Efficient Query Evaluation over Compressed DataOrganization based access control, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003. ,
DOI : 10.1007/978-3-540-24741-8_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.105.1210
Cryptographic solution to a problem of access control in a hierarchy Minimization of tree pattern queries, ACM SIGMOD, 1983. ,
Specifying and Enforcing Access Control Policies for XML Document SourcesSecuring XML documents with Author-X, WWW Journal IEEE Internet Computing, vol.3, issue.3, 2000. ,
Client-Based Access Control Management for XML documents, INRIA internal report, 2003. ,
DOI : 10.1016/B978-012088469-8.50011-5
URL : https://hal.archives-ouvertes.fr/inria-00070718
Chip-Secured Data Access: Confidential Data on Untrusted Servers Hierarchy-Based Access Control in Distributed Environments Optimizing the secure evaluation of twig queries, IEEE ICC, 2001. ,
Efficient Filtering of XML Documents with Xpath Expressions Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks, 5th ACM workshop on Role-based Access Control, 2000. ,
A fine-grained access control system for XML documents, ACM Transactions on Information and System Security, vol.5, issue.2, 2002. ,
DOI : 10.1145/505586.505590
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.9859
High-Performance XML Filtering: An Overview of YFilter [FBI03] Computer Security InstituteCSI/FBI Computer Crime and Security Survey Regulating access to XML documents, IFIP Working Conference on Database and Application Security, 2001. ,
Cryptography and relational database management systems, Proceedings 2001 International Database Engineering and Applications Symposium, 2001. ,
DOI : 10.1109/IDEAS.2001.938095
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.7.8573
Executing SQL over encrypted data in the database-service-provider model, ACM SIGMOD, 2002. ,
Introduction to Automata Theory, Languages and ComputationXML document security based on provisional authorization, Med] Windows Microsoft Windows Media 9Mer90] R. Merkle, " A Certified Digital Signature " , Advances in Cryptology--Crypto'89, 1979. ,
Containment and equivalence for an XPath fragment, ACM PODS, 2002. ,
DOI : 10.1145/543621.543623
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.5847
Controlling Access to Published Data Using Cryptography, 2003. ,
DOI : 10.1016/B978-012722442-8/50084-7
Peerdb: A p2p-based system for distributed data sharing [ODR] The Open Digital Rights Language Initiative PICS: Platform for Internet Content Selection, ICDEXPath Queries on Streaming Data ACM SIGMOD, 2003. ,
A Cryptographic Solution to Implement Access Control in a Hierarchy and More [SAX] Simple API for XML Applied Cryptography, www.trustedcomputing.org/. [ToX] ToXgene -the ToX XML Data Generator, 1996. ,
XGRIND: A Query-Friendly XML Compressor [UWX] UW XML Data Repository, www.cs.washingtonGnatDb: A Small-Footprint, Secure Database System, XrM] XrML eXtendible rights Markup Language, 2002. ,
DOI : 10.1109/icde.2002.994712
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.9087