A. [. Arion, G. Bonifati, S. Costa, I. D-'aguanno, A. Manolescu et al., Efficient Query Evaluation over Compressed DataOrganization based access control, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003.
DOI : 10.1007/978-3-540-24741-8_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Akl, P. Taylor, A. Amer-yahia, S. Cho, L. Lakshmanan et al., Cryptographic solution to a problem of access control in a hierarchy Minimization of tree pattern queries, ACM SIGMOD, 1983.

E. Bertino, S. Castano, E. Ferrari, M. Mesiti, E. Bertino et al., Specifying and Enforcing Access Control Policies for XML Document SourcesSecuring XML documents with Author-X, WWW Journal IEEE Internet Computing, vol.3, issue.3, 2000.

L. Bouganim, F. Dang-ngoc, P. Pucheral-]-p, M. Buneman, C. Grobe et al., Client-Based Access Control Management for XML documents, INRIA internal report, 2003.
DOI : 10.1016/B978-012088469-8.50011-5

URL : https://hal.archives-ouvertes.fr/inria-00070718

L. Bouganim, P. Pucheral, [. Birget, X. Zou, G. Noubir et al., Chip-Secured Data Access: Confidential Data on Untrusted Servers Hierarchy-Based Access Control in Distributed Environments Optimizing the secure evaluation of twig queries, IEEE ICC, 2001.

C. Chan, P. Felber, M. Garofalakis, R. Rastogi, and R. Chandramouli, Efficient Filtering of XML Documents with Xpath Expressions Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks, 5th ACM workshop on Role-based Access Control, 2000.

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. Samarati, A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, 2002.
DOI : 10.1145/505586.505590

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

Y. Diao, M. Franklingab01, ]. Gabillon, and E. Bruno, High-Performance XML Filtering: An Overview of YFilter [FBI03] Computer Security InstituteCSI/FBI Computer Crime and Security Survey Regulating access to XML documents, IFIP Working Conference on Database and Application Security, 2001.

J. He and M. Wang, Cryptography and relational database management systems, Proceedings 2001 International Database Engineering and Applications Symposium, 2001.
DOI : 10.1109/IDEAS.2001.938095

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, Executing SQL over encrypted data in the database-service-provider model, ACM SIGMOD, 2002.

J. Hopcroft, J. Ullman, M. Kudo, and S. Hada, Introduction to Automata Theory, Languages and ComputationXML document security based on provisional authorization, Med] Windows Microsoft Windows Media 9Mer90] R. Merkle, " A Certified Digital Signature " , Advances in Cryptology--Crypto'89, 1979.

G. Miklau and D. Suciu, Containment and equivalence for an XPath fragment, ACM PODS, 2002.
DOI : 10.1145/543621.543623

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Micklau and D. Suciu, Controlling Access to Published Data Using Cryptography, 2003.
DOI : 10.1016/B978-012722442-8/50084-7

W. Ng, B. Ooi, K. Tan, and A. Zhou, Peerdb: A p2p-based system for distributed data sharing [ODR] The Open Digital Rights Language Initiative PICS: Platform for Internet Content Selection, ICDEXPath Queries on Streaming Data ACM SIGMOD, 2003.

I. Ray, I. Ray, and N. Narasimhamurthi, A Cryptographic Solution to Implement Access Control in a Hierarchy and More [SAX] Simple API for XML Applied Cryptography, www.trustedcomputing.org/. [ToX] ToXgene -the ToX XML Data Generator, 1996.

P. Tolani, J. Haritsavin02-]-r, and . Vingralek, XGRIND: A Query-Friendly XML Compressor [UWX] UW XML Data Repository, www.cs.washingtonGnatDb: A Small-Footprint, Secure Database System, XrM] XrML eXtendible rights Markup Language, 2002.
DOI : 10.1109/icde.2002.994712

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=