A. Belokosztolszki, D. M. Eyers, and K. Moody, Policy contexts: controlling information flow in parameterised RBAC, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.99-110, 2003.
DOI : 10.1109/POLICY.2003.1206964

V. Benzaken, M. Burelle, C. , and G. , Information Flow Security for XML Transformations, ASIAN03, pp.33-53, 2003.
DOI : 10.1007/978-3-540-40965-6_4

URL : https://hal.archives-ouvertes.fr/hal-00152613

V. Benzaken, G. Castagna, and A. Frisch, CDuce, ACM SIGPLAN Notices, vol.38, issue.9, pp.51-63, 2003.
DOI : 10.1145/944746.944711

URL : https://hal.archives-ouvertes.fr/hal-00699610

E. Bertino and E. Ferrari, Secure and selective dissemination of XML documents, ACM Transactions on Information and System Security, vol.5, issue.3, pp.290-331, 2002.
DOI : 10.1145/545186.545190

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. Samarati, Design and implementation of an access control processor for XML documents, Computer Networks, vol.33, issue.1-6, pp.1-6, 2000.
DOI : 10.1016/S1389-1286(00)00053-0

E. Damiani, S. De-capitani-di-vimercati, S. Paraboschi, and P. Samarati, Securing XML Documents, EDBT00, pp.121-135, 2000.
DOI : 10.1007/3-540-46439-5_8

E. Damiani, M. Fansi, A. Gabillon, and S. Marrara, A general approach to securely querying XML, Computer Standards & Interfaces, vol.30, issue.6, pp.379-389, 2008.
DOI : 10.1016/j.csi.2008.03.006

URL : https://hal.archives-ouvertes.fr/hal-00994104

A. Dukovich, J. Hua, J. S. Lee, M. Huffman, and A. Dekhtyar, JOXM: Java Object XML Mapping, 2008 Eighth International Conference on Web Engineering, pp.332-335, 2008.
DOI : 10.1109/ICWE.2008.43

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.7185

M. J. Estlund, A survey and analysis of access control architectures for XML data. Master's thesis, Naval Postgraduate School, 2006.

W. Fan, C. Y. Chan, and M. N. Garofalakis, Secure XML querying with security views, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.587-598, 2004.
DOI : 10.1145/1007568.1007634

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.2679

E. B. Fernández, E. Gudes, and H. Song, A model for evaluation and administration of security in object-oriented databases, IEEE Transactions on Knowledge and Data Engineering, vol.6, issue.2, pp.275-292, 1994.
DOI : 10.1109/69.277771

D. Ferraiolo and R. Kuhn, Role-based access controls, 15th National Computer Security Conference, pp.554-563, 1992.

A. Fontaine, D. Ghindici, S. Hym, I. Simplot-ryl, T. et al., D3 -expression of security policies compatible with code sharing, Tech. rep., ANR SFINCS, 2010.

N. J. Foster, B. C. Pierce, and S. Zdancewic, Updatable Security Views, 2009 22nd IEEE Computer Security Foundations Symposium, pp.60-74, 2009.
DOI : 10.1109/CSF.2009.25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.145.8632

A. Gabillon, A logical formalization of a secure XML database, Computer Science and System Engineering Journal, vol.21, issue.5, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00399308

A. Gabillon and E. Bruno, Regulating Access to XML Documents, DBSEC01, pp.299-314, 2001.
DOI : 10.1007/978-0-387-35587-0_21

D. Ghindici and I. Simplot-ryl, On Practical Information Flow Policies for Java-Enabled Multiapplication Smart Cards, Proc. 8th IFIP Conf. on Smart Card Research and Advanced Applications (CARDIS08), pp.32-47, 2008.
DOI : 10.1109/JSAC.2002.806121

URL : https://hal.archives-ouvertes.fr/inria-00544952

D. Ghindici, I. Simplot-ryl, T. , and J. , A Sound Analysis for Secure Information Flow Using Abstract Memory Graphs, Lecture Notes in Computer Science, vol.5961, pp.355-370
DOI : 10.1007/978-3-642-11623-0_21

B. Groz, S. Staworko, A. Caron, Y. Roos, and S. Tison, XML Security Views Revisited, DBPL, pp.52-67, 2009.
DOI : 10.1007/11896548_22

URL : https://hal.archives-ouvertes.fr/hal-00396796

S. Hada and M. Kudo, XML access control language: provisional authorization for XML documents

Y. Kanza, A. O. Mendelzon, and R. J. Miller, Authorization-Transparent Access Control for XML Under the Non-Truman Model, EDBT, pp.222-239, 2006.
DOI : 10.1007/11687238_16

G. M. Kuper, F. Massacci, R. , and N. , Generalized XML security views, International Journal of Information Security, vol.29, issue.2, pp.173-203, 2009.
DOI : 10.1007/s10207-008-0074-x

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.8168

G. Pallis, K. Stoupa, and A. Vakali, Storage and access control issues for XML documents, Encyclopedia of Information Science and Technology (V), M. Khosrow-Pour, Ed. Idea Group, 2005.

Y. Papakonstantinou and V. Vianu, DTD inference for views of XML data, Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '00, pp.35-46, 2000.
DOI : 10.1145/335168.335173

F. Rabitti, E. Bertino, W. Kim, and D. Woelk, A model of authorization for next-generation database systems, ACM Transactions on Database Systems, vol.16, issue.1, pp.88-131, 1991.
DOI : 10.1145/103140.103144

I. Ray and M. Muller, Using Schemas to Simplify Access Control for XML Documents, ICDCIT04, pp.363-368, 2004.
DOI : 10.1007/978-3-540-30555-2_42

S. Rizvi, A. O. Mendelzon, S. Sudarshan, R. , and P. , Extending query rewriting techniques for fine-grained access control, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, pp.551-562, 2004.
DOI : 10.1145/1007568.1007631

P. Samarati, E. Bertino, and S. Jajodia, An authorization model for a distributed hypertext system, IEEE Transactions on Knowledge and Data Engineering, vol.8, issue.4, pp.555-562, 1996.
DOI : 10.1109/69.536249

F. Seehusen and K. Stølen, Information flow property preserving transformation of UML interaction diagrams, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.150-159, 2006.
DOI : 10.1145/1133058.1133080

E. Y. Wong, A. T. Chan, and H. Leong, Semantic-based approach to streaming XML contents using Xstream, Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003, p.91, 2003.
DOI : 10.1109/CMPSAC.2003.1245326

X. Zhang, J. Park, and R. S. Sandhu, Schema Based XML Security: RBAC Approach, DBSEC03 (Estes Park, pp.330-343, 2003.
DOI : 10.1007/1-4020-8070-0_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.6016