N. Anciaux, M. Benzine, L. Bouganim, P. Pucheral, and D. Shasha, GhostDB, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, 2007.
DOI : 10.1145/1247480.1247555

URL : https://hal.archives-ouvertes.fr/inria-00321721

N. Anciaux, M. Benzine, L. Bouganim, K. Jacquemin, P. Pucheral et al., Restoring the Patient Control over Her Medical History, 2008 21st IEEE International Symposium on Computer-Based Medical Systems, 2008.
DOI : 10.1109/CBMS.2008.101

URL : https://hal.archives-ouvertes.fr/inria-00325143

N. Anciaux, L. Bouganim, and P. Pucheral, Memory Requirements for Query Execution in, Highly Constrained Devices. Int. Conf. on Very Large Data Bases, 2003.

N. Anciaux, L. Bouganim, and P. Pucheral, Confidentialit?? des Bases de Donn??es : Apports de la Cryptographie et de Composants Mat??riels S??curis??s, annals of telecommunications - annales des t??l??communications, vol.29, issue.2, pp.61-64, 2006.
DOI : 10.1007/BF03219909

N. Anciaux, L. Bouganim, P. Pucheral, and P. Valduriez, DiSC: Benchmarking Secure Chip DBMS, IEEE Transactions on Knowledge and Data Engineering, vol.20, issue.10
DOI : 10.1109/TKDE.2008.67

URL : https://hal.archives-ouvertes.fr/inria-00333219

N. Anciaux, Database Systems on Chip. Unpublished doctoral dissertation, 2004.
URL : https://hal.archives-ouvertes.fr/tel-00309085

S. Akl and P. Taylor, Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer Systems, vol.1, issue.3, pp.239-248, 1983.
DOI : 10.1145/357369.357372

A. Simagine, Worldwide Mobile Communication and Java CardTM developer contest, 2005.

D. E. Bell and L. J. Lapadula, Secure computer systems: Unified exposition and multics interpretation The MITRE Corporation, 1976.

E. Bertino, S. Castano, E. Ferrari, and M. Mesiti, Specifying and Enforcing Access Control Policies for XML Document Sources, WWW Journal, vol.3, issue.3, 2000.

E. Bertino, S. Castano, and E. Ferrari, Securing XML documents with Author-X, IEEE Internet Computing, vol.5, issue.3, 2001.
DOI : 10.1109/4236.935172

E. Bertino and E. Ferrari, Secure and selective dissemination of XML documents, ACM Transactions on Information and System Security, vol.5, issue.3, 2002.
DOI : 10.1145/545186.545190

J. Birget, X. Zou, G. Noubir, and B. Ramamurthy, Hierarchy-based access control in distributed environments, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240), 2001.
DOI : 10.1109/ICC.2001.936308

C. Bolchini, F. Salice, F. A. Schreiber, and L. Tanca, Logical and physical design issues for smart card databases, ACM Transactions on Information Systems, vol.21, issue.3, 2003.
DOI : 10.1145/858476.858478

L. Bouganim, F. Dang-ngoc, and P. Pucheral, Client-Based Access Control Management for XML documents, 2004.
DOI : 10.1016/B978-012088469-8.50011-5

URL : https://hal.archives-ouvertes.fr/inria-00070718

L. Bouganim, P. Pucheral, and F. Dang-ngoc, Dynamic access-control policies on XML encrypted data, ACM Transactions on Information and System Security, vol.10, issue.4, 2007.
DOI : 10.1145/1284680.1284684

URL : https://hal.archives-ouvertes.fr/hal-00623914

L. Bouganim and P. Pucheral, Fairness concerns in digital right management models, International Journal of Internet and Enterprise Management, vol.5, issue.1, 2007.
DOI : 10.1504/IJIEM.2007.011591

URL : https://hal.archives-ouvertes.fr/inria-00309532

S. Cho, S. Amer-yahia, L. Lakshmanan, and D. Srivastava, Optimizing the Secure Evaluation of Twig Queries, 2002.
DOI : 10.1016/B978-155860869-6/50050-0

L. C. Carrasco, RDBMS's for Java Cards ? What a Senseless Idea !. http://www Fnacmusic.com : le test complet sur Ratiatum.com -Le Peer-to-Peer (P2P) au delà du téléchargement, 1999.

