. on Very Large Data Bases, 2002.
DOI : 10.1016/B978-155860869-6/50021-4

S. [. Bertino, E. Castano, and . Ferrari, Securing XML documents with Author-X, IEEE Internet Computing, vol.5, issue.3, 2001.
DOI : 10.1109/4236.935172

]. L. Bdp04a, F. Bouganim, and P. Dang-ngoc, Client-Based Access Control Management for XML Documents, 30th Int. Conf. on Very Large Data Bases (VLDB), 2004.

]. L. Bdp04b, F. Bouganim, and P. Dang-ngoc, Client-Based Access Control Management for XML Documents, INRIA internal report, 2004.

L. Bouganim and P. , Chip-Secured Data Access: Confidential Data on Untrusted Servers, 28th Int. Conf. on Very Large Data Bases (VLDB), 2002.

L. C. Chan, P. Felber, M. Garofalakis, and R. Rastogi, RDBMS's for Java Cards? What a Senseless Idea! Efficient Filtering of XML Documents with Xpath Expressions, ICDE, 1999.

S. [. Damiani, S. De-capitani-di-vimercati, P. Paraboschi, and . Samarati, A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, 2002.
DOI : 10.1145/505586.505590

M. [. Diao and . Franklin, High-Performance XML Filtering: An Overview of YFilter, ICDE, 2003.

I. Duthie and B. Hochfield, Secure Megabytes on your Smart Card, Card Forum International, 2004.

J. He and M. Wang, Cryptography and relational database management systems, Proceedings 2001 International Database Engineering and Applications Symposium, 2001.
DOI : 10.1109/IDEAS.2001.938095

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.7.8573

B. [. Hacigumus, C. Iyer, S. Li, and . Mehrotra, Executing SQL over encrypted data in the database-service-provider model, ACM SIGMOD, 2002.

J. Hopcroft and J. Ullman, Introduction to Automata Theory, Languages and Computation, 1979.
DOI : 10.1145/568438.568455

J. Karlsson, A. Lal, C. Leung, and T. Pham, IBM DB2 Everyplace: a small footprint relational database system, Proceedings 17th International Conference on Data Engineering, 2001.
DOI : 10.1109/ICDE.2001.914833

M. Kudo and S. Hada, XML document security based on provisional authorization, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, 2000.
DOI : 10.1145/352600.352613

. Mas02 and . Mastercard, MasterCard Open Data Storage (MODS), 2002.

]. G. Mis02, D. Miklau, and . Suciu, Containment and equivalence for an XPath fragment, ACM PODS, 2002.

]. G. Mis03, D. Micklau, and . Suciu, Controlling Access to Published Data Using Cryptography, 29th Int. Conf. on Very Large Data Bases, 2003.

P. Pucheral, L. Bouganim, P. Valduriez, and C. Bobineau, PicoDBMS: Scaling down Database Techniques for the Smart card, Very Large Data Bases Journal (VLDBJ)

F. Peng and S. Chawathe, XPath Queries on Streaming Data PICS: Platform for Internet Content Selection, ACM SIGMOD, 2003.

R. Russel, Hack Proofing Your Network, 2001.

B. Schneier, Applied Cryptography, 1996.

P. Seshadri and P. Garrett, SQLServer for Windows CE-a database engine for mobile and embedded platforms, Proceedings of 16th International Conference on Data Engineering (Cat. No.00CB37073), 2000.
DOI : 10.1109/ICDE.2000.839481

S. Inc, The Next Generation Database for Embedded Systems, 2000.