S. Abiteboul, P. Buneman, and D. Suciu, Data on the Web: From Relations to Semistructured Data and XML, 1999.

L. Bravo, J. Cheney, and I. Fundulaki, ACCOn, Proceedings of the 11th international conference on Extending database technology Advances in database technology, EDBT '08, pp.715-719, 2008.
DOI : 10.1145/1353343.1353433

S. C. Lim and S. H. Son, Access control of XML documents considering update operations, Proceedings of the 2003 ACM workshop on XML security , XMLSEC '03, 2003.
DOI : 10.1145/968559.968568

D. Chamberlin, M. Dyck, D. Florescu, J. Melton, J. Robie et al., Xquery update facility, W3C, 2009.

E. Damiani, S. D. Di-vimercati, S. Paraboschi, and P. Samarati, Securing XML Documents, Proceedings of the 7th Int. Conf. on Extending Database Technology (EDBT), pp.121-135, 2000.
DOI : 10.1007/3-540-46439-5_8

W. Fan, C. Chan, and M. Garofalakis, Secure XML querying with security views, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.587-598, 2004.
DOI : 10.1145/1007568.1007634

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.2679

I. Fundulaki and S. Maneth, Formalizing XML access control for update operations, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.169-174, 2007.
DOI : 10.1145/1266840.1266868

A. Gabillon, A Formal Access Control Model for XML Databases, Proceedings Second VLDB Workshop on Secure Data Management (SDM), pp.86-103, 2005.
DOI : 10.1007/11552338_7

URL : https://hal.archives-ouvertes.fr/hal-00408570

R. Gilleron, Decision problems for term rewriting systems and recognizable tree languages, 8 t h Annual Symposium on Theoretical Aspects of Computer Science (STACS), pp.148-159, 1991.
DOI : 10.1007/BFb0020795

F. Jacquemard and M. Rusinowitch, Closure of Hedge-Automata Languages by Hedge Rewriting, Proceedings of the 19th Int. Conf. on Rewriting Techniques and Applications (RTA), pp.157-171, 2008.
DOI : 10.1007/978-3-540-70590-1_11

URL : https://hal.archives-ouvertes.fr/inria-00329803

M. Kay, Xsl transformations (xslt) 2.0. W3c working draft, World Wide Web Consortium, 2003.

C. Löding, Ground Tree Rewriting Graphs of Bounded Tree Width, Proceedings of the 19th Annual Symposium on Theoretical Aspects of Computer Science (STACS), pp.559-570, 2002.
DOI : 10.1007/3-540-45841-7_46

C. Löding and A. Spelten, Transition Graphs of Rewriting Systems over Unranked Trees, Proceedings 32nd International Symposium on Mathematical Foundations of Computer Science 2007 (MFCS), pp.67-77, 2007.
DOI : 10.1007/978-3-540-74456-6_8

S. Maneth, A. Berlea, T. Perst, and H. Seidl, XML type checking with macro tree transducers, Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '05, pp.283-294, 2005.
DOI : 10.1145/1065167.1065203

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.549

W. Martens and F. Neven, Frontiers of tractability for typechecking simple xml transformations, Proceedings of the Twenty-third ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS), pp.23-34, 2004.

T. Milo, D. Suciu, and V. Vianu, Typechecking for XML transformers, Journal of Computer and System Sciences, vol.66, issue.1, pp.66-97, 2003.
DOI : 10.1016/S0022-0000(02)00030-2

M. Murata, Hedge Automata: a Formal Model for XML Schemata, 2000.

M. Murata, A. Tozawa, M. Kudo, and S. Hada, XML access control using static analysis, ACM Transactions on Information and System Security, vol.9, issue.3, pp.292-324, 2006.
DOI : 10.1145/1178618.1178621

H. Ohsaki, H. Seki, and T. Takai, Recognizing Boolean Closed A-Tree Languages with Membership Conditional Rewriting Mechanism, Proc. of the 14th Int. Conf. on Rewriting Techniques and Applications (RTA), volume 2706 of LNCS, pp.483-498, 2003.
DOI : 10.1007/3-540-44881-0_34

T. Perst and H. Seidl, Macro forest transducers, Information Processing Letters, vol.89, issue.3, pp.141-149, 2004.
DOI : 10.1016/j.ipl.2003.05.001