GhostDB, Proceedings of the 2007 ACM SIGMOD international conference on Management of data , SIGMOD '07, 2007. ,
DOI : 10.1145/1247480.1247555
URL : https://hal.archives-ouvertes.fr/inria-00321721
Restoring the Patient Control over Her Medical History, 2008 21st IEEE International Symposium on Computer-Based Medical Systems, 2008. ,
DOI : 10.1109/CBMS.2008.101
URL : https://hal.archives-ouvertes.fr/inria-00325143
Memory Requirements for Query Execution in, Highly Constrained Devices. Int. Conf. on Very Large Data Bases, 2003. ,
Confidentialit?? des Bases de Donn??es : Apports de la Cryptographie et de Composants Mat??riels S??curis??s, annals of telecommunications - annales des t??l??communications, vol.29, issue.2, pp.61-64, 2006. ,
DOI : 10.1007/BF03219909
DiSC: Benchmarking Secure Chip DBMS, IEEE Transactions on Knowledge and Data Engineering, vol.20, issue.10 ,
DOI : 10.1109/TKDE.2008.67
URL : https://hal.archives-ouvertes.fr/inria-00333219
Database Systems on Chip. Unpublished doctoral dissertation, 2004. ,
URL : https://hal.archives-ouvertes.fr/tel-00309085
Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer Systems, vol.1, issue.3, pp.239-248, 1983. ,
DOI : 10.1145/357369.357372
Worldwide Mobile Communication and Java CardTM developer contest, 2005. ,
Secure computer systems: Unified exposition and multics interpretation The MITRE Corporation, 1976. ,
Specifying and Enforcing Access Control Policies for XML Document Sources, WWW Journal, vol.3, issue.3, 2000. ,
Securing XML documents with Author-X, IEEE Internet Computing, vol.5, issue.3, 2001. ,
DOI : 10.1109/4236.935172
Secure and selective dissemination of XML documents, ACM Transactions on Information and System Security, vol.5, issue.3, 2002. ,
DOI : 10.1145/545186.545190
Hierarchy-based access control in distributed environments, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240), 2001. ,
DOI : 10.1109/ICC.2001.936308
Logical and physical design issues for smart card databases, ACM Transactions on Information Systems, vol.21, issue.3, 2003. ,
DOI : 10.1145/858476.858478
Client-Based Access Control Management for XML documents, 2004. ,
DOI : 10.1016/B978-012088469-8.50011-5
URL : https://hal.archives-ouvertes.fr/inria-00070718
Dynamic access-control policies on XML encrypted data, ACM Transactions on Information and System Security, vol.10, issue.4, 2007. ,
DOI : 10.1145/1284680.1284684
URL : https://hal.archives-ouvertes.fr/hal-00623914
Fairness concerns in digital right management models, International Journal of Internet and Enterprise Management, vol.5, issue.1, 2007. ,
DOI : 10.1504/IJIEM.2007.011591
URL : https://hal.archives-ouvertes.fr/inria-00309532
Optimizing the Secure Evaluation of Twig Queries, 2002. ,
DOI : 10.1016/B978-155860869-6/50050-0
RDBMS's for Java Cards ? What a Senseless Idea !. http://www Fnacmusic.com : le test complet sur Ratiatum.com -Le Peer-to-Peer (P2P) au delà du téléchargement, 1999. ,
Efficient filtering of XML documents with XPath expressions, The VLDB Journal The International Journal on Very Large Data Bases, vol.11, issue.4, 2002. ,
DOI : 10.1007/s00778-002-0077-6
MPEG-21 Right Expression Language (MPEG-REL), ISO/IEC 21000-5:2004 standard CSI/FBI Computer Crime and Security Survey, MPEGREL_home.asp Computer Security Institute, 2004. ,
High-performance XML filtering: An overview of filter, 2003. ,
A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, 2002. ,
DOI : 10.1145/505586.505590
Building the IBM 4758 secure coprocessor, Computer, vol.34, issue.10, p.24, 2001. ,
DOI : 10.1109/2.955100
Secure XML Queryingwith Security Views, ACM SIGMOD Int. Conf. on Management of Data, 2004. ,
Regulating Access to XML Documents, IFIP Conf. on Database and Application Security, 2001. ,
DOI : 10.1007/978-0-387-35587-0_21
An authorization model for XML databases, Proceedings of the 2004 workshop on Secure web service , SWS '04, 2004. ,
DOI : 10.1145/1111348.1111351
Mobile data management: challenges of wireless and offline data access, Proceedings 17th International Conference on Data Engineering, 2001. ,
DOI : 10.1109/ICDE.2001.914831
Processing XML streams with deterministic automata and stream indexes, ACM Transactions on Database Systems, vol.29, issue.4, 2004. ,
DOI : 10.1145/1042046.1042051
Building secure software-based DRM systems, 2006. ,
DRM Under Attack: Weaknesses in Existing Systems. Digital Rights Management -Technological, Economic, Legal and Political Aspects, 2003. ,
Executing SQL over encrypted data in the database-service-provider model, ACM SIGMOD Int. Conf. on Management of Data, 2002. ,
Protection in Operating Systems, Communication of the ACM, vol.19, issue.8, 1976. ,
Cryptography and relational database management systems, Proceedings 2001 International Database Engineering and Applications Symposium, 2001. ,
DOI : 10.1109/IDEAS.2001.938095
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.7.8573
Introduction to Automata Theory, Languages and Computation, 1979. ,
A Certified Digital Signature Advances in Cryptology, 1989. ,
Understanding the new SQL: A Complete Guide, 1993. ,
Windows Microsoft Media 9. http://www.microsoft.com/windows/windowsmedia/. A Hardware Approach for Trusted Access and Usage Control 24 ,
Cryptographically Enforced Conditional Access for XML, 2002. ,
Controlling Access to Published Data Using Cryptography, 2003. ,
DOI : 10.1016/B978-012722442-8/50084-7
XML Access Control Using Static Analysis, ACM Conference on Computer and Communications Security, 2003. ,
Oracle 9i Lite -Oracle Lite SQL Reference. Oracle Documentation, 2002. ,
PicoDBMS: Scaling down database techniques for the smartcard, VLDB Journal, vol.10, issue.2-3, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-00442710
A cryptographic solution to implement access control in a hierarchy and more, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, 2002. ,
DOI : 10.1145/507711.507723
Role-based access control models, Computer, vol.29, issue.2, 1996. ,
DOI : 10.1109/2.485845
Applied Cryptography, 1996. ,
Honey, I Shrunk the DBMS: Footprint, Mobility, and Beyond, 1999. ,
Secure content anywhere, anytime ,
A Scalable XML Access Control System, 2001. ,
Document Object Model ,
Middleware for Communications, Chapter, vol.16, 2003. ,