C. Chan, P. Felber, M. Garofalakis, and R. Rastogi, Efficient filtering of XML documents with XPath expressions, The VLDB Journal The International Journal on Very Large Data Bases, vol.11, issue.4, 2002.
DOI : 10.1007/s00778-002-0077-6

. Contentguard, MPEG-21 Right Expression Language (MPEG-REL), ISO/IEC 21000-5:2004 standard CSI/FBI Computer Crime and Security Survey, MPEGREL_home.asp Computer Security Institute, 2004.

Y. Diao and M. Franklin, High-performance XML filtering: An overview of filter, 2003.

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. Samarati, A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, 2002.
DOI : 10.1145/505586.505590

J. Dyer, G. Lindemann, M. Perez, R. Sailer, R. Van-doorn et al., Building the IBM 4758 secure coprocessor, Computer, vol.34, issue.10, p.24, 2001.
DOI : 10.1109/2.955100

W. Fan, C. Y. Chan, and M. Garofalakis, Secure XML Queryingwith Security Views, ACM SIGMOD Int. Conf. on Management of Data, 2004.

A. Gabillon and E. Bruno, Regulating Access to XML Documents, IFIP Conf. on Database and Application Security, 2001.
DOI : 10.1007/978-0-387-35587-0_21

A. Gabillon, An authorization model for XML databases, Proceedings of the 2004 workshop on Secure web service , SWS '04, 2004.
DOI : 10.1145/1111348.1111351

E. Giguère, Mobile data management: challenges of wireless and offline data access, Proceedings 17th International Conference on Data Engineering, 2001.
DOI : 10.1109/ICDE.2001.914831

T. Green, A. Gupta, G. Miklau, M. Onizuka, and D. Suciu, Processing XML streams with deterministic automata and stream indexes, ACM Transactions on Database Systems, vol.29, issue.4, 2004.
DOI : 10.1145/1042046.1042051

G. Grimen, C. Mönch, and R. Midtstraum, Building secure software-based DRM systems, 2006.

T. Hauser and C. Wenz, DRM Under Attack: Weaknesses in Existing Systems. Digital Rights Management -Technological, Economic, Legal and Political Aspects, 2003.

H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, Executing SQL over encrypted data in the database-service-provider model, ACM SIGMOD Int. Conf. on Management of Data, 2002.

M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, Protection in Operating Systems, Communication of the ACM, vol.19, issue.8, 1976.

J. He and M. Wang, Cryptography and relational database management systems, Proceedings 2001 International Database Engineering and Applications Symposium, 2001.
DOI : 10.1109/IDEAS.2001.938095

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.7.8573

J. Hopcroft and J. Ullman, Introduction to Automata Theory, Languages and Computation, 1979.

R. Merkle, A Certified Digital Signature Advances in Cryptology, 1989.

J. A. Melton and R. Simon, Understanding the new SQL: A Complete Guide, 1993.

M. Inc, Windows Microsoft Media 9. http://www.microsoft.com/windows/windowsmedia/. A Hardware Approach for Trusted Access and Usage Control 24

G. Miklau and D. Suciu, Cryptographically Enforced Conditional Access for XML, 2002.

G. Miklau and D. Suciu, Controlling Access to Published Data Using Cryptography, 2003.
DOI : 10.1016/B978-012722442-8/50084-7

M. Murata, A. Tozawa, and M. Kudo, XML Access Control Using Static Analysis, ACM Conference on Computer and Communications Security, 2003.

O. Corp, Oracle 9i Lite -Oracle Lite SQL Reference. Oracle Documentation, 2002.

P. Pucheral, L. Bouganim, P. Valduriez, and C. Bobineau, PicoDBMS: Scaling down database techniques for the smartcard, VLDB Journal, vol.10, issue.2-3, 2001.
URL : https://hal.archives-ouvertes.fr/hal-00442710

I. Ray, I. Ray, and N. Narasimhamurthi, A cryptographic solution to implement access control in a hierarchy and more, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, 2002.
DOI : 10.1145/507711.507723

R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, 1996.
DOI : 10.1109/2.485845

B. Schneier, Applied Cryptography, 1996.

P. Seshadri, Honey, I Shrunk the DBMS: Footprint, Mobility, and Beyond, 1999.

. Svp-alliance, Secure content anywhere, anytime

Y. Wang and K. L. Tan, A Scalable XML Access Control System, 2001.

W. Dom and D. , Document Object Model

H. Vogt, M. Rohs, and R. Kilian-kehr, Middleware for Communications, Chapter, vol.16, 2003.